Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Loading initialization program (e.g., booting, rebooting, warm booting, remote booting, BIOS, initial program load (IPL), bootstrapping)

Subclass of:

713 - Electrical computers and digital processing systems: support

713001000 - DIGITAL DATA PROCESSING SYSTEM INITIALIZATION OR CONFIGURATION (E.G., INITIALIZING, SET UP, CONFIGURATION, OR RESETTING)

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20110179261METHOD FOR CONTROLLING NETWORK CONTROLLER, NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM, AND INFORMATION PROCESSING APPARATUS - A method for controlling a network controller, including: preferentially booting a network controller assignment controlling driver before at least one of a network controller controlling driver for EFI and a network controller controlling driver for legacy BIOS initializes the network controller, the network controller assignment controlling driver deciding whether to operate the network controller by either of the EFI or the legacy BIOS, based on preset setting data of the network controller; and exclusively acquiring a driver providing a protocol used for initialization of the network controller by the network controller assignment controlling driver when the setting data of the network controller is an instruction to initialize the network controller for the legacy BIOS.07-21-2011
20110179259METHOD FOR INTEGRATING OPERATING SYSTEM INTO BIOS CHIP AND METHOD FOR BOOTING OPERATING SYSTEM INTEGRATED INTO BIOS CHIP - A method for integrating an operating system (OS) into a basic input output system (BIOS) chip and to boot a computer using programs stored in the BIOS. A bootable image file of the OS is integrated with a virtual disk program and other BIOS instructions and stored into the BIOS chip. When the computer is powered up and upon the condition that an OS in a hard disk of a computer system is damaged, the OS in the BIOS chip is executed.07-21-2011
20090063836Extended fault resilience for a platform - In one embodiment, the present invention includes a method for allocating a fail-over memory region, determining if multiple processors have reached a rendezvous state, and verifying a memory failure in a system software memory region associated with a non-rendezvousing processor and sending a message to the non-rendezvousing processor to update a range register to the fail-over memory region. Other embodiments are described and claimed.03-05-2009
20100058045METHOD AND APPARATUS FOR FAST BOOTING A PORTABLE COMPUTING DEVICE ALLOWING FOR IMMEDIATE OPERATION - The present invention discloses a portable computing device (03-04-2010
20080313450Distributed Bootstrapping Mechanism for Peer-to-Peer Networks - Methods, apparatuses and systems directed to a distributed bootstrapping mechanism for peer-to-peer networks. In particular implementations, the de-centralized bootstrapping mechanism utilizes an allocated set of anycast addresses from the public IP space. Routing nodes or peer nodes corresponding to respective autonomous systems select an anycast address by computing a hash of an Autonomous System (AS) number (or other string) and mapping the hash value, or a portion of the hash value, to one of the anycast addresses in the allocated set. Other mechanisms for selecting anycast addresses (such as random selection) can be used. One or more of the routing nodes of the autonomous system may advertise a host route identifying the selected anycast address. When a new peer node is added to the P2P network, it may, upon initialization, transmit discovery messages using the anycast addresses from the allocated set, which may be ultimately routed to one of the peers in the P2P network. One of the responding peers in the P2P network may then be used by the newly initialized peer as a bootstrap resource to join the P2P network.12-18-2008
20110191575IC CHIP, INFORMATION PROCESSING APPARATUS, SOFTWARE MODULE CONTROL METHOD, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An IC chip, an information processing apparatus, a software module control method, an information processing system, an information processing method, and a program for allowing a plurality of software modules to ensure their respective security when operating are provided. An information processing system is provided to include a reader/writer and a portable communication terminal accessed by the reader/writer through near-field communication. In the portable communication terminal, a memory access management module stores a map regarding a plurality of software modules J and F for handling information exchanged in accordance with different noncontact communication principles while managing the software modules J and F based on the map. Another software module A performs mapping of the map for permitting or inhibiting the operations of the plurality of software modules.08-04-2011
20090013164Computer system and method of using power button to switch from one BIOS to another - A computer system, using a power button to switch from one BIOS to another, includes a power button, a detection device and a switch circuit. The power button is electrically coupled to the computer system. The detection device is electrically coupled to the power button, and outputs a switch signal and a boot signal when the power button is continuously pushed for a switch time value, in which the boot signal is used to execute a boot procedure in the computer system. The switch circuit is electrically coupled to the detection device, and switches from a first BIOS to a second BIOS used for the boot procedure, in accordance with the switch signal. A method of using a power button to switch from one BIOS to another is also disclosed.01-08-2009
20090193243Dual Mode Power-Saving Computing System - The present invention relates to a data processing system comprising both a high performance computing sub-system having typical high power consumption and a low performance subsystem requiring less power. The data processing system acts as a single computing device by moving the execution of software from the low performance subsystem to the high performance subsystem when high computing power is needed and vice versa when low computing performance is sufficient, allowing in the latter case to put the high performance subsystem into a power saving state. The invention relates also to related algorithms.07-30-2009
20100011202MULTI-STAGE BOOT PIN SAMPLING - In accordance with embodiments, a method for configuring an electronic device during a power-on sequence includes sampling a boot pin state multiple times. The method also includes storing a value corresponding to each sampled boot pin state, wherein the stored values comprise one of four different states for a single boot pin.01-14-2010
20130031349Computing device booting utilizing dispersed storage - A computing device boot-up method begins by a processing module detecting a boot-up of the computing device. The method continues with the processing module addressing a distributed basic input/output system (BIOS) memory to retrieve a plurality of error coded BIOS data slices. The method continues with the processing module reconstructing BIOS data from the plurality of error coded BIOS data slices using an error coding dispersal function. The method continues with the computing device booting up in accordance with the BIOS data.01-31-2013
20130031348Communicating Operating System Booting Information - Disclosed embodiments relate to communicating operating system booting information. A machine-readable storage medium may include instructions for reading data related to booting of an operating system of an electronic device from a non-volatile storage, instructions for writing the read data to a volatile storage prior to the booting of an operating system on the electronic device, and instructions for communicating the data written to the volatile storage to the electronic device via a serial communication interface. The machine-readable storage medium may further include instructions for receiving data, from the electronic device via the serial communication interface, related to the booting of the operating system of the electronic device and instructions for writing the received data to the non-volatile storage.01-31-2013
20130031347ARRANGEMENT AND METHOD - A first arrangement including an interface configured to receive transactions with an address from a second arrangement having a first memory space; a translator configured to translate an address of a first type of received transaction to a second memory space of the first arrangement, the second memory space being different to the first memory space; and boot logic configured to map a boot transaction of the received transactions to a boot region in the second memory space.01-31-2013
20130031344COMPUTER AND DISPLAY AND BOOT CIRCUIT FOR SAME - A computer system includes a display and a computer. The display includes a first data port, a boot button connected to a first pin of the first data port, and a display control circuit connected to the boot button. The computer includes a second data port connected to the first data port, a buffer connected to a second pin of the second data port, and a computer control circuit. When the boot button is turned on, the display control circuit receives a low-level signal. The display control circuit boots the display, and controls the display to operate. The computer control circuit receives the low-level signal through the first and second data ports, and the buffer. The computer control circuit boots the computer, and controls the computer to operate.01-31-2013
20130031343COMPUTER SYSTEM AND OPERATION SYSTEM LOADING METHOD - A computer system and an operation system loading method thereof are provided. The computer system comprises a universal serial bus (USB) storage device storing a boot image, servers and a boot image sharer comprising USB ports, a memory, a first USB host controller and a micro-processor. The micro-processor controls the first USB host controller to emulate each USB port to the USB storage device, and stores the boot image to memory, such that the boot image is shared to the USB ports. The servers are respectively coupled to the USB ports, wherein each server comprises a second USB host controller and a basic input output system (BIOS). The second USB host controller is coupled to one of the USB ports. The BIOS reads the boot image from the emulated USB storage device and loads an operation system according to the boot image.01-31-2013
20130031342STORAGE AND TRANSFER OF PHYSICAL MACHINE STATE - According to one embodiment, an apparatus comprises a physical computing device including a network interface configured to enable communications over a network, and at least one processor. The apparatus captures an operational state of the physical computing device including information pertaining to a state of the physical computing device resulting from operations performed by the physical computing device. The apparatus further configures the physical computing device with the operational state captured from a desired computing device to continue operations of the desired computing device on the physical computing device. Embodiments may further include a method and computer-readable media encoded with software for the storage and transfer of physical machine state in substantially the same manner described above.01-31-2013
20130031341Hibernation and Remote Restarting Hibernation Data in a Cluster Environment - Hibernation and remote restore functions of a client logical partition (LPAR) that exists within a data processing system having cluster-aware Virtual Input/Output (I/O) Servers (VIOSes) is performed via receipt of commands via a virtual control panel (VCP) through an underlying hypervisor. The client hibernation data file is stored in a shared repository by a source/original VIOS assigned to the client. The hypervisor receives a remote restart command and assigns a target/remote client LPAR and a target VIOS. The source I/O adapters and target I/O adapters are locked and the target VIOS gathers adapter configuration information from the source VIOS and configures the target adapters to be able to perform the I/O functionality provided by the source adapters to the client LPAR. The target VIOS then retrieves the client's hibernation data file, and the client LPAR is restored at the remote LPAR with the target VIOS providing the client's I/O functionality.01-31-2013
20130086372INFORMATION PROCESSING APPARATUS AND BOOT CONTROL METHOD - According to one embodiment, an information processing apparatus, to which devices are connected, includes a device information detector, a device setting module and an information storage module. The device information detector detects device information from the devices when the apparatus is booted at a first timing. The device setting module sets the devices to be ready to use using the information. The information storage module stores the information in a nonvolatile memory. The device setting module sets the devices to be ready to use using the information in the nonvolatile memory when the apparatus is booted at a second timing after the first timing.04-04-2013
20110202752SEMICONDUCTOR DEVICE INCLUDING ENCRYPTION SECTION, SEMICONDUCTOR DEVICE INCLUDING EXTERNAL INTERFACE, AND CONTENT REPRODUCTION METHOD - A secure LSI device 08-18-2011
20110202751USER TERMINAL, SERVER AND CONTROLLING METHOD THEREOF - A user terminal is provided, including a communication interface unit which receives an application content at least part of which is encrypted, a storage unit which stores the received application content, a decryption unit which decrypts the application content, a user interface unit which receives a command to execute the application content, and a controlling unit which controls the decryption unit to install an application content stored in the storage unit in an encrypted state and decrypt the installed application content according to the execution command. Accordingly, an application, which is an executable content, may be downloaded and installed in a user terminal, and used and updated safely.08-18-2011
20120246457BARE METAL MACHINE RECOVERY - Provided herein are systems and methodologies for bare metal machine restoration of a client computing environment over a network-based backup system. System recovery can be performed by performing a network boot from a predetermined server or set of servers on the Internet and/or an associated local network, followed by retrieving information relating to an operating system and/or environment of a system being recovered, such as incremental or full operating system images. Upon retrieval of information, the information can be used to conduct a full restore of the operating environment of the computing device. Additionally, a user can restore personal or other system data following rebuilding of the system operating environment. A cloud-based structure is provided herein as well as a hybrid peer-to-peer/cloud-based structure, wherein information used in a restore can be obtained from a global network location (e.g., cloud server(s)) and/or from one or more local peers.09-27-2012
20120246456MEMORY TAGGING AND PRESERVATION DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory coupled to the processor, and initiating a boot of a second operating system kernel while preserving in the volatile memory contents stored therein. Following the boot of the second operating system kernel, a set of parameters referencing the tagged region is retrieved from the volatile memory, and the tagged region is then used, based on the retrieved set of parameters.09-27-2012
20120246455PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter.09-27-2012
20100077197NON-VOLATILE MEMORY CACHE PERFORMANCE IMPROVEMENT - In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one embodiment, one portion of the non-volatile memory is used as a write buffer and a read cache for writes and reads to the long-term storage media. Interfaces are provided for controlling the use of the non-volatile memory as a write buffer and a read cache. Additionally, a portion of the non-volatile memory is used to provide a direct mapping for specified sectors of the long-term storage media. Descriptive data regarding the persistent storage device is stored in another portion of the non-volatile memory.03-25-2010
20100077196COMPUTER AND METHOD FOR CONNECTING COMPUTER TO NETWORK DISK - A computer includes a BIOS and a communication system. The BIOS includes a disk access interface module and a ram disk. The disk access interface module accesses a remote disk, and the ram disk stores data retrieved from the remote disk. The communication system includes a storage medium having a preset format and a communication protocol layer module. The storage medium having the preset format has a network chip driver to allow the BIOS to call and connect to the network. Thus, the computer may communicate with the remote disk. The communication protocol layer module makes the computer communicate with the remote disk through the network chip driver.03-25-2010
20100077195METHOD AND A MEMORY UNIT FOR BOOTING A SERVER - The invention relates to a server with at least one removable storage unit. This removable storage unit is designed to boot a server. The removable storage unit, which is for example a memory card, comprises a non-writable storage, which stores a boot-loader and reference installation files, and a writable secondary storage, which is designed to store installation files. The boot-loader checks a data content of the secondary storage and a data content of a primary storage of the server. In case the secondary storage is not empty and the primary storage is either empty or comprises a different data content than the secondary storage, the boot-loader stores the data content of the secondary storage in the primary storage of the server.03-25-2010
20100077194TURBO BOOT SYSTEMS AND METHODS - A computer system includes a hard disk drive and a non-volatile semiconductor memory. The hard disk drive stores a first set of data that includes boot up data. The non-volatile semiconductor memory is distinct from semiconductor memory of the hard disk drive and semiconductor memory of a host of the computer system. A turbo boot driver module stores the boot up data in the non-volatile semiconductor memory and transfers the boot up data from the non-volatile semiconductor memory to a file system of the host during a boot up mode of the host.03-25-2010
20100077191INFORMATION PROCESSOR, EXTERNAL MEMORY AND CONTROL METHOD - An information processor includes a system control unit configured to start up one operating system, a drive unit configured to be driven in response to start-up of the one operating system, an external memory storing another operating system, and an interface (I/F) for the external memory which is connected to the external memory. The system control unit serves to stop the drive unit by being connected to the I/F for the external memory and to start up the other operating system from the external memory.03-25-2010
20100115257Systems and Methods to Provide Failover Support for Booting Embedded Hypervisor From an Internal Non-Volatile Memory Card - The present disclosure further relates to information handling systems with failover support for booting an embedded hypervisor, the information handling system. For example, an information handling system with failover support may comprise a processor; one or more applications configured to be executed, at least in part, by the processor; a memory communicatively coupled to the processor and comprising a basic input/output system (BIOS), the BIOS comprising a BIOS universal serial bus (USB) driver, the BIOS USB driver comprising a mass storage device driver; a primary internal embedded hypervisor non-volatile memory (NVM) card communicatively coupled to the memory, the first NVM card comprising a first bootable hypervisor image; and a back up internal embedded hypervisor NVM card communicatively coupled to the memory, the second NVM card comprising a second bootable hypervisor image.05-06-2010
20130086371METHOD FOR DEVICE-LESS OPTION-ROM BIOS LOAD AND EXECUTION - An invention is provided for loading an Option-ROM BIOS into memory without the need of an associated hardware device, such as a PCI card. The invention includes loading code from a boot sector of a designated boot device into memory, wherein the code includes Option-ROM location data denoting a location of an Option-ROM BIOS. The Option-ROM BIOS then is loaded into memory utilizing the Option-ROM location data. As above, the Option-ROM BIOS includes MBR location data denoting a location of the MBR associated with the OS. Thus, the MBR can be loaded into memory utilizing the MBR location data in the Option-ROM BIOS and control can be transferred to the MBR. Thereafter, the OS system files are loaded into memory utilizing the MBR.04-04-2013
20130031346Switching Between Processor Cache and Random-Access Memory - The present disclosure describes techniques and apparatuses for switching between processor cache and random-access memory. In some aspects, the techniques and apparatuses are able to reduce die size of application-specific components by forgoing dedicated random-access memory (RAM). Instead of using dedicated RAM, a memory having a cache configuration is reconfigured to a RAM configuration during operations of the application-specific component and then, when the operations are complete, the memory is configured back to the cache configuration. Because many application-specific components already include memory having the cache configuration, reconfiguring this memory rather than including a dedicated RAM reduces die size for the application component.01-31-2013
20130031345POWER SWITCHING SYSTEM, COMPUTER SYSTEM, AND REBOOT CONTROLLING METHOD THEREOF - A power switching system, a computer system, and a reboot controlling method thereof are disclosed. The power switching system is used to the computer system and includes a first power input port, a first power output port, a first linear regulator module, and a first switch module. The first power input port is used for inputting a first power signal. The first power output port is used for outputting a second power signal. The first linear regulator module includes a first transformer unit used for transforming the first power signal into the second power signal, and a first switch control unit used for controlling the first transformer unit. When the first switch module is activated, the first switch control unit is connected to a ground and controls the first transformer unit to stop outputting the second power signal.01-31-2013
20130080755METHOD FOR SPEEDING UP THE BOOT TIME OF ELECTRIC DEVICE AND ELECTRIC DEVICE USING THE SAME - A method for speeding up the boot time of an electric device and the electric device are disclosed. The disclosed method includes measuring power consumption of the electric device and determining whether the power consumption is greater than a threshold level, wherein the measuring and the determining steps are executed during a boot process of the electric device. If the power consumption is greater than the threshold level, a connector port controller initialization procedure is performed during the boot process, to initialize the connector port controller accordingly. If the power consumption is not greater than the threshold level, a simplified form of the connector port controller initialization procedure is performed during the boot process, to speed up the boot time.03-28-2013
20130080758System and Method to Manipulate a System Setting When Booting an Information Handling System - A method of manipulating a system setting when booting an information handling system can include providing an update request repository that includes a plurality of entries. Each of the plurality of entries can correspond to a particular system setting. A system setting value associated with each entry can be included in a handoff block (HOB) of a plurality of handoff blocks associated with a cache. The method also includes receiving a command from a PEI module (PEIM) indicating a change to be made to a particular system setting at the information handling system. The method also includes creating or changing a particular entry of the update request repository based on the command.03-28-2013
20130080756Attesting a Component of a System During a Boot Process - A method for attesting a component of a system during a boot process. The method comprises the steps of: verifying that the system is in a trusted state; in response to verifying that the system is in a trusted state, requesting an enrollment of the system wherein the requesting step further comprises the step of: retrieving enrollment data associated with the system; retrieving current input data associated with the component of the system; comparing the current input data against the enrollment data in order to determine whether the system can retain its trusted state; wherein in response to the comparing step, if the current input data matches the enrollment data, the system retains its trusted state; and accepting the trusted state until receipt of a notification, from the system having a retained trusted state, of an update to the system.03-28-2013
20130080757BOOTING METHOD AND BOOTING SYSTEM - A booting method is used to an electronic apparatus including a storage device having a firmware image and a firmware recovery program, and comprises the steps of: starting a booting procedure and a timer; stopping the timer when a stop signal is received; and implementing a shutdown program, and overwriting the firmware image with the firmware recovery program or overwriting a command first implemented of the firmware image with a jump command to jump to the firmware recovery program, when the timer attains a specific time and the stop signal is not received.03-28-2013
20130080754Service Profile Based Peripheral Component Interconnect Device Enumeration And Option ROM Loading - Techniques are provided for a computer device to receive and store data comprising information configured to indicate boot device parameters for devices to be initialized during a given boot sequence. Those devices that match the device parameters are initialized prior to loading the computer device's operating system. Devices that do not match the boot parameters are masked out by the BIOS, and Option ROM firmware is loaded and executed for those devices that match the boot parameters.03-28-2013
20090037718BOOTING SOFTWARE PARTITION WITH NETWORK FILE SYSTEM - In a software partition (SWPAR) environment, a method, system and computer program product enables a SWPAR to be remotely booted, independent of the booting of the OS on the global system environment, using network file system (NFS) services and protocols. A request to mount a NFS, hosted by an external server into a SWPAR environment is transmitted. The NFS services are automatically transitioning to a first operating state that enables support for user-level NFS services without requiring the NFS services be active. The SWPAR is automatically booted and access to the SWPAR provided during operation of the NFS services in the first operating state. Once the SWPAR has completed booting, the NFS services is transitioned back to a normal operating state in which SWPAR operates as a standalone device providing its own user-level NFS services.02-05-2009
20130036299METHOD FOR INCREASING FREE MEMORY AMOUNT OF MAIN MEMORY AND COMPUTER THEREFORE - For increasing a free memory amount, a computer is provided with a main memory and a virtual memory area. Working sets having a predetermined size in a main memory are allocated to virtual address spaces. The area from which working sets are removed is a free memory area, and a cache area is set to a part of the area. During booting, a predetermined process not affecting the booting is suspended. The size of the working set of the suspended process is decreased by swapping out the memory page into the virtual memory area. As a result, the size of the free memory area increases, and along therewith, the OS increases the size of a cache area, thus enabling more boot files to be read ahead and reducing the boot time.02-07-2013
20130036300METHOD OF FIXING ERROR OF BOOT IMAGE FOR FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE METHOD - A method of fixing an error of a boot image for fast booting an image forming apparatus. In the method, if a boot image stored in the image forming apparatus has an error, the boot image is deleted, and the error is fixed by replacing the boot image with a backup of the boot image or generating a new boot image.02-07-2013
20090119498HOT-PLUGGING A MEMORY DEVICE - An extensible firmware interface (EFI) framework is to enable hot-plugging and hot-removal of memory devices. The security phase of the EFI may enable a cache to operate as RAM (CAR mode) to support execution of pre-EFI (PEI) tasks. In one embodiment, the PEI phase may move the memory reference code (MRC) as a driver to the driver execution phase and hand-over the CAR information to the driver execution environment (DXE). The MRC driver may be registered as a run-time API, which may be called by the operating system to receive a dynamically created memory map. In other embodiment, the PEI phase executes the MRC and may hand-over the memory information and a memory pointer to the MRC to the DXE. The OS may call the DMD driver provisioned in the DXE, which in turn may call the MRC provisioned in the PEI to dynamically create a memory map.05-07-2009
20090119497System and Method for Managing Booting of an Information Handling System - Systems and methods for managing booting of an information handling system are disclosed. A method for managing the booting of an information handling system may include receiving user input for booting an information handling system to a first partition or a second partition. The user input may be used to determine whether the received user input is for booting to the first partition or to the second partition. In response to determining that the received user input is for booting to the second partition, a determination may be made whether the information handling system is authorized to boot to the second partition. In response to determining that the information handling system is authorized to boot to the second partition, the information handling system may be booted to the second partition. In response to determining that the information handling system is not authorized to boot to the second partition, the information handling system may be booted to the first partition.05-07-2009
20120210114LOG FILE PROCESSING SYSTEM AND METHOD - A remote server and method processes a log file generated by a cloud server of a data center. The remote server sets an operating system image file and inserts test commands into the operating system image file and installs the operating system in each cloud server using the operating system image file. The remote server executes test commands and receives a log file from each cloud server. The remote server creates a file name for each log file corresponding to the cloud server and stores the log files into a storage system.08-16-2012
20130042098METHOD OF GENERATING BOOT IMAGE FOR FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE METHOD, AND METHOD OF PERFORMING FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE METHOD - A method of generating a boot image for fast booting an image forming apparatus. In the method, a boot image is generated to contain information regarding a system state after processes that are not used to execute an operating system and at least one application are terminated. Then, the image forming apparatus is fast booted using the boot image.02-14-2013
20130042097METHOD OF UPDATING BOOT IMAGE FOR FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE METHOD - A method of updating a boot image for fast booting an image forming apparatus. In the method, when a request for changing software installed in the image forming apparatus is received, a boot image is deleted from the image forming apparatus and the boot image is re-generated by rebooting the image forming apparatus.02-14-2013
20130042095Method of Initializing Operation of a Memory System - Provided is a method of initializing operation of a memory system. The method includes receiving an initialization signal, performing a first initializing operation that uses initialization data in response to the receiving of the initialization signal, setting a forced reset mode when an operation standby signal is not enabled by the first initializing operation, and performing a second initializing operation that does not use the initialization data in response to the setting of the forced reset mode.02-14-2013
20130042096DISTRIBUTED MULTI-CORE MEMORY INITIALIZATION - In a system having a plurality of processing nodes, a control node divides a task into a plurality of sub-tasks, and assigns the sub-tasks to one or more additional processing nodes which execute the assigned sub-tasks and return the results to the control node, thereby enabling a plurality of processing nodes to efficiently and quickly perform memory initialization and test of all assigned sub-tasks.02-14-2013
20100042825System and Method for Network Image Propagation without a Predefined Network - A system and method for network image propagation without a predefined network advantageously allows customers to automatically perform several system BOS installation or mksysb restoration over a virtual network with no predefined network and minimal installer configuration overhead. A method for network image propagation comprises: identifying a plurality of logical partitions residing in the logically partitioned terminal; configuring a temporary virtual network to connect said plurality of logical partitions to each other, wherein each one of the logical partitions is assigned at least one of a virtual Internet Protocol (IP) address and a virtual Media Access Control (MAC) address; installing an application image on at least one of the logical partitions via the temporary virtual network; deconfiguring the temporary virtual network; and assigning at least one of a physical IP address and a physical MAC address to said at least one logical partition on which the application has been installed.02-18-2010
20100042824HARDWARE TRUST ANCHORS IN SP-ENABLED PROCESSORS - A trust system and method is disclosed for use in computing devices, particularly portable devices, in which a central Authority shares secrets and sensitive data with users of the respective devices. The central Authority maintains control over how and when shared secrets and data are used. In one embodiment, the secrets and data are protected by hardware-rooted encryption and cryptographic hashing, and can be stored securely in untrusted storage. The problem of transient trust and revocation of data is reduced to that of secure key management and keeping a runtime check of the integrity of the secure storage areas containing these keys (and other secrets). These hardware-protected keys and other secrets can further protect the confidentiality and/or integrity of any amount of other information of arbitrary size (e.g., files, programs, data) by the use of strong encryption and/or keyed-hashing, respectively. In addition to secrets the Authority owns, the system provides access to third party secrets from the computing devices. In one embodiment, the hardware-rooted encryption and hashing each use a single hardware register fabricated as part of the computing device's processor or System-on-Chip (SoC) and protected from external probing. The secret data is protected while in the device even during operating system malfunctions and becomes non-accessible from storage according to various rules, one of the rules being the passage of a certain time period. The use of the keys (or other secrets) can be bound to security policies that cannot be separated from the keys (or other secrets). The Authority is also able to establish remote trust and secure communications to the devices after deployment in the field using a special tamper-resistant hardware register in the device, to enable, disable or update the keys or secrets stored securely by the device.02-18-2010
20100042823Method, Apparatus, and Product for Providing a Scalable Trusted Platform Module in a Hypervisor Environment - A method, apparatus, and computer program product are described for implementing a trusted computing environment within a data processing system where the data processing system includes a single hardware trusted platform module (TPM). Multiple logical partitions are provided in the data processing system. A unique context is generated for each one of the logical partitions. When one of the logical partitions requires access to the hardware TPM, that partition's context is required to be stored in the hardware TPM. The hardware TPM includes a finite number of storage locations, called context slots, for storing contexts. Each context slot can store one partition's context. Each one of the partitions is associated with one of the limited number of context storage slots in the hardware TPM. At least one of the context slots is simultaneously associated with more than one of the logical partitions. Contexts are swapped into and out of the hardware TPM during runtime of the data processing system so that when ones of the partitions require access to the hardware TPM, their required contexts are currently stored in the hardware TPM.02-18-2010
20100042822METHOD FOR LOADING SYSTEM LOCKED PRE-INSTALLATION CERTIFICATION - A method is used for loading a System Locked Pre-installation (SLP) certification from a basic input output system (BIOS) of a computer. The BIOS includes a boot block section and a main section for initializing the hardware of the computer after executing the boot block section. The method includes determining if a set value in a predetermined address of the boot block section is equal to a preset value upon booting the computer; executing the main section of the BIOS directly and the SLP certification being disabled if matching, loading the SLP certification into a read only memory (ROM) of the computer and the SLP certification being enabled if not matching, and executing the main section of the BIOS.02-18-2010
20100042820SELF-RESTARTING NETWORK DEVICES - A method and apparatus for self-monitoring to identify an occurrence of a threshold and rebooting in response to the occurrence of the threshold is provided. In an embodiment, a data processing apparatus comprises one or more processors; logic coupled to the one or more processors and comprising one or more stored sequences of instructions which, when executed by one or more processors, cause the one or more processors to obtain a threshold associated with the apparatus; self-monitor the apparatus to identify an occurrence of the threshold; and self-reboot the apparatus responsive to the occurrence of the threshold.02-18-2010
20100042821Methods and systems for providing manufacturing mode detection and functionality in a UEFI BIOS - Methods and systems are described for managing manufacturing modes in a unified extensible firmware interface (UEFI) basic input output system (BIOS). The UEFI BIOS can include a PEI (pre-EFI) manufacturing mode driver, a PEI interface, PEI drivers, a DXE (driver execution environment) manufacturing mode driver, a DXE interface, DXE drivers, a SMM (system management mode) manufacturing mode driver, a SMM interface, and SMM drivers. Manufacturing mode data is stored and accessed through a PEI manufacturing mode driver, a DXE manufacturing mode driver, or a SMM manufacturing mode driver, and/or any combination thereof. The PEI interface is used to communicate manufacturing mode data between PEI drivers and the PEI manufacturing mode driver. The DXE interface is used to communicate manufacturing mode data between DXE drivers and the DXE manufacturing mode driver. And the SMM interface is used to communicate manufacturing mode data between SMM drivers and the SMM manufacturing mode driver.02-18-2010
20090158027ELECTRONIC DEVICE HAVING AN ALTERABLE CONFIGURATION AND METHODS OF MANUFACTURING AND CONFIGURING THE SAME - An electronic device having an alterable configuration includes a non-volatile memory configurable to include at least a first partition and a second partition, the non-volatile memory storing a boot ROM. The boot ROM is operable when executed by a processor of said electronic device to, in the event that a third partition is available, boot an operating system in the third partition, the operating system operable when booted to cause the third partition to be deleted and the second partition to be expanded to encompass memory freed by the deletion; and otherwise boot an operating system in the first partition.06-18-2009
20090158026METHOD AND DEVICE FOR SECURELY CONFIGURING A TERMINAL BY MEANS OF A STARTUP DATA STORAGE DEVICE - Method of configuring a terminal (06-18-2009
20090158024DUAL BIOS CIRCUIT - A dual BIOS circuit includes a first BIOS chip, a second BIOS chip, and a transistor. The first and the second BIOS chip include a setup program configured for setting the voltage of a GPIO pin of a Southbridge chip. The first and the second BIOS chip are connected to the Southbridge chip. The gate of the transistor is connected to the GPIO pin of the Southbridge chip. The drain of the transistor is connected to a power supply via a resistor, and connected to a detecting pin of the Southbridge chip. The source of the transistor is grounded. The power supply is connected to a signal pin of the Southbridge chip. The first or second BIOS chip is selected to operate according to the voltage level at the detecting pin of the Southbridge chip.06-18-2009
20090158023ADAPTIVE SYSTEM BOOT ACCELERATOR FOR COMPUTING SYSTEMS - An acceleration mechanism for boot-up processing in a computing system is provided. The acceleration mechanism relies on recording most, if not all, of the read transactions, associated with requests and retrievals made during a boot-up and, in some aspects most, if not all, of the write transactions, associated with requests and stores made during a shutdown process. Prior to executing the boot-up process, data associated with the transactions is pre-fetched based on the recorded information and used to make the requests or information retrievals during the ensuing boot-up process. Additionally, since the mechanism of the present innovation provides for continual recording and the transaction data, the acceleration of the boot-up process can be adaptive even if hardware additions/changes or any other changes that affect the boot-up or shutdown process occur.06-18-2009
20090158021METHODS OF USING BIOS INFORMATION WHEN BOOTING INFORMATION HANDLING SYSTEMS AND MACHINE-EXECUTABLE CODE FOR CARRYING OUT THE METHODS - A method of using BIOS information can include exporting first BIOS information from a first information handling system. The method can further include initiating a boot sequence for the second information handling system and importing second BIOS information into a second information handling system after initiating the boot sequence and before initiating an operating system, wherein the second BIOS information is associated with the first BIOS information. The method can further include initiating an operating system of the second information handling system after importing the second BIOS information. The first and second BIOS information may be the same, or the second BIOS information may be derived from the first BIOS information. The first and second information handling systems may be the same or different. In one embodiment, the first BIOS information can be translated into a text file for editing before using the second BIOS information during a boot sequence.06-18-2009
20090158020System Backup And Recovery Solution Based On BIOS - A system performs system initialization for a computing device, comprising a module to back up one or more files of the computing device in response to a backup request and to restore one or more files of the computing device in response to a recovery request; and a point managing module to set up a backup point that comprises information based on the backup request and locate one or more backup points for the restoration operation.06-18-2009
20100332815PERIPHERAL CONTROL MODULE, COMPUTER SYSTEM, AND OPERATION METHOD THEREOF - This invention provides a peripheral control module, a computer system, and an operation method thereof. The peripheral control module is for a computer system. The computer system includes a power switch capable of outputting a power signal. The peripheral control module includes a control unit and a control circuit. The control unit has a program code for controlling a peripheral module. The control circuit is coupled with the power switch and the control unit for receiving the power signal and outputting a switching signal to the control unit, and the control circuit resets the program code to an initial state before the control unit receives the switching signal. This invention further provides a computer system using the peripheral control module and an operation method thereof.12-30-2010
20100106957PROGRAMMING AND CONFIGURATION IN A HEATING, VENTILATION AND AIR CONDITIONING NETWORK - Various embodiments of systems and methods of creating a memory of an HVAC device. A bootloader code is stored into a first protected memory of the HVAC device. A device designator is stored into a second protected memory of the HVAC device. A control serial number is stored into a third protected memory of the HVAC device. A control part number is stored into a fourth protected memory of the HVAC device. An application data is stored into a separate application memory of the HVAC device.04-29-2010
20100106956BIOS SWITCHING SYSTEM AND A METHOD THEREOF - A BIOS switching system applicable to a computer system is provided. The BIOS switching system includes an input module and a memory module, and the memory module further includes a plurality of BIOS's, an option recording block, and a boot-up management block. The input module produces a switching signal according to a user input. The boot-up management block determines whether replacing an execution option block's data in the option recording block is necessary or not based on the switching signal. The data of the execution option block is identification data of one of the BIOS's. The boot-up management block executes the BIOS indicated by the data of the execution option block while the computer system boots up.04-29-2010
20100106955METHODS AND SYSTEMS FOR RECOVERING A COMPUTER SYSTEM USING A STORAGE AREA NETWORK - Methods and systems for recovering and booting a computer system using a SAN. The computer system comprises a local storage device. A request for writing data to a boot volume on the local storage device is received. The data is written to the local storage device, as well as to the SAN at substantially the same time as receiving the request. The computer system can then be booted using the data written to the SAN.04-29-2010
20100106954Multi-Layer Content Protecting Microcontroller - The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a real-time cipher, and a user programmable multi-layer access control system for internal memory realized by programmable nonvolatile memory. Programmable nonvolatile memory allows in-system and in-application programming for the end user. The programmable nonvolatile memory is mainly used for program code and operating parameter storage. The multiple-layer access control is an integral part of the CPU, providing confidentiality protection to embedded digital content by controlling reading, writing, and/or execution of a code segment according to a set of user-programmed parameters. The cipher incorporates a set of cryptographic rules for data encryption and decryption with row and column manipulation for data storage. All cryptographic operations are executed in parallel with CPU run time without incurring additional latency and delay for system operation.04-29-2010
20100106953METHOD FOR PATCHING ROM BOOT CODE - The present invention relates to a method for patching a boot code stored on ROM comprising the steps of (a) storing at least one patching command for said boot code in a PROM; (b) loading said boot code from said ROM to a memory; (c) reading said at least one patching command from said PROM; (d) patching at least one command of said boot code residing in said memory with said at least one patching command from said PROM; and (e) executing the patched boot code.04-29-2010
20090172378METHOD AND SYSTEM FOR USING A TRUSTED DISK DRIVE AND ALTERNATE MASTER BOOT RECORD FOR INTEGRITY SERVICES DURING THE BOOT OF A COMPUTING PLATFORM - A trusted hard disk drive (“THDD”) contains cryptographic primitives and support functions in a trusted partition (“TP”). In particular, a master boot record (“MBR”) of the THDD is replaced with an alternative MBR and the normal MBR is stored elsewhere on the THDD. The program(s) loaded from the alternative MBR performs measurements of the TP. The TP, in turn, performs all necessary measurements of the MBR, a personal computer platform's OS, and the OS-present applications, including a platform trust service (“PTS”) kernel. The program(s) also performs functions to clear the PC platform's state such that any events that occurred prior to its execution do not alter the functionality of the OS-present applications. This may include clearing the PC's microprocessor, system memory and cache, for example. DRTM types of system resets may also be performed after the PC's OS has booted to force system clears without requiring OS or VMM infrastructure.07-02-2009
20120185685DATA PROCESSING APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM - Disclosed is a data processing apparatus providing a predetermined function by executing a program for the data processing apparatus, including a first storage unit that stores encoded execution starting data for starting execution of the program; a first decode key storage unit that stores a first decode key capable of decoding the encoded execution starting data; a start up unit that obtains the first decode key from the first decode key storage unit when turning on the power is accepted and decodes the encoded execution starting data by the first decode key to start executing the program; and an authentication confirmation unit that sends a request for authentication to an external apparatus after the start up unit starts executing the program and starts providing the predetermined function when obtaining an authentication result indicating the apparatus is authenticated from the external apparatus.07-19-2012
20120185684BOOTING A MOBILE ELECTRONIC DEVICE WITH A LOW BATTERY BASED ON A DYNAMIC BOOT THRESHOLD - A method, an apparatus, and a computer program product for booting the apparatus with a low-energy battery are provided. In a first configuration, the apparatus monitors a level of the battery while the battery is charging. The apparatus attempts a boot of the apparatus when the level is greater than or equal to a dynamic boot threshold. The apparatus increases the dynamic boot threshold when the boot is unsuccessful and repeating the monitoring and the attempting based on the increased dynamic boot threshold. In a second configuration, the apparatus detects a connection to an external power source. The apparatus attempts a boot using an FLCB protocol that is based upon power drawn directly from the external power source upon detecting the connection to the external power source. The apparatus attempts the boot as part of an ATC protocol when the boot using the FLCB protocol is unsuccessful.07-19-2012
20090125709System And Method For A Remote Information Handling System Boot - In an information handling system (IHS), providing an IHS boot includes forcing the IHS to power on or reboot, retrieving a virtual serial peripheral interface (SPI) boot image using a virtual SPI bus, booting the IHS to the virtual SPI boot image, turning off the virtual SPI boot image, and updating a real SPI boot image.05-14-2009
20090125710METHOD AND APPARATUS FOR BOOTING HOST - Provided are a method and a device for booting a host embodying a downloadable conditional access system (DCAS), wherein one of a plurality of pre-determined booting modes is decided as a booting mode of the host based on first information indicating whether a host can communicate with a broadcasting service provider and second information indicating whether a software-based security client providing information required for decrypting broadcasting data is installed to a hardware-based security module connected to the host, and the host is booted in the decided booting mode.05-14-2009
20090307481APPARATUS AND METHOD FOR BOOTING A SYSTEM - A method and apparatus for booting a system are provided. The apparatus may comprise a boot block and a baseboard management controller coupled together in the system. The baseboard management controller may be configured to receive a request from the boot block for a basic input/output system image; determine at least one location to access the basic input/output system image; and obtain the basic input/output system image from the at least one location.12-10-2009
20130046966Preloader - This disclosure describes techniques and/or apparatuses for reducing the total time used to boot up a computer and load applications onto the computer.02-21-2013
20100095105SYSTEM AND METHOD FOR DETERMINING AN OPTIMUM NUMBER OF REMOTELY-BOOTED INFORMATION HANDLING SYSTEMS - Systems and methods for reducing problems and disadvantages associate with remotely booting multiple information handling systems are disclosed. A method may include obtaining system-specific parameters regarding a system including a plurality of remotely-booted clients, the system-specific parameters including a average client boot time threshold. The method may also include generating a plurality of client boot threads based on at least one or more of the system-specific parameters. The method may additionally include measuring an actual average client boot time of the plurality of client boot threads. The method may further include determining a number of remotely-booted clients for substantially simultaneous remote booting based on at least the actual average client boot time and the average client boot time threshold.04-15-2010
20090044002COMPUTER SYSTEM AND BOOTING METHOD THEREOF - A computer system, including a data storage unit which stores first operating system data of the computer system therein; a main memory to which the first operating system data is copied; a data transmission unit which transmits data between the data storage unit and the main memory; and a controller which performs a power-on self test (POST) of the computer system, and controls the data transmission unit to copy the first operating system data stored in the data storage unit to the main memory during the POST.02-12-2009
20090044001 METHOD OF POWERING UP A TERMINAL, MEMORY AND TERMINAL THEREOF - A method of powering up a portable terminal, which automatically executes a software program when powered on, the terminal having a manually operated power-up key, wherein the method comprises the step of: a) at the beginning, moving (in 02-12-2009
20110004747Initializing Femtocells - A femtocell may be initialized on a network by automatically contacting a network service provider. The access point then automatically downloads an initial configuration from a bootstrap server belonging to the network service provider. In some cases, a femtocell access point may automatically determine, after boot up, whether it was pre-provisioned with credentials to authenticate itself with the network service provider. If so, it may use a domain name service to obtain an address of a bootstrap server. Otherwise, it may use dynamic host configuration protocol to discover the bootstrap server's Internet Protocol address.01-06-2011
20090327679OS-MEDIATED LAUNCH OF OS-INDEPENDENT APPLICATION - A system, method, and computer readable medium for an operating system (OS) mediated launch of an OS dependent application is disclosed. An application running within an OS may operate outside an OS environment by constructing for example a capsule file, passing the capsule file to firmware interface, and restarting the system. The firmware interface may load various drivers and applications contained within the capsule file and execute them to perform a task. Upon completion of the task, the OS is booted again and the original application may resume control, making use of any information stored by the firmware interface in a dedicated status table or file. Other embodiments may be employed, and other embodiments are described and claimed.12-31-2009
20090307480ELECTRONIC EQUIPMENT, IMAGE FORMING APPARATUS, STARTING METHOD OF ELECTRONIC EQUIPMENT, AND COMPUTER PROGRAM PRODUCT - Each of a plurality of control units starts the control unit with one of a first start method and a second start. When a first control unit among the control units starts with a second start method, the first control unit instructs a second control unit among the control units to start with the second start method. Thus, all the control units are started with the same start method.12-10-2009
20090307479COMPUTER EXECUTION SYSTEM FOR STARTING PROGRAM QUICKLY AND METHOD THEREOF - A computer execution system and a method thereof for starting at least a program quickly after a computer is booted are provided. First, a file list is stored. The file list includes multiple file names of start files which are necessary when the program is started. When the computer is booted, the start files corresponding to the file names in the file list are retrieved from a low-speed storage device and stored in a high-speed storage device. Afterwards, when the program is started, it is executed by cooperating with the start files in the high-speed storage device. Thus, the program is started quickly. This not only saves a user's time in waiting, but also increases the working efficiency of the user.12-10-2009
20090307478PLATFORM BOOT WITH BRIDGE SUPPORT - A method for booting a processing device, the processing device comprising a first and a second processing unit, the method comprising: detecting by the first processing unit, whether at least one boot configuration parameter is accessible from a non-volatile storage medium of the processing device, the at least one configuration parameter being indicative of a boot interface; if said at least one configuration parameter is available, forwarding at least a part of the detected at least one configuration parameter by the first processing unit to the second processing unit; otherwise detecting by at least one of the first and second processing units whether a boot interface is available to the processing device; booting at least the second processing unit from the indicated or detected boot interface.12-10-2009
20090307476SYSTEM AND METHOD OF DELAYING POWER-UP OF AN INFORMATION HANDLING SYSTEM - A system and method of delaying power-up of an information handling system is disclosed. According to an aspect, a method of powering an information handling system can include detecting a delay power-up setting within a basic input output system (BIOS) of a particular information handling system using a management controller. The management controller can be configured to delay power-up of the particular information handling system. The method can further include enabling a power-up of the particular information handling system in response to the delay power-up setting using the management controller.12-10-2009
20090307475METHOD AND APPARATUS FOR PERFORMING MULTIPLE COMPUTER BOOTUPS IN MINIMAL MODE - A computer implemented process performs a plurality of computer bootups in minimal mode. Login authentication is disabled during the computer bootups. All startup programs and services not required to install new software are disabled during the computer bootups. New software is installed during the computer bootups. During the final computer bootup, the disabled startup programs and services are enabled to restore the computer to normal operating condition.12-10-2009
20090307474STORING A DEVICE MANAGEMENT ENCRYPTION KEY IN A NETWORK INTERFACE CONTROLLER - A device management system for securely storing an encryption key associated with a device management session. The device management system includes an encryption key generator to generate an encryption key, a client device to receive an encrypted bootstrap data file transmitted by a base station, and a network interface controller coupled to the client device, the network interface controller to store the encryption key separate from a system memory of the client device. Embodiments of the device management system ensure user credentials do not exist in the client device in plaintext form outside of the network interface controller, thus preventing software and/or malware executed on the host from extracting such credentials.12-10-2009
20090113196Method and systems for advanced reprogrammable boot codes and in-application programming of embedded microprocessor systems - This invention relates to an advanced system and method of reprogrammable boot codes and In Application Programming (IAP) of embedded systems by booting up with boot loader to shadow program codes on to an internal high speed SRAM and extending contiguously to external higher space memory for runtime applications, and supporting on-line IAP to update run-time firmware or boot loader driver through network communication by utilizing advanced address remapping scheme as well as supporting In System Programming (ISP) to program initial Flash memory via ISP adaptor.04-30-2009
20120191965BOOT SYSTEMS AND METHODS, AND RELATED DEVICES - Boot systems and methods are provided. The boot system includes an IO (Input/Output) chip, a memory device, and a BIOS (Basic Input/Output System). The memory device is coupled to the IO chip, and includes at least a rescue OS (Operating System). The BIOS reads the rescue OS from the memory device via the IO chip, and boots an electronic device based on the rescue OS.07-26-2012
20120191964METHODS OF BOOTING INFORMATION HANDLING SYSTEMS AND INFORMATION HANDLING SYSTEMS PERFORMING THE SAME - A method of booting an information handling system including a volatile memory device to be selectively tested during a booting operation, the method comprising a step of reading current system configuration information from the information handling system, a step of comparing the current system configuration information with corresponding prestored system configuration information in a nonvolatile memory device, and a step of selectively performing a test for the volatile memory device according to a result of the comparison.07-26-2012
20120191963BIOS Updating System, BIOS Updating Method, and Related Computer Program Product - A BIOS updating system enables a computer to perform a BIOS updating process on original BIOS data. The BIOS updating system includes: an operational module that stores updating information including BIOS updating data in a memory device when the computer runs in an operating system executing stage, sets update booting parameters, and re-boots the computer; and an updating module that executes a pre-processing process, before the execution of the BIOS updating process, when the re-booted computer runs in a POST stage, including: an inspecting unit that inspects whether the update booting parameters are set and generates update commands; and an executing unit that acquires from the memory device the BIOS updating data via the updating information according to the update commands, so as to replace the original BIOS data with the BIOS updating data, and further reboot or shut off the computer after the updating of the BIOS data.07-26-2012
20120191962SYSTEM AND METHOD FOR SIMULATING BIOS ROM OF COMPUTING DEVICE INTO VIRTUAL DISK - In a method for simulating a read only memory of a basic input/output system (BIOS ROM) of a computing device into a virtual disk, configuration information of the BIOS ROM is loaded into a disk booting sequence of the BIOS, and the BIOS ROM is set as a virtual disk that needs to be booted, when a POST program of the computing device is implemented. Free space of the BIOS ROM is obtained by scanning storage space of the BIOS ROM, and physical addresses of the free space are obtained in the BIOS ROM. The physical addresses are translated into LBA addresses. A virtual disk is created using the free space in the BIOS ROM according to the LBA addresses. Master boot record (MBR) of the computing device is read from a storage system of the computing device to bootstrap an operating system of the computing device through the virtual disk.07-26-2012
20120191961Computer System and Operating System Switching Method Thereof - An operating system switching method is provided. The operating system switching method is for a computer system comprising a control unit, a memory unit, and a storage unit, wherein the storage unit comprises a first operating system and a second operating system. The steps of the method include: loading the first operating system and the second operating system into a first memory space and a second memory space of the memory unit, respectively, and setting the first memory space and the second memory space to a working state and a standby state, respectively; and performing a first switching of the operating systems, and setting the first memory space and the second memory space to the standby state and the working state.07-26-2012
20120191960BOOTING COMPUTING DEVICES - Example embodiments disclosed herein relate to finding a boot loader on storage. A boot process for a computing device including storage including an extensible firmware interface aware operating system is started. The storage is searched for a boot loader associated with the extensible firmware interface aware operating system.07-26-2012
20110016303INFORMATION DEVICE, STORAGE MEDIUM AND INITIAL STATE RESTORATION METHOD - An information device has a storage medium storing information items which includes a first program provided on a first partition, a second program and data provided on a second partition to restore the first program on the first partition to a predetermined state, a boot block which causes system activation from one of the first partition and the second partition, and an active-partition switching program which indicates, to the boot block, one of the first and second partitions. An input/output system activates the active-partition switching program when a specific operation is performed. The active-partition switching program indicates to the boot block that system activation is to be executed from the second partition.01-20-2011
20080263348Dynamic asymmetric partitioning of program code memory in network connected devices - A novel asymmetric memory partitioning mechanism for providing resolving and reducing memory limitations when an increase in software image size is required. Two partitions are created in non-volatile memory, one smaller than the other. The smaller partition stores a degenerated version of the full-functionality software comprising only essential program code for booting the device and repeating the download and installation procedures until the full-functionality software image is successfully installed in non-volatile memory. The larger portion stores a full-functionality version of the software comprising both essential and non-essential program code. The mechanism also provides the capability of converting devices already deployed in the field. The legacy symmetrical partitioning of the memory in these devices is removed and replaced with asymmetrical partitioning, wherein the smaller partition stores the degenerated software image and the larger partition stores the full-functionality software image.10-23-2008
20130073839MEMORY DEVICE AND HOST DEVICE - According to one embodiment, a memory device includes a nonvolatile memory including a plurality of memory cells, and a controller configured to control the nonvolatile memory. At a time of a boot operation, when a request for initialization of the memory device is issued, the controller does not return a response to the request until completion of the initialization, and the controller returns a response to the request when the initialization is completed.03-21-2013
20130073841Method and System for Restoring System Configuration after Disorderly Shutdown - A restart controller for an information handling system includes a first latch and a second latch. An output of the second latch is coupled to an input of the first latch. The restart controller is configured to detect that the information handling system has been shut down responsive to a first disorderly shutdown, and in response to detecting the shut down, to set the first latch, initiate a first startup of the information handling system to enable a remote wake mechanism of a chipset of the information handling system, and determine, at the second latch, that a basic input/output system (BIOS) of the information handling system is operational. In response to determining that the BIOS is operational, The restart controller is further configured to initiate an orderly shutdown of the information handling system, and clear the first latch.03-21-2013
20130073840APPARATUS AND METHOD FOR GENERATING AND MANAGING AN ENCRYPTION KEY - A portable terminal, includes: a first hardware module to encrypt data using an encryption key; a communication module to receive the encryption key, wherein the communication module receives the encryption key if the portable terminal is in a secure mode. A method includes: entering a secure mode of the portable terminal; receiving an encryption key; forwarding the encryption key to a first hardware module, wherein the first hardware module encrypts data with the encryption key. An apparatus, includes: a booting unit to enter into a secure mode; a first hardware module to receive an encryption key to encrypt data; and a second hardware module to receive the encrypted data, and the second hardware module being disabled in the secure mode, wherein the first hardware module receives the encryption at a fixed location of the apparatus.03-21-2013
20110093693BINDING A CRYPTOGRAPHIC MODULE TO A PLATFORM - One embodiment is a computer system having firmware that shares a secret with a cryptographic co-processor to determine if the cryptographic co-processor has been tampered with or removed from the computer system.04-21-2011
20130061032EXTERNAL BOOT DEVICE, EXTERNAL BOOT METHOD, INFORMATION PROCESSING APPARATUS, AND NETWORK COMMUNICATION SYSTEM - An external boot device includes a storage unit (03-07-2013
20130061031SYSTEM AND METHOD FOR BIOS AND CONTROLLER COMMUNICATION - A system and method for BIOS and controller communication is provided herein. The system may include an information handling system that includes a central processing unit coupled to a memory. The memory may contain a basic input/output system (BIOS). The information handling systems may also include a controller coupled to a nonvolatile memory and a register coupled to the central processing unit and the controller. The controller may be operable to store a key in the nonvolatile memory; write the key to the register in response to a signal from the BIOS; receive a command from the BIOS; verify the command is from the BIOS using the key; and execute the command if the command is from the BIOS.03-07-2013
20130061030SYSTEM CAPABLE OF BOOTING THROUGH A UNIVERSAL SERIAL BUS DEVICE AND METHOD THEREOF - A system capable of booting through a Universal Serial Bus device includes a Universal Serial Bus port, an embedded controller, a platform control hub, and a basic input/output system. The embedded controller is used for generating a boot signal when the system is powered off and at least one Universal Serial Bus device is plugged into the Universal Serial Bus port. The platform control hub is restored according to the boot signal. The basic input/output system has boot sequence setting values. The basic input/output system first starts to boot the at least one Universal Serial Bus device through the platform control hub according to the boot sequence setting values when the basic input/output system is restored according to the boot signal.03-07-2013
20130061029METHOD AND APPARATUS FOR CONSOLIDATING BOOT DRIVES AND IMPROVING RELIABILITY/AVAILABILITY/SERVICEABILITY IN HIGH DENSITY SERVER ENVIRONMENTS - The present invention is directed to a boot appliance for a data storage system. The boot appliance is a self-contained, pre-configured device that serves as a boot device for multiple servers. The boot appliance contains multiple hard drives which are configured into one or more RAID volumes. Each volume is divided into multiple partitions, with each partition serving as the boot drive for any server connected to it. The boot appliance provides its own environmental controls and Ethernet connection which may be used for providing alerts regarding the health of the components of the boot appliance and/or data storage system to a monitoring system, such as a network management system. The boot appliance may provide a boot drive and operating system image to multiple servers at the same time.03-07-2013
20090271606INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING SYSTEM - According to one embodiment, an information processing device includes an acquisition module configured to get information for executing an authentication process and information on power-on security policy, from a server connected to a network during power-on, a storage module configured to store the information on power-on security policy in a storage device, an authentication module configured to execute the authentication process by using the information for executing the authentication process, a boot module for executing a process of booting an operating system, when the authentication process has succeeded, and a power-on security policy execution module configured to execute a process which is based on a power-on security policy stored in the storage device, when the information for executing the authentication process and the information on power-on security policy cannot be got.10-29-2009
20090271605METHOD AND APPARATUS FOR RESTORING SYSTEM USING VIRTUALIZATION - A method and apparatus to restore a system using virtualization, the method including: if a system restoration at a target restoration time point from among at least one restoration time points is requested, generating a virtualization layer; if a use of a system is requested by an application layer, accessing the target restoration time point using the virtualization layer; and performing a system restoration at the accessed target restoration time point.10-29-2009
20090271604APPARATUS AND METHOD TO DRIVE DEVICES - A device driving apparatus includes a storage unit to store a plurality of device driving programs, a plurality of devices to receive the plurality of device driving programs, and a switching unit to transfer the plurality of device driving programs.10-29-2009
20090271603EMBEDDED SYSTEM AND STARTUP METHOD THEREOF - An embedded system includes a controller and a memory. The memory includes a primary firmware module, a backup firmware module, and a boot loader module. The primary firmware module has a primary firmware id_address. The backup firmware module has a backup firmware id_address. The boot loader module has a boot loader id_address. The controller is capable of activating the boot loader module to check status of the primary firmware module via the primary firmware id_address. Upon the condition that status of the primary firmware module is ok, the controller is capable of activating the primary firmware module. Upon the condition that status of the primary firmware module is not ok, the controller is capable of activating the backup firmware module via the backup firmware id_address.10-29-2009
20090271602Method for Recovering Data Processing System Failures - A method for recovering from software and/or hardware failures occurred in a data processing system is disclosed. A current version of boot code and an updated version of boot code are stored in a first memory region and a second memory region, respectively, of a non-volatile memory of the data processing system. The updated version of boot code is periodically replaced by a latest version of boot code downloaded from a support center. After an occurrence of a system crash, a determination is made if the system crash was caused by a known problem that can be remedied by the updated version of boot code. If so, the data processing system is rebooted using the updated version of boot code. Otherwise, data related to the system crash is collected, and the data processing system is rebooted using the current version of boot code.10-29-2009
20090271601METHOD, DEVICE, AND SYSTEM FOR PRE-MEMORY SYMMETRIC MULTIPROCESSING FLOW - A cache-as-RAM (CAR) system of a multi-processor system that includes a plurality of processors may be initialized. The CAR system may assign a physical data address range for each of the plurality of processors such that the physical data address ranges allocated to all of the plurality of processors overlap with each other. A boot code stream may be executed with the CAR appearing to the executing boot stream as a memory store for executing the boot code stream. Other embodiments are described and claimed.10-29-2009
20090271600METHOD OF USING AN INFORMATION HANDLING SYSTEM HAVING A BOOT FILE, AND AN INFORMATION HANDLING SYSTEM AND MACHINE-EXECUTABLE CODE FOR CARRYING OUT THE METHOD - An information handling system and a method of using it can allow the information handling system to be started or restarted and have an operating system loaded, even if a boot variable within a persistent memory is currently invalid. The method can detect and determine a hardware path name to a new drive that has an operating system. The new drive can have a relative path name to boot entries that include a pointer to a boot file. The boot file can be executed to run a boot loader that loads the operating system. During loading of the operating system, other boot entries within the drive can provide boot parameters. The boot variable within persistent memory, and potentially the relative path name or boot parameter(s) can be updated on the new drive. In a particular embodiment, the information handling system can include a unified extensible firmware interface (UEFI).10-29-2009
20090077367MANAGING REBOOT OPERATIONS - The disclosure provides a mechanism which is activated when a user opts to hibernate their computer (at the end of the day) rather than switching it off. In particular, on receipt of a hibernate request, an embodiment provides a mechanism for determining whether (as a result of, for example, a distribution or installation of software to a computer) there are any outstanding reboot operations for the computer.03-19-2009
20090070576SYSTEM AND METHOD FOR PROVIDING A SECURE COMPUTING ENVIRONMENT - A system and method for providing a secure computing environment to untrusted computer systems is described. A carrier media and an interface are provided, the interface being connectable to a computer to enable communication between the computer and the carrier media. The carrier media encodes a secure computing environment and a boot system, upon connection of the system via the interface to a computer system and booting of the computer system, the boot system is operative to take over the boot process of the computer system and to authenticate the user, wherein upon successful authentication, the boot system is arranged to load the secure computing environment on the computer system, the secure computing environment being configured to prevent predetermined interaction from outside the secure computing environment when it is running.03-12-2009
20090063837User influenced loading sequence - There is provided a method for altering a sequence in which programs and content are loaded upon startup of an electronic device. A user may change the loading sequence by selecting a program or content before the loading sequence has finished. In addition, the altered loading sequence may be saved and utilized when the electronic device is powered on again. There is also provided a tangible, machine-readable medium for performing the described method. Finally, there is provided an electronic device having a memory device for storing a loading program that defines a loading sequence, a processor for loading programs and content based on the loading sequence, and a user interface for delivering user input to the loading program to alter the loading sequence.03-05-2009
20120226897COMPUTER SYSTEM WITH DUAL BIOS - A computer system including a first memory unit, a second memory unit and a switch unit is provided. The first memory unit stores a first BIOS. The second memory unit stores a second BIOS. The switch unit has a first configuration and a second configuration. Upon the computer system being started, the switch unit receives an enable signal. When the switch unit is in the first configuration, the enable signal is provided to the first memory unit to start the first basic input/output system. When the switch unit is in the second configuration, the enable signal is provided to the second memory unit to start the second basic input/output system.09-06-2012
20120226896NETWORK STORAGE TARGET BOOT AND NETWORK CONNECTIVITY THROUGH A COMMON NETWORK DEVICE - The present disclosure includes systems and techniques relating to booting to a network storage target. In general, in one implementation, a bus-to-network device driver is loaded during a machine boot, where the bus-to-network device driver is capable of sending machine bus commands over a network, providing access to the network for a network device driver, and distinguishing between received responses to the machine bus commands and other network traffic corresponding to the network device driver. Loading of the bus-to-network device driver can occur in response to an operating system load of bus drivers. For example, the bus-to-network device driver can be an iSCSI driver, and the operating system load of bus drivers can be the operating system load of SCSI drivers.09-06-2012
20120226895PROTECTING OPERATING SYSTEM CONFIGURATION VALUES - In a pre-operating system environment on a device prior to loading and running an operating system on the device, a policy identifying configuration settings for the operating system is obtained. The operating system itself is prevented from changing this policy, but the policy can be changed under certain circumstances by components of the pre-operating system environment. The policy is compared to configuration values used by the operating system, and the operating system is allowed to boot with the configuration values if the configuration values satisfy the policy. However, if the configuration values do not satisfy the policy, then a responsive action is taken.09-06-2012
20130067210SYSTEM AND METHOD FOR RECOVERING FROM AN INTERRUPTED ENCRYPTION AND DECRYPTION OPERATION PERFORMED ON A VOLUME - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.03-14-2013
20130067209BOOTING DEVICES VIA THE CLOUD - Methods, systems, and computer program products are provided for automatically installing an operating system on a computing device that does not have an operating system pre-installed. Identifying information for the computing device is collected from a resource of the computing device. The identifying information is transmitted to a remote service. An indication is received of an operating system for the computing device selected by the remote service based on the identifying information. The selected operating system is downloaded for installation on the computing device.03-14-2013
20120117370HARDWARE DIAGNOSTICS AND SOFTWARE RECOVERY ON HEADLESS SERVER APPLIANCES - Described is a headless server appliance configured with a secondary actuation mechanism that when actuated, enters the headless server appliance into a diagnostic mode. For example, the diagnostic mode may correspond to a secondary operating system booted from a BIOS component activated by the secondary actuation mechanism. In the diagnostic mode, primitives may be communicated between a client device coupled (e.g., via a network or USB connection) to the headless server appliance, such as to provide the client device with access to the headless server appliance's hard disk. Other primitives, such as communicated via APIs, may provide the client device with access to the BIOS. The secondary operating system and/or client device may perform diagnostics and recovery operations on the headless server appliance. For example, the client device or similar source may restore or update the primary operating system image to a storage medium of the headless server appliance.05-10-2012
20120117369PLATFORM BOOT WITH BRIDGE SUPPORT - A method for booting a processing device, the processing device comprising a first and a second processing unit, the method comprising: detecting by the first processing unit, whether at least one boot configuration parameter is accessible from a non-volatile storage medium of the processing device, the at least one configuration parameter being indicative of a boot interface; if said at least one configuration parameter is available, forwarding at least a part of the detected at least one configuration parameter by the first processing unit to the second processing unit; otherwise detecting by at least one of the first and second processing units whether a boot interface is available to the processing device; booting at least the second processing unit from the indicated or detected boot interface.05-10-2012
20120117368Method for Rapidly Booting Up a Computer System - A method for booting up a computer is disclosed. Initially, a memory image of a boot program is stored in a main memory of a computer. The memory image includes a first initialization code and a second initialization code. During the booting process of the computer, first initialization code is executed. In response to the completion of the execution of the first initialization code, the boot program is shifted to an idle state. In response to an activation event, the second initialization code is executed.05-10-2012
20120117367ELECTRONIC APPARATUS AND BOOTING METHOD THEREOF - An electronic apparatus and a booting method thereof are provided. First boot partition information of the electronic apparatus recorded at previous booting is obtained. Second boot partition information at current booting is obtained. Next, the first boot partition information and the second boot partition information are compared, so as to update the first boot partition information with a changed entry. Thereafter, a boot order is decided according to the updated first boot partition information.05-10-2012
20120117366METHOD FOR CONTROLLING MULTI-PORT NETWORK INTERFACE CARD - A method for controlling a multi-port Network Interface Card (NIC) is provided. In a computer using the multi-port NIC with a plurality of NIC ports, a plurality of control options is set into a Basic Input/Output System (BIOS) setup menu, so that a user individually controls the NIC ports. Furthermore, due to the characteristic that after a reference code process in the BIOS restarts a system, the set of hardware becomes effective, an action of controlling the NIC ports is set before a reference code process restarts the system.05-10-2012
20120117364Method and System for Operating a Handheld Calculator - A method for operating a handheld calculator having a controllable power domain is provided. The method includes receiving, by the handheld calculator, a signal to power down the handheld calculator, storing context information of at least one component in the controllable domain in an external memory, setting a boot indicator to indicate a quick boot on power up, and removing power from the controllable power domain.05-10-2012
20110022830Boot Block - A machine including a processor, a boot block including an immutable segment and a mutable segment, one or more BIOS images stored on the mutable segment of the boot block, and a BIOS manager executed by the processor from the immutable segment of the boot block and configured to determine whether a BIOS of the machine is valid and launch a BIOS replacement process when the BIOS is invalid.01-27-2011
20110022829FLASH STORAGE SYSTEM AND METHOD FOR ACCESSING A BOOT PROGRAM - A computing system includes a flash storage device that loads a boot program from a flash storage of the flash storage device to a random access memory of the flash storage device. A processor of the computing system then accesses the boot program from the random access memory and executes the boot program.01-27-2011
20110022828NON-DISRUPTIVE METHODS FOR UPDATING A CONTROLLER OF A STORAGE SYSTEM - A non-disruptive method for updating firmware in a first controller 01-27-2011
20120198223AUTOMATIC RETRIEVAL, PARSING AND APPLICATION OF CONFIGURATION FOR A SPECIFIC-PURPOSE CLIENT HAVING A WINDOWS-BASED EMBEDDED IMAGE WITH A WRITE-FILTER - Examples of methods and apparatus are provided for automatic retrieval, parsing and application of configuration for a specific-purpose local client having a windows-based embedded image with a write-filter while obviating reinstallation of an entire windows-based embedded image onto the local client and while allowing persistent configuration change across a reboot. The apparatus may include a retrieval module of the local client configured to, each time the local client boots up, automatically locate a remote repository server containing a configuration file and automatically obtain the configuration file from the repository server over a network. The apparatus may include an apply settings module of the local client configured to, each time the local client boots up, automatically load the configuration file, automatically parse at least a portion of the configuration file, and automatically apply, to the embedded image, a configuration change based on the at least a portion of the configuration file.08-02-2012
20090254741HOST PERIPHERAL SYSTEM AND METHOD FOR LOADING AN EXTERNAL PROGRAM CODE TO A HOST FOR SETTING UP A TRANSMISSION MECHANISM WHEN BOOTING - When booting a host, a host peripheral system sends a boot code to the host for controlling the booting operation of the host via a serial transmission line, and loads an external program code into the host. After setting up a transmission mechanism through executing the external program code, the host can forward a write command to the host peripheral system for writing the data provided by the external program code to the command identification sector of the non-volatile memory of the host peripheral system, and the host peripheral system is capable of identifying the data as a command and executes functional operations corresponding to the command. After finishing the functional operations, the host peripheral system forwards a finish signal to the host, and the host is able to send a read command for fetching the data signal generated in the functional operations.10-08-2009
20090013169Method And System For Migrating Information Between Information Handling Systems - A system for migrating information includes a first information handling system (IHS). The first IHS is for, in response to a first boot event, booting from a computer readable medium, bypassing the first IHS user authentication requirement, and establishing a connection between the first IHS and a second IHS. The system for migrating information also includes the second IHS, coupled to the first IHS. The second IHS is for, in response to a second boot event, booting from a storage device of the second IHS, establishing the connection between the first IHS and the second IHS, and migrating information from the first IHS to the second IHS.01-08-2009
20090013168SYSTEMS AND METHODS FOR AUTOMATIC PROVISIONING OF STORAGE AND OPERATING SYSTEM INSTALLATION - A method for provisioning a blade server is provided. The method includes creating a server boot image for a blade server, where the boot image includes an operating system image created from a donor server. Then, the method includes inserting the blade server into a chassis of an enclosure that is capable of receiving multiple blade servers. Then, staring the blade server from a pre-boot execution environment (PXE). The PXE loading an image that prompts a user to install a new operating system from a pre-existing target computer of the enclosure. The method then installs the new operating system. The installing includes creation of a new iSCSI target for the inserted blade server, and partitioning of the iSCSI target. The also includes restarting the inserted blade server. The restarting is configured to boot using the iSCSI target of the inserted blade server, so that the inserted blade server becomes a provisioned blade server. The provisioning is accomplished without a hardware iSCSI initiator for an iSCSI boot.01-08-2009
20090013167COMPUTER DEVICE, METHOD FOR BOOTING THE SAME, AND BOOTING MODULE FOR THE SAME - A method for booting a computer device can be applied to a basic input/output system (BIOS). Whether backup data of a master boot record (MBR) is stored in the BIOS is first determined. When the backup data of the MBR is not stored in the BIOS, actual data of the MBR is backed up to the BIOS; when the backup data of the MBR is stored in the BIOS, the actual data of the MBR is compared with the backup data of the MBR. Then the backup data is restored to MBR when the actual data is different from the backup data.01-08-2009
20090013165PORTABLE USB DEVICE THAT BOOTS A COMPUTER AS A SERVER - Techniques for booting a host computer from a portable storage device with customized settings have been described herein. According to one embodiment, in response to detecting a portable storage device inserted into a first host computer having a first operating environment provided by a first operating system (OS) installed in the first host computer, rebooting the first host computer into a second operating environment using a second OS image stored in the portable device. In addition, a personal configuration file stored in the portable device is extracted to configure the second operating environment of the first host computer, such that the user of the portable storage device can operate the second host computer in view of the personal working environment. Other methods and apparatuses are also described.01-08-2009
20090013166ROM BIOS BASED TRUSTED ENCRYPTED OPERATING SYSTEM - There is disclosed a device, system, and method for a ROM BIOS based trusted encrypted operating system for use in a gaming environment. The gaming device includes a ROM storing a BIOS, a secure loader, an encrypted operating system, and a decryption key for decrypting the encrypted operating system. The decryption key is partitioned and scattered about the secure loader. The method includes initializing the BIOS, locating the decryption key, decrypting the encrypted operating system with the encryption key, verifying a plurality of check codes, and transferring control to the operating system. The check codes are verified responsive to decrypting the encrypted operating system. The check codes are dispersed about the operating system and are unrelated to the operating system. Control is transferred to the operating system responsive to verifying the check codes.01-08-2009
20090006835ELECTRONIC DEVICE AND CONTROL METHOD THEREOF - An electronic device is disclosed. The electronic device includes a storage unit in which execution codes including a boot code and an application code are stored, a main memory in which the boot code is loaded, a CPU which performs booting by executing the boot code loaded in the main memory, and executes the application code; and a controller which reads the boot code of the execution codes, loads the boot code to the main memory, and controls the CPU to perform booting if it is determined that the boot code is completely loaded.01-01-2009
20090006834PROXIED FIRMWARE UPDATES - The subject mater herein relates to computing systems and, more particularly, to proxied firmware updates. Some embodiments provide one or more of systems, methods, software, and firmware that, upon receiving a source of power, initialize an out-of-band controller that, may initialize a network interface to facilitate communication by the out-of-band controller with network resources and receive a firmware update payload from a remote network source over the network interface. These, and other embodiments may also include powering on a computing system including a BIOS and initializing at least a portion of the BIOS. If the computing system supports proxied firmware updates and a firmware update exists in a memory, such embodiments retrieve the payload and launching the payload to implement the firmware update.01-01-2009
20090006833IMAGE FORMING APPARATUS - An image forming apparatus includes: a hardware resource used in image formation; and a storage unit storing a program for processing the image formation; and a controller that is operable to: accepting rebooting commands for rebooting the hardware resource and the program; monitoring a state of the hardware resource and a state of the program and detecting whether or not at least one of the hardware resource and the program is in automatic adjustment processing; and rebooting the hardware resource and the program according to the rebooting commands after completion of the automatic adjustment processing, when the rebooting commands are accepted in a state that the hardware resource or the program is in the automatic adjustment processing.01-01-2009
20130166896MANAGEMENT SYSTEM FOR NETWORK CARD - A management system for controlling a communication between a baseboard management controller (BMC) and a basic input/output system (BIOS) coupled to a platform controller hub (PCH), includes a network chip coupled to the BMC, a switch unit configured to control connection between the BIOS and the BMC, and a control unit to output a first control signal or a second control signal to the switch unit. When the control unit outputs the first control signal to the switch unit, the switch unit enables the communication between the BIOS and the network chip. When the control unit outputs the second control signal to the switch unit, the switch unit disables the communication between the BIOS and the network chip.06-27-2013
20130166897ELECTRONIC DEVICE SYSTEM AND ELECTRONIC DEVICE - An electronic device system includes a connection device configured to store a plurality of types of boot data and an electronic device, wherein the electronic device includes a connection unit to which the connection device is connected, a selection unit configured to select boot data to be obtained from the connection device connected to the connection unit, an obtaining unit configured to obtain the boot data selected by the selection unit from the connection device, a storage unit configured to store the boot data obtained by the obtaining unit; and a boot processing unit configured to perform processing in relation to booting of the electronic device by using the boot data stored in the storage unit.06-27-2013
20130166893AUXILIARY CARD INITIALIZATION ROUTINE - A memory system or flash card may be initialized from a protected block of flash memory as a backup process. If there is an error during regular card initialization and the firmware for the card cannot be loaded, the card may be inaccessible to a user. Booting with a protected block of memory may be used to load a different version of the firmware that can still initialize the card despite the error from loading the other firmware.06-27-2013
20130166894COMPUTER SYSTEM AND DETECTING-ALARMING METHOD THEREOF - A computer system and a detecting-alarming method thereof are provided. The computer system includes a device and a basic input/output system (BIOS) unit. The BIOS unit has a current device table. The BIOS unit detects the device of the computer system to obtain a detecting result in a start procedure, and compares the detecting result with the current device table. If the detecting result does not match the current device table, the BIOS unit gives an alarm.06-27-2013
20130166895ELECTRONIC DEVICE AND METHOD FOR SETTING BOOT PARAMETERS - A method for setting boot parameters includes: controlling a display to display an input box when detecting a boot setting signal in response to user operation; receiving boot parameters input by the user from the input box; converting the boot parameters input by the user to corresponding ASCII codes, combining the ASCII codes with an identifier identifying the boot parameter to form a data segment, and storing the data segment into the CMOS RAM; reading the ASCII codes from the CMOS RAM when detecting the identifier; setting the boot parameters according to the ASCII codes, and storing the set boot parameters into the BIOS memory.06-27-2013
20080307215REMOTE COMPUTER OPERATING SYSTEM UPGRADE - Methods of upgrading a kernel image of a remote computer are described. The method comprises, during a first connection between an update computer and a remote computer, storing a kernel version identifier of the active kernel image of the remote computer; storing active boot partition information comprising the active kernel boot partition of the remote computer; setting the active boot partition of the remote computer as a safe boot partition; storing a second kernel image at the remote computer, wherein the second kernel image comprises a second kernel version identifier; setting the remote computer to boot from the second kernel image; rebooting the remote computer; and, during a second connection between the update computer and the remote computer, marking the second kernel image as a safe kernel image if the active kernel version is the same as the second kernel version identifier.12-11-2008
20080294889Method and apparatus to store initialization and configuration information - Briefly, in accordance with an embodiment of the invention, an apparatus and method to store initialization and configuration information is provided. The method may include storing basic input/output system (BIOS) software in a polymer memory. The method may further include copying a first portion of the BIOS software from the polymer memory to a random access memory (RAM) buffer of a memory controller, wherein the RAM buffer has a storage capacity of at least about two kilobytes (KB).11-27-2008
20080294888DEPLOY TARGET COMPUTER, DEPLOYMENT SYSTEM AND DEPLOYING METHOD - A deploy target computer is connected to a storage device including a replication source logical disk used to store a boot disk image. A disk mapping processing part in the deploy target computer changes over access destination so as to set the access destination to the replication source logical disk in the storage device when an I/O request is issued from the deploy target computer to the storage device and the I/O request specifies reading the boot disk image, and so as to set the access destination to a replication destination logical disk for conducting writing concerning the boot disk image when the I/O request specifies writing concerning the boot disk image.11-27-2008
20080294887ACTIVATION METHOD FOR MULTIPLE OPERATION SYSTEMS OF A COMPUTER - An activation method for multiple operation systems of a computer, comprising selectively pressing a function key in a keyboard while pressing a power supply key, receiving a signal of the pressed power supply key and a key code of the pressed function key by an embedded controller, determining the operation system desired to be activated according to the received key code by the embedded controller, and informing a basic input/output system by the embedded controller to activate the specific operation system. Therefore, the waiting time spent on selecting operation system in the prior art is eliminated.11-27-2008
20080294886Method for resetting bios - A method for resetting a basic input/output system (BIOS) suitable for a desktop computer having the BIOS is provided. The BIOS is reset when a reset or power button of the desktop computer is pressed. Accordingly, the problem that the desktop computer cannot be booted up can be resolved quickly.11-27-2008
20090249057NETWORK STORAGE TARGET BOOT AND NETWORK CONNECTIVITY THROUGH A COMMON NETWORK DEVICE - The present disclosure includes systems and techniques relating to booting to a network storage target. In general, in one implementation, a bus-to-network device driver is loaded during a machine boot, where the bus-to-network device driver is capable of sending machine bus commands over a network, providing access to the network for a network device driver, and distinguishing between received responses to the machine bus commands and other network traffic corresponding to the network device driver. Loading of the bus-to-network device driver can occur in response to an operating system load of bus drivers. For example, the bus-to-network device driver can be an iSCSI driver, and the operating system load of bus drivers can be the operating system load of SCSI drivers.10-01-2009
20120102306SYSTEM FOR INITIATING EXECUTION OF BIOS - A computer device comprising a display member coupled to a base member to enable variable positioning of the display member relative to the base member, and an initiating system to automatically initiate execution of a basic input output system (BIOS) based on a position of the display member relative to the base member.04-26-2012
20120102305METHODS AND APPARATUS FOR BUILDING SYSTEM IMAGES AND SPLIT BOOTING - An example of a method for facilitating split booting includes executing a base system image file of a system, initializing components of the first computing device, loading the extended system image file, and executing the extended system image file from the first computing device without booting the first computing device. The base system image file and an extended system image file of the system are built from a single executable system image file of the system. An example of a method for building system images includes building, as a single executable file, a system image file of a system and dividing the system image file into a base system image file and an extended system image file. An example of a machine-readable storage medium having code for carrying out the method, an apparatus having the machine-readable storage medium, and an apparatus having means for carrying out the method is disclosed.04-26-2012
20110047366BOOTING IN SYSTEMS HAVING DEVICES COUPLED IN A CHAINED CONFIGURATION - The present disclosure includes methods, devices, and systems for booting in systems having devices coupled in a chained configuration. One or more embodiments include a host and a number of devices coupled to the host in a chained configuration, wherein at least one of the number of devices is a bootable device and the at least one bootable device is not directly coupled to the host.02-24-2011
20120084548Method and Module for Simulating Keyboard - This disclosure provides a method and a module for simulating a keyboard used in an electronic device having a hot key. The method for simulating a keyboard at least includes the following steps. First, whether the hot key is pressed is checked. If the hot key is pressed, a pressing time of the hot key is calculated. If the pressing time is over a first predetermined time, a first scanning code is sent. When the pressing time is within the first predetermined time, whether to send a second scanning code is determined according to the pressing time.04-05-2012
20110283098ELECTRONIC DEVICE WITH OVERLAPPED BOOT TASK FETCHES AND BOOT TASK EXECUTION - In accordance with at least some embodiments, a system includes a first processor and a second processor. The system also includes a boot task storage medium that can only be accessed by one processor at a time. A boot process of the system has a first stage and a second stage. During the first stage, the first processor fetches and executes boot tasks without assistance from the second processor. During the second stage, boot task execution performed by first processor overlaps with at least one boot task fetch performed by the second processor.11-17-2011
20100268926Method and Apparatus for Preventing BIOS from Failing to Enter Boot Program - A method and an apparatus for preventing a basic input/output system (BIOS) from failing to enter a boot program are adapted to solve the problem that when a central processing unit (CPU) executes a first instruction after a computer is powered on, a start address to be executed is erroneously set as another corresponding start address, resulting in that a BIOS cannot enter a boot program. In the method of the present invention, a jump instruction is written to the corresponding start address, so as to enable an execution instruction to jump to a boot block of the BIOS when the start address is erroneously set in the computer, thus performing a normal boot operation. Moreover, in the present invention, a step for checking a register that may cause the start address to be inverted to the corresponding start address is further added to the BIOS program, such that in each boot process, the value of the register can be pre-checked and overwritten when an error occurs, so as to avoid the problem of false pointing next time the computer is booted.10-21-2010
20090106544FUNCTION MANAGEMENT SYSTEM AND METHOD - A function management system includes a power source, an electronic switch, a plurality of function modules, and a function management module. The power source is for supplying power. The electronic switch is for controlling the power to the function management system. The function modules are for executing various functions. The function management module is for storing a plurality of sub boot-up programs corresponding to the function modules. Each sub boot-up program is used for booting up a corresponding function module. A function management method is also provided.04-23-2009
20080263345Dual boot strategy to authenticate firmware in a computing device - Methods for authenticating firmware in a computing device include partitioning functions critical to the intended role of the computing device so that, upon successful authentication of the firmware, all functions of the device are made operational. Otherwise, the computing device behaves in a diagnostic mode of operation to assist users in troubleshooting to eventually authenticate firmware. At least first and second sets of firmware are loaded at various times into a controller of the computing device with the first set occurring without verification of trustworthiness, while the second set occurs upon authentication of the first. The second is used to authenticate a remainder set of firmware. Particular computing devices contemplate laser printers, mobile phones, PDA's, gaming consoles, etc. Firmware downloads, error messaging, hash comparisons, signature table construction, page-in techniques, computer program products, and particular computing arrangements are other noteworthy features, to name a few.10-23-2008
20110302399Rapid activation of service management processor subsystem for server device - A bootloader process executing on a service management processor (SMP) subsystem for a server device determines whether an initialization flag stored within non-volatile memory of the subsystem is set. The initialization flag corresponds to whether a full cold initialization process of the subsystem is to occur. In response to determining that the initialization flag has not been set, the bootloader process loads an image stored in the non-volatile memory into volatile memory of the subsystem. The image corresponds to processes properly running on the SMP subsystem after the SMP subsystem has booted, including a management process. The processes begin executing on the subsystem. The management process, determines whether a hardware configuration change within the subsystem has been made since when the image was saved to the non-volatile memory. In response to determining that the hardware configuration change has been made, the management process sets the initialization flag and rebooting the subsystem.12-08-2011
20110302398KEY PROTECTORS BASED ON ONLINE KEYS - An online key stored by a remote service is generated or otherwise obtained, and a storage media (as it applies to the storage of data on a physical or virtual storage media) master key for encrypting and decrypting a physical or virtual storage media or encrypting and decrypting one or more storage media encryption keys that are used to encrypt a physical or virtual storage media is encrypted based at least in part on the online key. A key protector for the storage media is stored, the key protector including the encrypted master key. The key protector can be subsequently accessed, and the online key obtained from the remote service. The master key is decrypted based on the online key, allowing the one or more storage media encryption keys that are used to decrypt the storage media to be decrypted.12-08-2011
20110302402ON-CHIP SECURITY METHOD AND APPARATUS - A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been initiated. A predetermined security value, or password, is stored, for example in BootROM. A value of a security location within FLASH memory is read and the two values are compared. Polling of the serial port is selectively performed, depending on the result of such comparison. In a presently preferred embodiment, if the value in the security location matches the predetermined security value, then polling of the serial port is not performed. This reduces potential security breaches caused in conventional arrangements where code may be downloaded from the serial port and executed, which allows anyone to access and upload programs and data in the FLASH memory, including confidential and proprietary information.12-08-2011
20110302400SECURE VIRTUAL MACHINE BOOTSTRAP IN UNTRUSTED CLOUD INFRASTRUCTURES - Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure.12-08-2011
20120011354BOOT LOADING OF SECURE OPERATING SYSTEM FROM EXTERNAL DEVICE - A device for establishing a secure computing environment on a host computer. The device can include an interface configured to couple to the host computer. The device can also include a configuration module configured to identify a file that comprises configuration settings of the host computer's native boot loader that is used to load the host computer's native operating system. The configuration module can create a backup copy of the configuration settings of the native boot loader. The device includes a memory that holds a secure operating system. The device can also include a modification module configured to modify the configuration settings of the host computer's native boot loader to cause the secure operating system to be loaded from the device in place of the native operating system.01-12-2012
20110289306METHOD AND APPARATUS FOR SECURE SCAN OF DATA STORAGE DEVICE FROM REMOTE SERVER - A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include an in-band processor configured to execute an operating system and at least one host driver, communication circuitry configured to communicate with a remote server, and an out-of-band (OOB) processor capable of communicating with the remote server using the communication circuitry irrespective of the state of the operating system. The OOB processor may be configured to receive a block read request from the remote server, instruct the at least one host driver to send a storage command to a data storage device, receive data retrieved from the data storage device and authentication metadata generated by the data storage device, and transmit the data and the authentication metadata to the remote server.11-24-2011
20090089566SUPPORTING ADVANCED RAS FEATURES IN A SECURED COMPUTING SYSTEM - Systems and methods for enabling Reliability, Availability & Serviceability features after launching a secure environment under the control of LaGrande Technology (LT), or comparable security technology, without compromising security are provided. In one embodiment, the method comprises adding at least one specific capability to a processor to enable at least one of CPU hot-plug, CPU migration, CPU hot removal and capacity on demand.04-02-2009
20110296154Automated Communication Configuration - A method for use at a user device of a communications network include utilizing a configuration file obtained from a remote device to configure a communication of an application executed at the user device without requiring user input, the configuration file including logic applied by the application to identify, from a plurality of data bearers available to the user device, a select data bearer for use in conducting the communication based on one or more parameters representative of the current operational context of the user device. The user device includes a storage module to store a configuration file obtained from a remote device and a processing module to execute an application, wherein during execution the application is to utilize logic of configuration file to identify, from a plurality of data bearers available to the user device, a select data bearer for use in conducting a communication of the application.12-01-2011
20110296152BOOT MODE - A method for launching a boot mode of a device including detecting an input in response to a user accessing a power button of the device, identifying at least one characteristic of the input and a corresponding boot mode which can be launched in response to at least one of the characteristic of the input, and configuring the device to launch the corresponding boot mode.12-01-2011
20110296159PXE SERVER AND ELECTRONIC DEVICE AND METHOD OF DISKLESS BOOTING ELECTRONIC DEVICE - A method of diskless booting an electronic device sends a request for an IP address of the electronic device to a pre-boot execution environment (PXE) server. After receiving the request, the PXE server allocates an IP address to the electronic device, and sends a bootstrap program to the electronic device. The electronic device receives a configuration file of the electronic device from the PXE server, and executes one or more operating system kernels of the configuration file.12-01-2011
20110296158HAND-HELD TEST METER WITH DISRUPTION AVOIDANCE CIRCUITRY - A hand-held test meter for use with an analytical test strip configured for the determination of an analyte in a bodily fluid sample includes a USB interface, a microcontroller block configured for boot strap loading (BSL) of data into the hand-held test meter via a serial signal and a circuit disruption avoidance block. The circuit disruption avoidance block includes a USB to serial bridge sub-block with (i) a USB input(s), (ii) a serial output(s) configured to provide a serial signal for BSL of data to the microcontroller block; and (iii) a plurality of general purpose input/outputs (GPIO). The circuit disruption avoidance block also includes a BSL enable gate/buffer sub-block. At least two of the GPIO are configured to provide BSL control signals to the microcontroller block via the BSL enable gate/buffer sub-block and the USB to serial bridge sub-block is configured to send the data to the microcontroller block via the at least one serial output.12-01-2011
20110296157System and Method for Supporting Secure Subsystems in a Client Hosted Virtualization System - An client hosted virtualization system includes an authentication device, a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system authenticates a virtual machine image, launches a portion of the virtual machine that initiates an authentication session with the authentication device, receives an authentication object from the authentication device, sends the authentication object to the portion of the virtual machine, and launches another portion of the virtual machine. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager.12-01-2011
20110296156System and Method for Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the CHVS, authenticates a virtual machine image and launches the virtual machine based on the image. The CHVS is configurable to execute the BIOS or the virtualization manager. A client system update network includes a client update system and a CHVS with a processor, a security processor, and non-volatile memory with BIOS code and virtualization manager code that initializes the CHVS, authenticates a virtual machine image and launches a virtual machine based on the image. The CHVS is configurable to execute the BIOS or the virtualization manager. The client update system receives updates and sends them to the CHVS. The CHVS authenticates the updates with the security processor, and overwrites the non-volatile memory with the updates.12-01-2011
20110296155AUTOMATICALLY STARTING SERVERS AT LOW TEMPERATURES - This document describes various techniques for automatically starting servers at low temperatures. A server may be powered on into a heating mode responsive to determining that a temperature of the server is below an operational temperature range. The server may then be restarted when the temperature of the server has increased to a temperature that is within the operational temperature range.12-01-2011
20110296153OPTIMIZATION OF STORAGE DEVICE OPERATING PARAMETERS - Example embodiments relate to storage devices, computing devices, and machine-readable storage media that optimize storage device operating parameters for desktop and notebook computing devices. Example embodiments allow for optimization of operating parameters of a storage device for one of a desktop computing device and a notebook computing devices based on provision of a command to the storage device. In example embodiments, upon receipt of such a command, the storage device may reconfigure its operating parameters to be optimized for the particular type of system.12-01-2011
20110296160Method for changing booting configuration and computer system capable of booting OS - In a computer system in which a server has, in addition to a disk used for booting, an operation transfer destination disk that has the same content as the boot disk, a method for changing the disk used by the server or another server in the computer system for booting to the operation transfer destination disk is realized by changing the content of the operation transfer destination disk to enable the OS and applications installed in the operation transfer destination disk to be booted from the destination disk and by changing the setting of a boot program of the server to enable booting from the operation transfer destination disk.12-01-2011
20110302401Information processing apparatus, information processing method and recording medium - An information processing apparatus includes a receiver configured to receive a packet via a communication line, an operating processor configured to suspend an operation thereof when the information processing apparatus is in an energy saving mode, a first storage configured to store the packet received by the receiver, a determining unit including a table in which different operations of the operating processor are recorded in association with different patterns of packets and configured to determine whether to restart the operating processor when the information processing apparatus is in the energy saving mode based on a pattern of the packet stored in the first storage and the patterns of the packets in association with the operations of the operating processor recorded in the table, and a power manager configured to supply power to the operating processor based on a result determined by the determining unit to restart the operating processor.12-08-2011
20080288762Firmware Interface Runtime Environment Protection Field - Method and apparatus for protecting a firmware runtime environment are described herein. In one embodiment, a process example is provided to retrieve a first key from a secure store of a firmware within a platform, the firmware including an initialization table for initializing the platform, and verify the initialization table using the first key retrieved from the secure store during an initialization of the platform. Other methods and apparatuses are also described.11-20-2008
20100005283COMPUTER SYSTEM AND CONTROL METHOD OF THE SAME - A computer system includes a device which transmits data through a predetermined interface and outputs first recognition information in response to a predetermined power on self test (POST) control signal, a device controller which has second recognition information about whether the device is mounted, and a system controller which outputs the POST control signal to the device when powering on, and recognizes the device on the basis of the first recognition information and the second recognition information.01-07-2010
20100005282METHOD AND APPARATUS FOR BOOTING FROM A FLASH MEMORY - Techniques for booting a computing device with a flash memory without knowledge of parametric information of the flash memory are described herein. In one embodiment of the invention, the computing device receives input requesting the computing device to begin operation and executes a set of one or more instructions stored in a non-volatile memory. The execution of the set of instructions configures a first read routine for accessing the flash memory based on a common denominator format of candidate flash memories, and the first read routine is not configured based on information located in a flash memory identification table. The computing device reads a bootstrapping code image based on the first read routine into a volatile memory and executes that first bootstrapping code image. Other methods and apparatuses are also described.01-07-2010
20090144537INFORMATION PROCESSING APPARATUS AND METHOD FOR STARTING UP INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: a power button; a switching unit that switches a plurality of peripheral devices connected to the apparatus between a detectable state and an undetectable state; a determination unit that determines whether the start-up operation is a normal start-up operation for starting up all of the peripheral devices or a specific start-up operation for starting up a specific peripheral device that is selected from among the peripheral devices; a first switching control unit that controls the switching unit to switch the specific peripheral device to the detectable state and to switch a non-specific peripheral device that is selected from among the peripheral devices except the specific peripheral device to the undetectable state; and a second switching control unit that controls the switching unit to switch the non-specific peripheral device to the detectable state after the specific peripheral device is detected by the operating system.06-04-2009
20100070747MANAGING CACHE DATA AND METADATA - Embodiments of the invention provide techniques for managing cache metadata providing a mapping between addresses on a storage medium (e.g., disk storage) and corresponding addresses on a cache device at data items are stored. In some embodiments, cache metadata may be stored in a hierarchical data structure comprising a plurality of hierarchy levels. Only a subset of the plurality of hierarchy levels may be loaded to memory, thereby reducing the memory “footprint” of cache metadata and expediting the process of restoring the cache metadata during startup operations. Startup may be further expedited by using cache metadata to perform operations associated with reboot. Thereafter, as requests to read data items on the storage medium are processed using cache metadata to identify addresses at which the data items are stored in cache, the identified addresses may be stored in memory. When the computer is later shut down, instead of having to transfer the entirety of the cache metadata from memory to storage, only the subset of the plurality of hierarchy levels and/or the identified addresses previously loaded to memory may be transferred (e.g., to the cache device), thereby expediting the shutdown of the computer.03-18-2010
20110191574METHOD AND APPARATUS FOR BINDING TPM KEYS TO EXECUTION ENTITIES - A method and apparatus for binding trusted platform module (TPM) keys to execution entities are described. In one embodiment, the method includes the receipt of an authorization request issued by an execution entity for authorization data. According to the authorization request, the execution entity may be measured to generate an entity digest value. Once the entity digest value is generated, a platform reference module may grant the authorization request if the entity digest value verifies that the execution entity is an owner of the key held by the TPM. Accordingly, in one embodiment, a platform reference module, rather than an execution entity, holds the authorization data required by a TPM to use a key owned by the execution entity and held within sealed storage by the TPM. Other embodiments are described and claimed.08-04-2011
20110191573MULTI-MOTHERBOARD SERVER SYSTEM - A multi-motherboard server system, having a management board and a plurality of motherboards, is disclosed. The multi-motherboard server system is applicable to a sever system. The management board has a BMC, and the motherboards are respectively connected to the management board. The BMC can transmit data to a far-end control system through sideband communication.08-04-2011
20110167253Multi-processor systems and methods thereof - Multi-processor systems and methods thereof are provided. In an example, the multi-processor system may include a boot memory including a plurality of boot codes, each of the plurality of boot codes configured to facilitate an initialization process at one of a plurality of intellectual property (IP) blocks, each of the plurality of IP blocks having shared access to the boot memory. In another example, the multi-processor system may receive, from a first processor, a request to provide one of a plurality of boot codes from a boot memory, the received request sent in response to a system initializing signal, may read the requested boot code from the boot memory and may transfer, from a second processor, the read boot code to the first processor.07-07-2011
20090222651S3 BIOS OPERATING SYSTEM SWITCH - Arrangements for employing a system BIOS (basic input/output system) to handle email during a suspended state (such as an “S3” state as will be better understood herebelow). Preferably, the BIOS is employed to “jump” between two suspended images such that, e.g., two more powerful OS's can be employed to manage the mail function.09-03-2009
20100169636System and Method For a Secure I/O Interface - A security processor performs all or substantially all security and network processing to provide a secure I/O interface system to protect computing hardware from unauthorized access or attack. The security processor sends and receives all incoming and outgoing data packets for a host device and includes a packet engine, coupled to a local data bus, to process the incoming and outgoing packets. The processor further comprises a cryptographic core coupled to the packet engine to provide encryption and decryption processing for packets processed by the packet engine. The packet engine also handles classification processing for the incoming and outgoing packets. A modulo engine may be coupled to the local data bus.07-01-2010
20100169635METHOD AND SYSTEM TO FACILITATE CONFIGURATION OF A HARDWARE DEVICE IN A PLATFORM - A method and system to allow the secure configuration of the configurable feature(s) of a hardware device in a platform. The configuration of the configurable feature(s) of the hardware device is performed with protection against software attacks. A management module determines that the platform is authorized to configure at least one configurable feature of the hardware device and configures each of the configurable feature(s) based on a received configuration message.07-01-2010
20100169634SYSTEM AND METHOD FOR SELF-CLOCKING OS KERNEL BOOT - In some embodiments, the invention involves a system and method to enable a mobile device to utilize self-clocking during boot. In at least one embodiment, a platform has at least one processor core coupled to an internal timer. For an X86 processor, the internal timer may reside in an advanced programmable interrupt controller. A boot kernel executing on the platform is configured to use the internal timer early in the boot phase, when the platform is not compliant with legacy PC/AT architecture. If the platform does conform to the legacy architecture, then the boot may use an external clock for timing and clocking early in boot. In both cases, the internal timer is calibrated to the external clock before completing the boot phase. Other embodiments are described and claimed.07-01-2010
20100169633SYSTEM AND METHOD TO SECURE BOOT BOTH UEFI AND LEGACY OPTION ROM'S WITH COMMON POLICY ENGINE - In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are authenticated. Images to be authenticated include the operating system (OS) loader. The policy engine utilizes a certificate database to hold valid certificates for third party images, according to platform policy. Images that are not authenticated are not loaded at boot time. Other embodiments are described and claimed.07-01-2010
20100169632Component Configuration Mechanism for Rebooting - Aspects of the invention support a component configuration mechanism when rebooting a circuit module (07-01-2010
20100169630Pre-boot Recovery of a Locked Computer System - Embodiments of the present disclosure provide methods, apparatuses, articles, and removable storage devices for pre-boot recovery of a locked computer system. Other embodiments may also be described and claimed.07-01-2010
20100077193METHOD AND APPARATUS FOR ASSIGNING A MEMORY TO MULTI-PROCESSING UNIT - A memory mapping apparatus for a multi-processing unit includes at least one memory matching unit configured to perform matching between a plurality of processing units and a plurality of memories, a memory controller configured to perform access control and arbitration for the respective memories, a memory mapping unit configured to include a window map for the respective processing units, make correspond the memories to the respective processing units with reference to the window map, and assign part of the entire address region of the corresponding memory, and a window map change unit configured to change a window map for a processing unit in which a request to use the memory has occurred in response to a request to use the memory from any one of the processing units.03-25-2010
20100077192COMPUTER, BOOTING SOFTWARE PRODUCT AND COMPUTER BOOTING METHOD - A computer includes an application system, a storage device and a basic input output system (BIOS). The application system can be respectively coupled to the storage device and the BIOS, set at least a multimedia file as a preset playing file according to an input instruction and store the preset playing file into the storage device. The application system can further generate a log file according to the input instruction and the storage position of the preset playing file, wherein the log file is sent to the BIOS. The BIOS has a file access module, so that the BIOS can acquire the preset playing file from the storage device according to the log file for playing during booting the computer.03-25-2010
20100077190Method To Retain Crucial Thin Client System Settings - A system comprises a first non-volatile storage device that contains an operating system. The system also comprises a second non-volatile storage device that contains basic input/output system (BIOS) code and at least one parameter used by the operating system or by a network interface, and not by the BIOS code.03-25-2010
20090210689REMOTE MANAGEMENT OF UEFI BIOS SETTINGS AND CONFIGURATION - In an information handling system (IHS), remote management of basic input/output system (BIOS) settings and configuration includes maintaining a BIOS setting/configuration database, providing an application to communicate a BIOS setting/configuration from the database to a BIOS system, determining whether the BIOS setting/configuration communicated from the database to the BIOS system is a special BIOS configuration capsule packet, and validating BIOS setting/configuration.08-20-2009
20100275000COMPUTER MOTHERBOARD WITH BASIC INPUT OUTPUT SYSTEM CAPABLE OF BUILT-IN CONFIGURATION DISPLAY - The present invention is a computer motherboard with a Basic Input Output System (BIOS) capable of built-in configuration display, characterized in that the BIOS includes a first means and a second means. The first and second means are code internally provided in the BIOS and executable by a CPU of the computer motherboard in an execution environment preset by the BIOS. The first means enables acquisition of CPU configuration data stored on the CPU and configuration data for displaying the CPU. The second means enables acquisition of memory module configuration data stored on at least a memory module and configuration data for displaying the memory module. After the computer motherboard enters a BIOS setup utility, a user selects an option of execution of the first or second means to execute CPU and memory configuration display without using an operating system.10-28-2010
20120131320BOOTING APPARATUS AND METHOD USING SNAPSHOT IMAGE - Provided are a booting apparatus and method using a snapshot image. A snapshot image may be divided into a plurality of blocks. Each of the blocks may be stored in a nonvolatile memory in a compressed or non-compressed format. The snapshot image may be incrementally loaded in units of the blocks during booting. The loading and decompression of the blocks may be performed in parallel.05-24-2012
20120131322System and Method for Authenticating a Gaming Device - A method and system are provided for authenticating and securing an embedded device using a secure boot procedure and a full non-volatile memory encryption process that implements Elliptic Curve Pinstov-Vanstone Signature (ECPV) scheme with message recovery on a personalized BIOS and master boot record. The signature includes code that is recovered in order to unlock a key that is in turn used to decrypt the non-volatile memory. The use of ECPVS provides an implicit verification that the hardware is bound to the BIOS since the encrypted memory is useless unless properly decrypted with the proper key.05-24-2012
20100115258IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF - Disclosed are an image processing apparatus and a control method of the image processing apparatus. The image processing apparatus includes: a storing unit in which booting data for system booting is stored; a random access memory (RAM) in which the booting data is loaded; a central processing unit which loads the booting data in the RAM if system power supply is turned off, and refers to the booting data loaded in the RAM to perform the system booting if the system power supply is turned on; and a control unit which cuts off power supply to the central processing unit, and controls the RAM to operate in a low power mode in which power is supplied to the RAM to maintain the booting data loaded in the RAM while the system power supply is turned off05-06-2010
20100115256METHOD, APPARATUS, AND SYSTEM FOR QUIESCING A BOOT ENVIRONMENT - An apparatus, system, and method are disclosed for quiescing a boot environment. A reservation module reserves a portion of a first storage device. A store module stores an update boot image to the reserved portion. A detection module detects the update boot image stored on the first storage device when the computer boots and executes the update boot image in place of a standard boot image in response to detecting the update boot image. The update boot image places a computer in a known quiescent state.05-06-2010
20100268927Booting An Operating System Of A System Using A Read Ahead Technique - In one embodiment, the present invention includes a method for generating a list of files accessed during an operating system (OS) boot process to profile the OS boot process, and optimizing the list of files to generate an optimized file list for use in future OS boot processes, where the optimizing is according to a first optimization technique if the files were accessed from a solid state medium and according to a second optimization technique if the files were accessed from a rotating medium. Other embodiments are described and claimed.10-21-2010
20110271088OPERATING SYSTEM CONTEXT SWITCHING - A technique for quickly switching between a first operating system (OS) and a second OS involves deactivating the first OS and booting the second OS from memory. The technique can include inserting a context switching layer between the first OS and a hardware layer to facilitate context switching. It may be desirable to allocate memory for the second OS and preserve state of the first OS before deactivating the first OS and booting the second OS from memory.11-03-2011
20100325404Updating Programmable Logic Devices - Updating programmable logic devices (‘PLDs’) in a symmetric multiprocessing (‘SMP’) computer, each compute node of the SMP computer including a PLD coupled for data communications through a bus adapter, the bus adapter adapted for data communications through a set of one or more input/output (‘I/O’) memory addresses, including configuring the primary compute node with an update of the configuration instructions for the PLDs; assigning, by the PLDs at boot time in an SMP boot, a unique, separate set of one or more I/O addresses to each bus adapter on each compute node; and providing, by the primary compute node during the SMP boot, the update to all compute nodes, writing the update as a data transfer to each of the PLDs through each bus adapter at the unique, separate set of one or more I/O addresses for each bus adapter.12-23-2010
20090150661Information Processing Apparatus and Program - An information processing apparatus including: a first recording medium which stores a first program; a connection section which is capable of connecting to a second recording medium outside of the information processing apparatus; an instruction input section to input, while the information processing apparatus is in an activated state, an instruction for booting a second program stored in the second recording medium that is connected to the connection section on booting of the BIOS; and a controller which, performs a check when booting of a BIOS, if the second recording medium is connected and the instruction has been input while the information processing apparatus is in an activated state; in case when the second recording medium is connected and the instruction has been input is confirmed, the control section boots the second program; and in case when it is not confirmed, the control section boots the first program.06-11-2009
20110264902Method and System For Suspending Video Processor and Saving Processor State in SDRAM Utilizing a Core Processor - A method and system are provided in which a multimedia processor comprises a first portion associated with a first of a plurality of power domains and a second portion associated with a second of the plurality of power domains. The first portion and the second portion of the multimedia processor are integrated on a single substrate. Data may be transferred from the first portion to the second portion and, upon completing the transfer, the first portion may be powered down and state information associated with it stored. The state information may be stored in an external SDRAM. The data in the second portion of the multimedia processor may be transferred to an external device through a peripheral module in the second portion. When a trigger event associated with the data transfer to the external device occurs, the first portion may be powered up and rebooted using the stored state information.10-27-2011
20120110314BOOTING ACCESS METHOD AND MEMORY DEVICE OF EMBEDDED SYSTEM - A booting access method and a storage device of an embedded system are provided. The booting access method of the embedded system is applied to the storage device which includes a master boot record (MBR) section, a hidden section and a public section to improve access precision of embedded memory data. The access method includes: using the MBR section to access data of the public section when a normal booting signal is received; using a boot loader in the hidden section to update the MBR section and then accessing data of the public section when a trigger update signal is received.05-03-2012
20120110313ENHANCED REBOOT COMMAND - A method and system allows a computer system to perform a network reboot in response to an enhanced reboot command. The computer system receives a command to load an operating system and interprets the command to determine whether a physical machine or a virtual machine is to be rebooted. In response to a determination that the command indicates the use of a network option, the computer system loads the operating system from a networked server, and perform rebooting according to the interpreted command with the use of the operating system.05-03-2012
20120110312System and Method for an Access Controller Assisted Boot - Systems and methods for reducing problems and disadvantages associated with network boots are disclosed. In accordance with an embodiment of the present disclosure, an information handling system comprises a processor, a memory communicatively coupled to the processor, and an access controller communicatively coupled to the processor. The access controller has stored thereon a general pre-boot file and configured to receive boot configuration information from a management server. The access controller further configured to generate a boot script according to the boot configuration information and generate a specific pre-boot file based on the general pre-boot file and the boot script. The access controller is further configured to configure the information handling system to boot to a target based on the specific pre-boot file.05-03-2012
20120110311CUSTOMIZED KIOSK MODES OF OPERATION - Techniques for customized kiosk modes of operation are provided. A kiosk is configured to recognize periods of operation that are slow, moderate, or busy. A number of factors can be used to automatically recognize these periods and change the periods on demand. For each type of period (slow, moderate, or busy), the kiosk uses a different customized mode of operation so as to optimally use the kiosk for the benefit of the kiosk owner, customers interfacing with the kiosk, and marketers selling advertisements via the kiosk.05-03-2012
20100125724COMPUTER DEVICE HAVING INITIALIZATION SETTING FUNCTION AND METHOD FOR MAKING INITIALIZATION SETTING FOR COMPUTER - A computer device having an initialization setting function and a method for making an initialization setting for a computer are provided. The computer device includes a BIOS, a button which generates a pressing frequency or a pressing time when it is pressed and a main body interface unit connected to the button or the BIOS to transmit signals. The main body interface unit generates a corresponding operation instruction according to the pressing frequency or the pressing time and makes the BIOS execute the operation instruction.05-20-2010
20090193244Computer System and Legacy Boot Method for the Computer System - A computer system including no basic input/output system (BIOS) for operating bootstrap used in initial activation of a legacy operation system is allowed to perform booting of legacy operation system therefor and includes a central processing unit (CPU) and a memory, in which extended firmware and bootstrap program are stored. The extended firmware includes BIOS emulator and a plurality of device drivers. The extended firmware uses the device driver to make the BIOS emulator perform emulation of BIOS operation in response to a BIOS call issued by the bootstrap program.07-30-2009
20090193245PARALLELIZING MULTIPLE BOOT IMAGES WITH VIRTUAL MACHINES - A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances.07-30-2009
20100122076SECURITY METHOD - A security method for verifying a client device comprising: loading and executing a boot loader at the client device which establishes a connection to a boot compliance server; sending a first cryptographic element from the boot compliance server to the client device; generating a first cryptographic response with the first cryptographic element based on at least part of the boot loader and sending the first cryptographic response to the boot compliance server for verification; and continuing the boot process upon successful verification of the first cryptographic response.05-13-2010
20120036347PROVIDING FAST NON-VOLATILE STORAGE IN A SECURE ENVIRONMENT - In one embodiment, a peripheral controller coupled to a processor can include a storage controller. This storage controller can control access to a non-volatile storage coupled to the peripheral controller. The storage may include both secure and open partitions, and the storage controller can enable access to the secure partition only when the processor is in a secure mode. In turn, during unsecure operation such as third party code execution, visibility of the secure partition can be prevented. Other embodiments are described and claimed.02-09-2012
20090094448Electronic Device and Related Method for Enhancing Convenience of a Computer System - An electronic device and related method for enhancing convenience of a computer system includes a memory unit for storing a plurality of boot-up configuration files and a plurality of human characteristic signals corresponding to the plurality of boot-up configuration files, a human characteristic reception unit for receiving a human characteristic, and a logic unit coupled to a power switch, the memory unit, and the human characteristic reception unit, for comparing the human characteristic received by the human characteristic reception unit and the plurality of human characteristic signals stored in the memory unit for generating a comparison result when the power switch is turned on, and performing a boot-up procedure to turn on the computer system according to the comparison result.04-09-2009
20090094447Universal serial bus flash drive for booting computer and method for loading programs to the flash drive - The present invention relates to a universal serial bus (USB) flash drive loaded with operating system and application programs for booting a computer when plugged into the computer, wherein memory of the flash drive is partitioned as a read-only active area and a writeable data storage area, and the operating system and application programs are stored in the active area; and the operating system is executed unrelated to hardware. The present invention also relates to a method for loading programs to the USB flash drive.04-09-2009
20110173430IT Automation Appliance Imaging System and Method - A system, method, and computer program product for harvesting an image from a local disk of a managed endpoint to an image library is provided. In an embodiment of the method for harvesting an image, a managed endpoint is provided with a boot image that causes the endpoint to instantiate a RAM disk and execute the boot image from the RAM disk. The boot image is used to harvest an image by determining data on a local disk of the managed endpoint to be included in the image that are not already stored in the image library. In one embodiment, this is done by comparing hashes calculated on the data on the local disk to hashes of data in the image library. The data not already stored in the image library are then copied to the image library.07-14-2011
20090150660PRE-BOOT ENVIRONMENT POWER MANAGEMENT - A pre-boot environment is disclosed that manages power of a computing device prior to an operating system runtime phase. The pre-boot environment may be implemented in a computing device having a storage device to store an operating system, a firmware device to store firmware having a boot loader to load and initiate execution of the operating system, and a processor to execute the firmware and the operating system. The firmware in response to being executed by the processor may result in the computing device monitoring operating conditions of the computing device, and initiating a power management response based upon the operating conditions of the computing device and a power management policy.06-11-2009
20120239922PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A planned system configuration is stored to a volatile memory coupled to a processor executing a first operating system kernel. The planned system configuration is tagged. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters.09-20-2012
20120239920APPROACHES FOR UPDATING BIOS - Approaches for updating a Basic Input/Output System (BIOS) program used in a computer system. The computer system includes a central processing unit (CPU) and a non-volatile memory. The non-volatile memory is used to store the BIOS program, and the BIOS program includes a booting area and a program area for storing a first BIOS image file. The update method includes: duplicating a second BIOS image file from an external storage device of the computer system to a designated area of an internal non-volatile storage device of the computer system; changing a flag from a first status to a second status after the duplication is completed; checking the status of the first BIOS image file when the computer system is booted; and booting the computer system by the first BIOS image file or the second BIOS image file according to the status of the first BIOS image file.09-20-2012
20100082965INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS - According to an aspect of the present invention, there is provided an information processing apparatus configured to be operated by an operating system, including: a display device; a BIOS-ROM configured to store a BIOS program to be executed before starting the operating system; a memory configured to store image data to be displayed on the display device before starting the operating system during an execution of the BIOS program; a processor configured to execute a compression determination program configured to determine whether the image data are stored in the memory in a compression state or in a non-compression state and an expansion program configured to expand the image data stored in the compression state through an execution of the determination program; and a display controller configured to display, on the display device, the expanded image data.04-01-2010
20100082967METHOD FOR DETECTING MEMORY TRAINING RESULT AND COMPUTER SYSTEM USING SUCH METHOD - A method for detecting a memory training result includes the following steps. Firstly, a computer system is booted. Then, a memory training program included in a basic input output system of the computer system is executed, thereby obtaining a plurality of reading time parameters and a plurality of writing time parameters. Afterwards, the reading time parameters and the writing time parameters are recorded into a non-volatile memory. The computer system includes a central processing unit, a memory device, a chipset, a basic input output system, and a non-volatile memory. The memory device includes a memory module. The chipset is connected to the memory module and the central processing unit, and includes a memory controller. The basic input output system is connected to the chipset and includes a memory training program. The non-volatile memory is connected to the chipset.04-01-2010
20100082963Embedded system that automatically updates its software and the method thereof - An embedded system that automatically updates its software and the method thereof are provided. A boot code in the boot module determines whether the operating system (OS) image file is abnormal. The determination result determines whether the embedded system automatically updates its software. This solves the problem that the user cannot update the software in the embedded system. This helps reducing the manpower and cost for updating software in the conventional embedded system. It also enhances the usage convenience and market competition thereof.04-01-2010
20100088502Method for Storing Boot Time - A method for storing boot time is performed by a computer product having a programmable read-only memory with a basic/input output system resident therein. The method includes the steps of: 04-08-2010
20100088500MULTIPLE GUEST O.S. BOOT FOR SERVER COMPONENT SETUP - A hypervisor boots all guest operating systems needed to setup/update server components as detected by an update utility. The update utility, after detecting server components, is booted into each guest O.S. so that the components are updated in parallel without having to sequentially boot the utility into a guest O.S., update its component, then shut down and re-boot into another guest O.S.04-08-2010
20100088499SEAMLESS DATA MIGRATION - Provided are techniques for migrating data. Contents are sealed to one or more registers. In response to determining that secure backup is enabled, platform metrics are stored in a private store. An out-of-band request is received. A response to the out-of-band request is provided using the stored platform metrics.04-08-2010
20110125990COMPUTING DEVICE AND METHOD FOR WIRELESS REMOTE BOOT IN A NETWORKED ENVIRONMENT - In some embodiments, a secure authenticated remote boot of computing device over a wireless network is performed in a pre-boot execution environment (PXE) using active management technology (AMT) for remote discovery. In these embodiments, a management engine (ME) may maintain full control of a wireless interface and a wireless connection as booting begins. The ME may relinquish control of the wireless interface after a PXE timeout, in response to a shutdown command, or once the device has booted. The ME controls the use of an operating system received from a remote location.05-26-2011
20090049293BOOTING A COMPUTER USING A BOOT LIST WHEN A NON-VOLATILE MEMORY ON THE COMPUTER DOES NOT CONTAIN THE BOOT LIST - A computer implemented method, apparatus, and computer program product for booting a computer using a boot list. A determination is made as to whether a boot list is present in a non-volatile memory of the computer. The boot list is a set of paths, in which each path in the boot list is a path of a storage device. If the boot list is not present, a search is performed for the boot list in a reserved area of each storage device in a set of storage devices. When the boot list is found in the reserved area of a storage device in the set of storage devices, the boot list is copied from the reserved area of the storage device in the set of storage devices to form a copied boot list. The copied boot list is stored in the non-volatile memory to form a stored boot list. The computer is booted using the stored boot list in the non-volatile memory.02-19-2009
20100082968PROCESSOR BOOT SECURITY DEVICE AND METHODS THEREOF - A method of securing network authentication information at a data processing device includes determining a boot source from which to boot the device and comparing the boot source to an expected source. If the boot source is not the expected source, access to the network authentication information is inhibited, such as by disabling access to the portion of memory that stores the authentication information. Further, if the boot source is the expected source, boot code authentication information is retrieved from memory and verified during the boot sequence. If the device authentication information is not authenticated, access to the network authentication information is inhibited. Accordingly, access to the network authentication information is allowed only if the data processing device is booted from an expected source, and only if the boot code is authenticated, thereby reducing the likelihood of unauthorized access to the network authentication information.04-01-2010
20100082961Apparatus and method to harden computer system - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed.04-01-2010
20100082960PROTECTED NETWORK BOOT OF OPERATING SYSTEM - Methods and apparatus are disclosed to protect an operating system booted by a client computing device and provided by a server computing device. One such method includes requesting a trusted platform module of the client computing device to unseal a sealed encryption key, and receiving an encrypted operating system via a network in response to initiating a boot process of the client computing device. The illustrative method also includes decrypting the encrypted operating system received via the network using an unsealed encryption key obtained in response to requesting the trusted platform module to unseal the sealed encryption key, and executing the decrypted operating system.04-01-2010
20090193242COMPUTER SYSTEM WITH DUAL BASIC INPUT OUTPUT SYSTEM AND OPERATION METHOD THEREOF - A computer system including a central processing unit (CPU), a chipset, a first bus, a second bus, a first memory, a second memory, and a logic control circuit is disclosed. The chipset is coupled to the CPU. The first bus and the second bus are respectively coupled to the chipset. The first memory is coupled to the chipset through the first bus for storing a first basic input output system (BIOS). The second memory is coupled to the chipset through the second bus for storing a second basic input output system (BIOS). The logic control circuit detects a state of the first bus and controls the chipset to select to access the first memory through the first bus or select to access the second memory through the second bus according to the state of the first bus.07-30-2009
20090063840Information Processing Apparatus and Program - If a defect flag stored in a CF 03-05-2009
20110173427System and Method for Personalizing Devices - A system and method for personalizing a device is disclosed herein. A user configures a plurality of settings associated with a device. Each setting is identified as a user setting or a platform setting. The user settings are stored in a personalization virtual object with the user. Platform settings are stored separately from the personalization virtual object. Software for personalizing a device provided on a computer readable medium is disclosed herein. The software comprises a code for execution on a central processing unit operable to configure a plurality of settings associated with a device by a user. The software identifies each setting as a user setting or a platform setting. The user settings are stored in a personalization virtual object associated with the user, and the platform settings are stored separately from the personalization virtual object.07-14-2011
20110173429METHOD AND APPARATUS TO MINIMIZE COMPUTER APPARATUS INITIAL PROGRAM LOAD AND EXIT/SHUT DOWN PROCESSING - A method to reduce and thereby improve the initial program load time of a computing apparatus operating system and thus provides for near instantaneous user interaction. When practicing the instant invention, a computing apparatus operating system or application processing component is loaded neither sequentially nor completely, but rather on an as required basis. The invention's “required only” loading of processing components persist through subsequent operation and shut down of the computing apparatus with each loaded task creating a checkpoint record of processing modifications to non-volatile memory. Such checkpointing allows shut down processing of the apparatus to consist of merely flushing memory buffers in the apparatus checkpointed non-volatile memory of the apparatus to permanent storage and powering off of the apparatus, with subsequent initial program load (IPL) sequencing referencing the checkpointed records to minimize future system initialization elapsed time.07-14-2011
20110173428COMPUTER SYSTEM, METHOD FOR BOOTING A COMPUTER SYSTEM, AND METHOD FOR REPLACING A COMPONENT - The invention relates to a computer system (07-14-2011
20110173426METHOD AND SYSTEM FOR PROVIDING INFORMATION TO A SUBSEQUENT OPERATING SYSTEM - A method for transferring execution to a subsequent operating system. The method includes rebooting a computer system. Rebooting the computer system includes initializing an in-kernel boot loader. The in-kernel boot loader executes in a kernel of an initial operating system. Rebooting the computer system further includes populating, by the in-kernel boot loader, an initialization data structure using system data gathered during the execution of the initial operating system, loading, by the in-kernel boot loader, the subsequent operating system, and transferring control of the computer system from the initial operating system to the subsequent operating system. The subsequent operating system accesses the initialization data structure to identify available hardware. The method further includes executing the subsequent operating system on the available hardware of the computer system.07-14-2011
20120290825ELECTRONIC DEVICE AND BOOTING METHOD - An electronic device includes a first processor, a second processor for detecting the working state of the electronic device in real time, a storage unit for storing preset information and a display unit. The second processor determines that the electronic device has entered the hardware initialization process and displays the preset information. The second processor stops displaying the preset information on the display unit when the hardware initialization process is determined to be finished. A booting method for starting an electronic device is also provided.11-15-2012
20090089570Method, system and apparatus for providing a boot loader of an embedded system - A method, system and apparatus for executing a boot loader for an embedded system including a system-on-chip (SOC) processor coupled to a memory including first boot loader code for implementing a first boot loader stored in a first sector and second boot loader code for implementing a second boot loader stored in a second sector determines which of the first boot loader code and second boot loader code is younger; if the second boot loader code is determined to be younger than the first boot loader code, a swapping operation is performed so that the second boot loader code is associated with the first sector and the first boot loader code is associated with a different sector, and the boot loader code associated with the first sector is executed.04-02-2009
20090089573MULTI PROCESSOR SYSTEM HAVING DIRECT ACCESS BOOT AND DIRECT ACCESS BOOT METHOD THEREOF - A multiprocessor system having a direct access boot operation and a direct access boot method are provided to substantially reduce a boot error of processor that does not provide a memory link architecture in the multiprocessor system. In an embodiment of the invention, a multiprocessor system includes: a first processor configured to perform a first predetermined task; a second processor configured to perform a second predetermined task; a multiport semiconductor memory device coupled to the first processor and the second processor, the multiport semiconductor memory device including at least one shared memory area, the multiport semiconductor memory device configured to provide access to the at least one shared memory area by the first processor and the second processor; and a non-volatile memory device coupled to the first processor and the second processor, the non-volatile memory device storing a first boot code associated with the first processor and a second boot code associated with the second processor, the multiprocessor system configured to provide the first processor direct access to the non-volatile memory area during a boot operation and indirect access to the non-volatile memory area otherwise.04-02-2009
20090089572BOOTING SYSTEM, IMAGE FORMING APPARATUS HAVING THE SYSTEM AND CONTROL METHOD THEREOF - A booting system including a boot code transmission control unit to sequentially execute a booting operation concurrently with storing boot codes stored in a NAND flash memory in an internal memory. The boot code transmission control unit includes storage units to store addresses of the boot codes stored in the internal memory and an address of a boot code to be accessed by a CPU core for the execution of the booting operation, respectively. These addresses are checked by monitoring a memory interface and a bus interface. When the boot code addresses are the same, the boot code transmission control unit transmits a boot code corresponding to the same address, among the boot codes stored in the internal memory, to the CPU core so that the CPU core can sequentially execute the booting operation.04-02-2009
20090187755Computer System and Method for Recording Operating Information Thereof - A computer system and a method for recording operating information are disposed. The computer system includes a storage unit and a first memory unit. The storage unit includes an operating system. The first memory unit includes a BIOS and a detecting program, and it is electrically connected to the storage unit. The computer system is capable of detecting whether an event relating to the BIOS occurs by the detecting program under the operating system, and then operating information of the event is recorded.07-23-2009
20090187753SEPARATE POWER ISLAND FOR HIGH PERFORMANCE PROCESSOR - Separate power island for high performance processor. A multi-processor design is presented in which each of the processors is implemented in separately powered portions of a circuitry (e.g., an integrated circuit). One of the processors can be a main application processor, and another of the processors can be a baseband processor. In addition, the each of the processors can be implemented using different types of circuitry (e.g., one of the processors [such as the main application processor] is implemented using higher performance/higher leakage circuitry that another of the processors [such as the baseband processor]). One of the processors (e.g., main application processor) can be powered down when not needed thereby providing energy/power conservation which can be vital is handheld communication device applications such as wireless handheld communication devices.07-23-2009
20090177877REMOTE BIOS FOR SERVERS AND BLADES - A method for implementing a remote basic input/output system (BIOS) on a multi-blade server is provided. A remote BIOS partition is created on a management module of the multi-blade server for each blade of the multi-blade server residing on the management module. BIOS settings for operation on a first blade of the multi-blade server are defined.07-09-2009
20100100720COMPUTER SYSTEM HAVING DUAL BIOS PROGRAM PROTECTING FUNCTION AND CONTROL METHOD THEREOF - A dual BIOS program protecting method is provided for protecting a first BIOS program and a second BIOS program of a computer system. Firstly, a flag is switched from a first status to a second status during the refreshing of the first BIOS program. If the first BIOS program is successfully refreshed, the flag is switched from the second status to the first status. If the flag is in the second status when the computer system is booted, a first control signal is generated and the second BIOS program enters a write protection mode according to the first control signal.04-22-2010
20090276617COMPUTER SYSTEM COMPRISING A SECURE BOOT MECHANISM ON THE BASIS OF SYMMETRIC KEY ENCRYPTION - A CPU, a computer system and a secure boot mechanism are provided in which a symmetric encryption key may be incorporated into a non-volatile memory area of the CPU core, thereby substantially avoiding any tampering of the encryption key by external sources. Moreover, pre-boot information may be internally stored in the CPU and may be retrieved upon a reset or power-on event in order to verify a signed boot information on the basis of the internal symmetric encryption key. Furthermore, the BIOS information may be efficiently updated by generating a signature using the internal encryption key.11-05-2009
20090276618Portable device and method for externally generalized starting up of a computer system - An improved portable device for start-up of a computer system is disclosed. This portable device for externally starting up a computer system comprises a connection interface to the computer system and a data medium comprising data and executable codes of a host operating system that can be activated by a start-up program of the computer system and configured to automatically detect hardware and/or software elements of the computer system and to activate the corresponding computer drivers. The data medium further comprises data and executable codes of a management software interface, configured to present the computer drivers activated by the host operating system in the form of at least one predetermined generic computer driver, and data and executable codes of a guest operating system that can be activated by the management software interface and configured to manage the hardware and/or software elements on the computer system using the predetermined generic computer driver.11-05-2009
20090282235METHOD, ELEMENT AND CIRCUIT BOARD FOR CONTROLLING SHUTDOWN OF ELECTRONIC DEVICE - The invention provides a method, an element and a circuit board for controlling an electronic device to be shut down. The method according to the invention includes the steps as follows. First, a power control signal is received, and the duration of the power control signal at a preset signal level is calculated. Then, whether the duration is greater than a threshold value is determined. If yes, an interrupt signal is generated and transmitted to a processing module of the electronic device to drive the processing module to set the preset mechanism of the electronic device according to the interrupt signal.11-12-2009
20090282234REMOTE CONNECTION BETWEEN INTERMEDIARY DEVICE AND COMPUTING DEVICE VIA CENTRAL AUTHORITY SOFTWARE - Upon an intermediary device on a network being turned on, controlling system software at the intermediary device is booted such that no public network address is ever assigned to the intermediary device. The intermediary device sends a boot message over the network to central authority software running on one or more first computing devices on the network. The central authority software in response sends messages over the network to the intermediary device and to a second computing device on the network to establish a private tunnel with one another. The intermediary device and the second computing device establish the private tunnel with one another over the network. The intermediary device then opens a remote connection to the second computing device through the private tunnel so that peripherals connected to the intermediary device as if they were directly connected to the second computing device.11-12-2009
20090287915Procedure for Booting a First Computer Using the Operating System of a Second Computer - A method for operating at least one first computer entity with an operating system of a second computer entity,11-19-2009
20110197055FIRMWARE STORAGE MEDIUM WITH CUSTOMIZED IMAGE - In at least some embodiments, a computer system includes a processor and a firmware storage medium in communication with the processor. The firmware storage medium stores a default image invoked during a boot process and selectively stores a customized image. If the customized image is stored by the firmware storage medium, the boot process selectively substitutes at least part of the default image with at least part of the customized image.08-11-2011
20110197054METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM - A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures.08-11-2011
20110197052Fast Machine Booting Through Streaming Storage - Described is a technology by which a virtual hard disk is maintained between a far (e.g., remote) backing store and a near (e.g., local) backing store, which among other advantages facilitates fast booting of a machine coupled to the virtual hard disk. Read requests are serviced from the near backing store (e.g., a differencing layer) when the data is available thereon, or from the far backing store (e.g., a base layer) when not. The near backing store may be configured with a cache layer that corresponds to the base layer and a write differencing layer that stores writes, or a single differencing layer may be used for both caching read data and for storing write data. A background copy operation may be used to fill the cache until the far backing store data is no longer needed.08-11-2011
20090089567Applying Firmware Updates To Servers In A Data Center - Applying firmware updates to servers in a data center, the servers including one or more active servers and a standby server, each server mapped to separate remote computer boot storage, including applying the firmware updates to the standby server; selecting an active server for firmware updating; powering off the selected active server by the system management server; remapping the standby server to the remote computer boot storage for the selected active server; rebooting the standby server from the remote computer boot storage for the selected active server, designating the standby server as an active server; remapping the selected active server to the remote computer boot storage formerly mapped to the standby server; and rebooting the selected active server from the remote boot storage formerly mapped to the standby server, designating the selected active server as a standby server.04-02-2009
20090089569MULTI-OS (OPERATING SYSTEM) BOOT VIA MOBILE DEVICE - A system that facilitates different levels of operating system (OS) boot so as to provide users with rapid access to certain mobile device functionalities, security, applications, etc. is provided. An OS can be loaded in phases or stages commensurate with policies, preferences, actions, context, etc. Similarly, a particular OS or group of OSs can be loaded to address a particular scenario or requirement.04-02-2009
20090089568Securely Launching Encrypted Operating Systems - Tools and techniques for securely launching encrypted operating systems are described herein. The tools may provide computing systems that include operating systems (OSs) that define boot paths for the systems. This boot path may include first and second OS loader components. The first loader may include instructions for retrieving a list of disk sectors from a first store, and for retrieving these specified sectors from an encrypted second store. The first loader may also store the sectors in a third store that is accessible to both the first and the second loader components, and may invoke the second loader to try launching the OS using these sectors. In turn, the second loader may include instructions for retrieving these sectors from the third store, and for unsealing a key for decrypting these sectors. The second loader may then decrypt these sectors, and attempt to launch the OS from these sectors.04-02-2009
20120297178CONFIGURATION MODE SWITCHING SYSTEM AND METHOD - A computer and method automatically switches from a manufacture mode to a user mode in a basic input and output system (BIOS) chip of the motherboard. The computer invokes an interrupt program to switch from a manufacture mode number to a user mode number in a BIOS setting file. The computer initializes the diagnostic mode according to the parameters of the diagnostic mode and the stress mode according to the parameters of the stress mode. The computer configures the BIOS setting file to a user mode according to the user mode number, and saves configuration into the BIOS chip when the BIOS chip starts.11-22-2012
20120297177Hardware Assisted Operating System Switch - An interoperable firmware memory containing a Basic Input Output System (BIOS) and a trusted platform module (TPSM). The BIOS includes CPU System Management Mode (SMM) firmware configured as read-only at boot. The SMM firmware configured to control switching subsequent to boot between at least: a first memory and second isolated memory; and a first and second isolated non-volatile storage device. The first memory including a first operating system and the second memory including a second operating system. The first non-volatile storage device configured to be used by the first operating system and the second non-volatile storage device configured to be used by the second operating system. The trusted platform module (TPSM) configured to check the integrity of the CPU system Management Mode (SMM) during the boot process.11-22-2012
20080209201APPARATUS AND METHOD FOR UPDATING BOOT LOGO IMAGE IN PORTABLE TERMINAL - An apparatus and method for updating a boot logo image in a portable terminal are provided. In the method, a boot logo image selected by a user and a boot loader are separately stored in a memory unit.08-28-2008
20080209202Apparatus operable under an operating system, method of controlling apparatus and computer-readable recording medium - According to an aspect of an embodiment, an apparatus operable under an operating system having an input device for inputting information, the apparatus being activated by booting a BIOS and the operating system successively comprises, a storage for storing information; and a processor receiving specific information inputted by the input device before completion of booting the operating system, storing the specific information into the storage, determining whether or not the specific information is stored in the storage after completion of booting the operating system, rebooting the BIOS when the specific information is stored in the storage and displaying information related to the BIOS.08-28-2008
20080209199BOOT NEGOTIATION AMONG MULTIPLE BOOT-CAPABLE DEVICES - A first device discovers the capabilities of a second device. The first device determines which of the first device and the second device is to execute a controlling boot image based at least in part on the capabilities of the first device and the second device. A first boot image is executed by the first device when the first device is determined to execute the controlling boot image, the second device to be a resource for the first boot image. The first device sends a second boot image stored on the first device to the second device when the second device is determined to execute the controlling boot image, wherein the first device to be a resource for the second boot image.08-28-2008
20080209197Method to Add IPV6 and DHCP Support to the Network Support Package - Extending the network support package to accept network addresses in IPv6 format and allow the use of other boot discovery protocols, such as DHCP, to acquire the information needed to boot a system using a file on a remote server. A mechanism is added to the network support package to enable/allow the specification of additional boot discovery protocols and additional network address formats. The mechanism defines qualifier keywords that are added to the boot arguments and processed by the network support package. The qualifier keywords modify the boot arguments associated with a bootstrap method by specifying a way to acquire the arguments (i.e., a specific boot discovery protocol), the format of the arguments, and other parameters associated with the arguments. Qualifier keywords are optionally appended before the arguments. Multiple qualifier keywords may be added to the boot arguments at a time, and the keywords can be applied in their order within the arguments.08-28-2008
20110271090Providing a secure execution mode in a pre-boot environment - In one embodiment, the present invention includes a method to establish a secure pre-boot environment in a computer system; and perform at least one secure operation in the secure environment. In one embodiment, the secure operation may be storage of a secret in the secure pre-boot environment.11-03-2011
20090276615SERVO DEVICE AUTO-BOOTED UPON POWER SUPPLY RECOVERY AND METHOD THEREOF - A servo device auto-booted upon power supply recovery and a method thereof include a plurality of mainboards, a circuit board, a power supply, a memory unit, an auto-booting unit, and a switching unit. The switching unit and the memory unit storing a basic input/output system (BIOS) are disposed on the circuit board. The auto-booting unit outputs a selection signal when the power supply recovers the supply of power after an abnormal power failure, and then the switching unit transmits the BIOS to each mainboard sequentially according to the selection signal, so as to finish the auto-booting of the entire servo device.11-05-2009
20090276616SERVO DEVICE AND METHOD OF SHARED BASIC INPUT/OUTPUT SYSTEM - A servo device and method of a shared basic input/output system (BIOS) include a plurality of mainboards, a circuit board, and a switching control unit. When a disk boot failure event of the mainboard occurs, a transmission path is conducted between the mainboard where the disk boot failure event occurs and a memory unit of another mainboard according to a control signal generated by the switching control unit in response to the disk boot failure event of the mainboard, such that the mainboard shares the BIOS.11-05-2009
20090276614SERVO DEVICE AND METHOD OF SHARING BASIC INPUT/OUTPUT SYSTEM - A servo device and a method of sharing a basic input/output system (BIOS) include a plurality of mainboards, a circuit board, and a memory unit, and a switching unit disposed on the circuit board. A single memory unit stores a plurality of BIOS entity program segments respectively corresponding to a mainboard model, and transmits the BIOS entity program segments corresponding to the model of the mainboard for receiving the BIOS to the mainboard through the switching unit, so that the mainboards of various models may share the BIOS.11-05-2009
20090282233TESTING AND ALERT DEVICE AND METHOD FOR POWER LEAKAGES - A testing and alert device for power leakages of a computer includes a basic input/output system (BIOS) chip located on a motherboard of the computer, a south bridge chip connected to the BIOS chip, and an alarm device controlled by the BIOS chip. The south bridge chip has a first general purpose input/output terminal capable of being coupled to a ground of an exterior power source. The BIOS chip is capable of detecting the input signal of the first general purpose input/output terminal of the south bridge chip and outputting an alarm command to initiate the alarming device when the input signal from the first general purpose input/output terminal is at a high level.11-12-2009
20090287918MANAGING EXTENSIBLE FIRMWARE INTERFACE (EFI) BOOT DATA - A computer system has extensible firmware interface firmware. The EFI firmware loads incomplete virtual boot data from a resource manager and then completes the boot data. The completed boot data is used to find an operating-system image to boot. The complete virtual boot data is transferred to the resource manager.11-19-2009
20090287916GRID COMPUTING RESOURCES AND A METHOD OF USE THEREOF - A method of using an information handling system can include communicating accessibility of a resource to a grid system, powering down the information handling system, receiving a wake request from the grid system, booting the information handling system into a grid mode where the resource is accessible to the grid system. Machine-executable code for an information handling system can include a method for indicating that a resource in the information handling system is accessible to a grid system, communicating that the resource is accessible to the grid system, and placing the information handling system into a low power state. An information handling system can include a processor that can indicate that a resource is accessible to a grid system, communicate to the grid system that the resource is accessible, and place the information handling system into a low power state.11-19-2009
20090287919Electronic Device - An electronic device includes a power supply unit, a control unit, a first boot circuit, and a data encryption unit. The control unit outputs a boot signal for causing the power supply unit to start supplying power. The first boot circuit interconnects the power supply unit and the control unit for transmitting the boot signal. The data encryption unit is for interconnecting the power supply unit and the control unit so as to form a second boot circuit through which the boot signal is transmitted and for cutting off the first boot circuit.11-19-2009
20100293366FREQUENCY AND SYMBOL LOCKING USING SIGNAL GENERATED CLOCK FREQUENCY AND SYMBOL IDENTIFICATION - Methods and systems are described for displaying video data after a hot plug event during a start-up dead period. In particular, approaches for receiving data, determining whether link training can be performed and, if not, self-configuring a receiver to display the information in a proper format even during the dead period.11-18-2010
20080270782BOOT PROCESS - When a secure boot operation fails, the operation of a mobile telecommunications terminal can be severely impacted. In order to lower the impact on the user, one example embodiment of the invention relates to a method for automatically implementing a “safe boot” mode, whereby code can be accessed solely for the purpose of handling failed operations and if necessary providing limited services from the failing terminal.10-30-2008
20120297181Persisting a Provisioned Machine on a Client Across Client Machine Reboot - Systems and methods are provided for implementing a provisioned machine that persists across a client machine reboot. For example, a bootstrap function executing on a client machine may identify a delta disk stored on a physical disk of the client machine prior to booting up the operating system of the client machine. The bootstrap function may establish the path to the delta disk during the boot up of the operating system of the client machine. A provisioned machine may then be established based on the delta disk and the remote base disk to form a virtual disk of the operating system. Subsequently, the client machine may shut down, reboot and re-establish the provisioned machine based on the delta disk stored locally on the client machine.11-22-2012
20120297180METHOD OF SWITCHING BETWEEN MULTIPLE OPERATING SYSTEMS OF COMPUTER SYSTEM - A method of switching between multiple operating systems of a computer system includes the following steps. Firstly, the computer system is in an environment of a first operating system. Then, a system management interrupt is triggered to allow the computer system to enter a system management mode, and a controlling authority of the computer system is transferred from the first operating system to a basic input output system. Then, a backup of a first environmental parameter of the first operating system is created. If the second environmental parameter is not included in the computer system, a second operating system is loaded in a normal mode. On the other hand, if the second environmental parameter is included in the computer system, the second operating system is booted according to the second environmental parameter.11-22-2012
20080215874System and Method for Masking a Boot Sequence by Providing a Dummy Processor - A system and method for masking a boot sequence by providing a dummy processor are provided. With the system and method, one of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and/or thermal signatures that mask the electromagnetic and/or thermal signatures of the actual boot processor. The execution of the masking code on the non-boot processors preferably generates electromagnetic and/or thermal signatures that approximate the signatures of the actual boot code execution on the boot processor. One of the non-boot processors is selected to execute masking code that is different from the other masking code sequence to thereby generate a electromagnetic and/or thermal signature that appears to be unique from an external monitoring perspective.09-04-2008
20080215870Method and apparatus for loading boot code - Apparatus for loading boot code including a non-volatile memory for the storage of the boot code, a micro-control unit for the storage of a small boot code, a microprocessor, and a volatile memory; and wherein the microprocessor copies the boot code from the non-volatile memory into the volatile memory using the small boot code. A corresponding method is also disclosed.09-04-2008
20080215873SYSTEM AND METHOD FOR PRESENTING COPY PROTECTED CONTENT TO A USER FROM A PORTABLE STORAGE DEVICE - A device for presenting content to a user is utilized in combination with a general purpose computer. The computer has a processor, a computer communications interface, a computer memory and an operating system. The operating system has one or more file management tools. The device has a housing, a device communications interface and a device memory. The device memory comprises a boot partition which includes boot software. The boot software is copied from the device into the computer memory and is executed from the computer memory by the processor. The device memory also comprises a secure partition inaccessible by the file management tools and having content stored thereon. The device memory also comprises content delivery software, which is copied to the computer memory, and when executed by the processor from the computer memory can access the content from the secure partition and present it to the user as sensory data.09-04-2008
20080215872METHOD OF BOOTING ELECTRONIC DEVICE AND METHOD OF AUTHENTICATING BOOT OF ELECTRONIC DEVICE - Provided is a method of booting an electronic device including a host central processing unit (CPU) and a security module. The method includes: the host CPU starting to boot a system by using boot information in response to a reset or power on event of the electronic device; and when an authentication start instruction is not received by the security module from the host CPU until a first predetermined period elapses after an occurrence of the reset or power on event of the electronic device, controlling an operation of the host CPU by the security module. According to the method, when the authentication start instruction is received before the first predetermined period elapses, the security module authenticates the boot information and controls the operation of the host CPU based on an authentication result. A method of authenticating a boot of the electronic device in the security module is also provided.09-04-2008
20100146256Mixed-Mode ROM/RAM Booting Using an Integrated Flash Controller with NAND-Flash, RAM, and SD Interfaces - A Secure Digital (SD) flash microcontroller includes a memory interface to SRAM or DRAM, a flash-memory interface, and a SD interface to an SD bus. The flash memory can be on a flash bus or on the SD bus. The microcontroller is booted from boot code stored in the flash memory. An initial boot loader is read from the first page of flash by a state machine and written to a small RAM. A central processing unit (CPU) in the microcontroller reads instructions from the small RAM, executing the initial boot loader, which reads more pages from flash. These pages are buffered by the small RAM and written to a larger DRAM. Once an extended boot sequence is written to DRAM, the CPU toggles a RAM_BASE bit to cause instruction fetching from DRAM. Then the extended boot sequence is executed from DRAM, copying an OS image from flash to DRAM.06-10-2010
20100138642INFORMATION HANDLING SYSTEMS INCLUDING NETWORK ADAPTERS AND METHODS OF BOOTING THE INFORMATION HANDLING SYSTEMS USING BOOT CONFIGURATION INFORMATION FROM REMOTE SOURCES - A system can be operable to receive boot configuration information from a remote source independent of the type of initiator (e.g., software or hardware) used by an information handling system. The information handling system having the initiator can be coupled to the remote source, which includes the boot configuration information, and a storage array that includes a boot image. While operating within a pre-operating system (pre-OS) environment, the information handling system can create a boot configuration table and populate the boot configuration table with the boot configuration information. The boot configuration information can include an address for the boot image and information for configuring an OS initiator to be used when loading the OS.06-03-2010
20100138641Mechanism for enabling a program to be executed while the execution of an operating system is suspended - A mechanism is provided for enabling an auxiliary program to be executed in a computer system, after an operating system has been loaded and executed, without rebooting the computer system. This may be achieved by suspending execution of the operating system, executing the auxiliary program while execution of the operating system is suspended, and then resuming execution of the operating system. In suspending execution of the operating system, state information defining a current state of the computer system is saved. In resuming execution of the operating system, the saved state information is used to restore the computer system to the current state. No state information or data should be lost as a result of suspending and resuming execution of the operating system. From the viewpoint of the operating system and the applications (if any) executing within the environment provided by the operating system, execution of the auxiliary program is transparent.06-03-2010
20080244253SYSTEM, METHOD AND PROGRAM FOR SELECTIVELY REBOOTING COMPUTERS AND OTHER COMPONENTS OF A DISTRIBUTED COMPUTER SYSTEM - Selectively rebooting components of a computer system. One or more tables which list respective costs to reboot the components and respective likelihoods that reboots of the respective components will correct respective problems with the computer system are generated. Each of the costs is based on a time to reboot or delays caused by the reboot of the respective component. In response to a subsequent problem with the computer system, an order to reboot components of the computer system is determined from the table based on the costs and likelihoods that the reboot will correct the problem, such that a component of the computer system characterized by a relatively low cost and high likelihood to correct the problem will be rebooted before another component characterized by a relatively high cost and low likelihood to correct the problem. The tables are updated through actual experience.10-02-2008
20080244256Parallel link reset in link based system - A link based system including a plurality of processors is reset when transitioning from a slower speed to a higher speed mode during a booting process. One processor may coordinate the simultaneous establishment of link resetting of a plurality of other processors. In one embodiment, the processors may operate beginning with the farthest processor to reset their local links. Each processor sets its local links and if it determines, based on the speed of the link that the link has already been reset, it moves on to the next link.10-02-2008
20080244255Method for not resetting memory while booting computer through hardware booting button thereof - A method for not resetting a memory while booting a computer through a hardware booting button is adapted to utilize a general hardware booting mode and increases steps that judges whether preset values are respectively stored in specific address of the memory. If it is the preset value, allowing the memory to be reset is not executed before booting sequences are executed, the booting sequences are directly processed and data stored in the memory is allowed to maintain so that it will not happen that the data stored in the memory is cleared to cause embarrassment to a user because the memory is not reset.10-02-2008
20080276082COMPARING CHRACTERISTICS PRIOR TO BOOTING DEVICES - A system that comprises a first electronic device comprising a non-volatile memory. The system also comprises another electronic device in communication with the first electronic device and comprising a second non-volatile memory. The system further comprises a control logic coupled to the first and second electronic devices. Each of the non-volatile memories stores electrical characteristics associated with a corresponding electronic device. Prior to booting up the first or second electronic device, the control logic obtains and compares at least some of the electrical characteristics and disables the communication as a result of the comparison.11-06-2008
20110208955MACHINE-READABLE STORAGE MEDIA FOR DISPLAY OF A BASIC INPUT/OUTPUT SYSTEM (BIOS) PRODUCTIVITY DISPLAY - Example embodiments relate to a machine-readable storage medium encoded with instructions executable by a processor of a computing device including a display device. The machine-readable storage medium may include instructions that access a stored indication upon boot-up of the computing device using a Basic Input Output System (BIOS). In addition, the machine-readable storage medium may include instructions that determine, using the stored indication, whether an operating system (OS) of the computing device exited properly, and instructions that display a BIOS productivity display using the display device when it is determined that the computing device exited properly. Still further, the machine-readable storage medium may include instructions that permit the OS to display a recovery display when it is determined that the OS did not exit properly.08-25-2011
20130219159SINGLE-WIRE BOOTLOADER FOR TARGET DEVICE WITH SELF-PROGRAMMING CAPABILITY - A single-wire bootloader software architecture is disclosed that interfaces with any host device that has a serial port to program memory of a target device using only a single general-purpose I/O pin. The single-wire bootloader does not require any chip hardware resource modules. Instead, the single-wire bootloader implements a single-wire UART in software that monitors a single general-purpose I/O pin for commands from the host device.08-22-2013
20090265537COMPUTER SYSTEM, BIOS STRUCTURE AND BOOT METHOD THEREOF - A BIOS structure is adapted for a computer system. The BIOS structure provided by the present invention has a boot block. In addition, the boot block is divided into a stationary data sector and an updatable data sector. When the BIOS needs to be updated, program codes of the BIOS are updated from the updatable data sector. Furthermore, the computer system determines to execute the program codes of the BIOS from the stationary data sector or the updatable data sector according to a status value.10-22-2009
20090049292Computer with Extensible Firmware Interface Implementing Parallel Storage-Device Enumeration - A computer includes an extensible firmware interface with a storage device enumeration function that performs storage device enumeration operations in parallel.02-19-2009
20080282077APPARATUS, METHOD AND PROGRAM PRODUCT FOR INITIATING COMPUTER SYSTEM OPERATION - A computer system which includes a CPU for performing various processes by program control and storage elements which store at least one operating system and a BIOS, wherein upon starting a system, the CPU recognizes the system's own hardware configuration, and starts a selected one operating system stored in the storage elements in accordance with the recognized hardware configuration under the control of the BIOS.11-13-2008
20080288764BOOT-SWITCHING APPARATUS AND METHOD FOR MULTIPROCESSOR AND MULTI-MEMORY SYSTEM - A boot-switching apparatus suitable for a system having a plurality of processors and a plurality of memories and a method thereof are provided. While booting the system, a single timer is used for counting down a time-out and it is determined whether a disabling signal sent by a Basic Input/Output System (BIOS) is received during the countdown. If the disabling signal is not received and the time-out is up, whether the processors operate normally is further detected and a plurality of detection signals is obtained. Next, whether each of the detection signals matches its corresponding enabling signal is determined. If the two do not match, the corresponding processor is disabled. If all of them match, the memories are switched. Accordingly, the problem of misjudgment in the prior art can be resolved and the system can be led to select normal processor and memory for executing its booting.11-20-2008
20080288765Computer system capable of reducing booting time and method thereof - The present invention discloses a method for reducing booting time of a computer system, and the method is applied in a computer booting process. If a computer receives an easy booting signal, the computer will read an easy booting data built in a basic input output system (BIOS) of the computer, start an operating system (OS) of the computer and enable at least one terminate-and-stay-resident (TSR) program of the operating system, such that the whole booting process can be completed quickly without wasting unnecessary time on self-testing all hardware devices for the booting process or loading all terminate-and-stay-resident programs.11-20-2008
20080313454SYSTEM AND METHOD FOR RAPID BOOT OF SECONDARY OPERATING SYSTEM - The primary operating system of a computer such as a notebook computer is stored on disk in a hard disk drive and a smaller, secondary operating system such as an email operating system, wireless phone operating system, DVD player operating system, etc. is stored on disk and is transferred to flash memory within the HDD upon power-down of the primary operating system. In this way, should the user subsequently elect to power up the computer only for a limited secondary purpose, the user can elect to boot the associated secondary operating system from flash memory of the HDD without having to spin up the disks, saving energy and reducing boot time.12-18-2008
20100287364BOOT SYSTEMS AND METHODS, AND RELATED DEVICES - Boot systems and methods are provided. The boot system includes an IO (Input/Output) chip, a memory device, and a BIOS (Basic Input/Output System). The memory device is coupled to the IO chip, and includes at least a rescue OS (Operating System). The BIOS reads the rescue OS from the memory device via the IO chip, and boots an electronic device based on the rescue OS.11-11-2010
20100287365DEPLOYMENT OF BOOT IMAGES IN DISKLESS SERVERS - In one embodiment, a system, comprises a first computer system comprising at least a first diskless server, at least a first RAID controller coupled to the first diskless server, at least a first storage pool coupled to the RAID controller, and a remote management server coupled to the RAID controller via a an out-of-band communication link. The remote management server comprises a boot management module which, when executed, initiates a command to instruct the RAID controller to create at least a first logical volume in a memory module coupled to the RAID controller, transmits the command to the RAID controller via the out-of-band communication link, and transmits a boot image from the remote management server to the RAID controller via the out-of-band communication link. The RAID controller creates the first logical volume for the boot image in response to the command, and stores the boot image in the first logical volume.11-11-2010
20080270781Secure compter system update - In one embodiment a computer system, comprises a processor, a trusted platform module comprising at least one platform configuration register, a basic input/output system, and logic to unseal at least one current key in the trusted platform module, initiate an update to the basic input/output system, obtain, with the update, at least a component of one expected value for a platform configuration register in the trusted platform module, seal at least one key using the at least one expected value for a platform configuration register, and install the basic input/output system update.10-30-2008
20120060022METHOD AND SYSTEM FOR ADJUSTING CPU FREQUENCY - A method for adjusting central processing unit (CPU) frequency according to the CPU utilization rate in a computer, the method includes the following steps. A Basic Input Output System (BIOS) is booted by turning on the computer. A performance monitor in the CPU is started by the BIOS. A timer is turned on by the BIOS. The system management interrupt program is read by the timer during a time period. A number of clock signals and time values is recorded by the performance monitor in two adjacent time periods. The CPU utilization rate is determined by the performance monitor according to number of clock signals, the time values, and a CPU clock speed. A CPU frequency is adjusted by the BIOS according to the CPU utilization rate. The computer's operation system (OS) is booted by the BIOS.03-08-2012
20120144180BASEBOARD MANAGEMENT CONTROLLER AND METHOD FOR SHARING SERIAL PORT - A baseboard management controller (BMC) connects with a COM serial port. The BMC includes an input queue and an output queue. If a basic input output system (BIOS) of the BMC has been initialized, the COM serial port is used by the BIOS. When a processor of the BMC sends a control command to a sharing system of the BMC, the input queue and the output queue are converted to time division multiplex (TDM) queues. The COM serial port may be used by the BIOS or by the BMC according to an ID flag of each element of the TDM queues.06-07-2012
20080270783METHOD FOR DETERMINING A REBOOTING ACTION OF A COMPUTER SYSTEM AND RELATED COMPUTER SYSTEM - A method for determining a rebooting action of a computer system includes: a keyboard controller of the computer system detecting whether a signal representing a system stage transformation is transmitted from a south bridge chipset; determining whether a system status flag is set as “ON” when the signal representing the system stage transformation is received by the keyboard controller; setting a rebooting flag as “ON” and setting the system status flag as “OFF”; determining whether a system sleeping flag representing the computer system isn't activated is “ON” and determining whether the rebooting flag is set as “OFF” according to this determined result; detecting whether the signal representing the system stage transformation is transmitted from the south bridge chipset; determining whether the rebooting flag is set as “ON”; and determining whether the computer system executes the rebooting action according to a determined result of whether the rebooting flag is “ON”.10-30-2008
20100005285COMPUTER SYSTEM AND METHOD OF BOOTING THE SAME - Provided are a computer system and a method of booting the same. The computer system includes: a first storage unit for storing a booting-related program including an operating system program and data, the stored program and data being retained even when a power voltage is not supplied; and a second storage unit for storing data, the data being lost when the power voltage is not supplied for a predetermined time or longer. The method includes: a first step of performing a booting operation using the booting-related program stored in the first storage unit and storing the booting-related program stored in the first storage unit in the second storage unit when the second storage unit is detected and the booting-related program is not stored in the second storage unit; a second step for performing a booting operation by executing the booting-related program stored in the second storage unit when the second storage unit is detected and the booting-related program is stored in the second storage unit; and a third step of backing up the booting-related program stored in the second storage unit to the first storage unit when a predefined backup condition is met.01-07-2010
20100005284DEVICE HAVING SHARED MEMORY AND METHOD FOR TRANSFERRING CODE DATA - The present invention relates to a device having a shared memory and a code data transmitting method. According to an embodiment of the present invention, the digital processing device can include n processors, n being a natural number of 2 or greater; and a shared memory, coupled to each of the processors through independent buses and having a boot section allotted, the boot section being for writing a boot program code to be used for booting of at least one processor.01-07-2010
20100005281POWER-ON INITIALIZATION AND TEST FOR A CASCADE INTERCONNECT MEMORY SYSTEM - A memory buffer, memory system and method for power-on initialization and test for a cascade interconnect memory system. The memory buffer includes a bus interface to links in a high-speed channel for communicating with a memory controller via a direct connection or via a cascade interconnection through an other memory buffer. The interface is operable in a SBC mode and a high-speed mode. The memory buffer also includes a field service interface (FSI) slave for receiving FSI signals from a FSI master. In addition, the memory buffer includes logic for executing a power-on and initialization training sequence initiated by the memory controller.01-07-2010
20110125996System And Method For Supporting Multiple Hardware Platforms With A Single Disk Image - Exemplary embodiments of the present invention disclosed herein relate to a method and system for providing data in response to a request. An exemplary method comprises receiving a request for data and determining whether the request contains a specific pattern of data intended to enable a patching process. The exemplary method further comprises providing a response containing patched data if the request contains the specific pattern of data and providing a response containing un-patched data if the request does not contain the specific pattern of data.05-26-2011
20110125995METHOD AND APPARATUS FOR DOWNLOADING SECURE MICRO BOOTLOADER OF RECEIVER IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM - A method and apparatus for downloading a Secure Micro (SM) bootloader of a receiver in a Downloadable Conditional Access System (DCAS) is provided. The method includes generating, by a transmitter, an SM bootloader for the receiver and adding the generated SM bootloader to firmware to be transferred to the receiver, sending, by the transmitter, the firmware to the receiver, and performing, by the receiver, registration by receiving the firmware, locating an SM bootloader in the firmware, and registering the located SM bootloader. In the DCAS, a receiver may download or install an SM bootloader through an online or offline procedure.05-26-2011
20110125993DISPLAY APPARATUS AND CONTROL METHOD THEREOF - A display apparatus is provided, including: a signal processing unit which comprises at least one device, and processes a received image signal to display an image; a volatile memory unit which comprises a first memory area allotted to an application for displaying the image and a second memory area that is different from the first memory area; and a control unit which allots the second memory area to the at least one device if the application is not updated, and allots at least a part of the second memory area for updating the application if the application is updated.05-26-2011
20110125994METHODS AND SYSTEMS FOR SECURE ONLINE BROWSING - An external operating system (OS) that is separate from the internal OS of a computer is provided. The external OS may be stored on a USB device, a CD ROM, or other devices. The device that stores the external OS may be removable or non-removable, may have an internal flash memory of varying sizes, and may include browser software. The external OS, flash memory size and browser software may be customizable according to user requirements. The computer may boot up from the device into the external OS, rather than into the internal OS of the computer. Once the computer is booted up, the user has the ability to browse online, with all transactions occurring in the external OS, partitioned from the user's internal computer hard drive, thereby preventing infecting the computer by malware or other malicious software.05-26-2011
20100268928DISABLING A FEATURE THAT PREVENTS ACCESS TO PERSISTENT SECONDARY STORAGE - During a boot block part of a boot procedure in an electronic device having a persistent secondary storage, a feature that prevents access to the persistent secondary storage is disabled. The persistent secondary storage is accessed during the boot block part of the boot procedure to retrieve information to perform a predetermined task.10-21-2010
20110208957BIOS BOOTABLE RAID SUPPORT - A computing apparatus comprises a persistent storage comprising a system code that implements Redundant Array of Independent Disks (RAID) protection on a boot volume.08-25-2011
20120198220METHODS AND RECONFIGURABLE SYSTEMS TO OPTIMIZE THE PERFORMANCE OF A CONDITION BASED HEALTH MAINTENANCE SYSTEM - Methods and reconfigurable systems are provided for monitoring the health of a complex system. The reconfigurable system comprises a plurality of standardized executable application modules containing instructions to perform one of a plurality of different standardized functions. The system further comprises a plurality of computing nodes arranged in a hierarchical structure comprising one or more layers of computing nodes. Each computing node of the plurality runs a host application and a workflow service module, each computing node thereby being configured by a configuration file that directs the execution of any of the standardized executable application modules in a cooperative fashion by the host application via the workflow service module. The system also comprises a loading means for populating each computing node with one or more standardized executable application modules of the plurality, a communication means, and a configuration means for programming the populated standardized executable application modules.08-02-2012
20110208956CONTROL DEVICE FOR A VEHICLE AND METHOD FOR A DATA UPDATE FOR A CONTROL DEVICE FOR A VEHICLE - A control device for a vehicle and a method for a data update for a control device for a vehicle are provided, in which a first memory is provided that has a first area in which a bootloader is provided and that has a second area in which at least one application program is provided. Furthermore, a second memory is provided, in which first data for the at least one application program are provided. Furthermore, an interface is provided that provides second data for an update at least of one part of the first data. In addition, a control circuit is provided that calls up the bootloader for the update of the at least one part of the first data by the second data. The bootloader extracts from the second area of the first memory third data that indicate the third area of the second memory in which the second data for the update are to be written.08-25-2011
20110208954IMPLEMENTING KNOWN SCRAMBLING RELATIONSHIP AMONG MULTIPLE SERIAL LINKS - A method and circuit for implementing known scrambling relationship among multiple serial links, and a design structure on which the subject circuit resides are provided. A transmit Linear Feedback Shift Register (LFSR) is provided with each of the multiple serial links for scrambling transmitted data. A receive Linear Feedback Shift Register (LFSR) is provided with each of the multiple serial links for descrambling received data. Each of the transmit LFSRs is initialized to a unique value. Each transmit LFSR conveys a current unique value to a receive LFSR for synchronizing the transmit LFSR and receive LFSR to begin scrambling and descrambling data.08-25-2011
20110208953EVENT TIME MANAGEMENT IN AN ELECTRIC VEHICLE CHARGING STATION WITHOUT A BATTERY-BACKED REAL TIME CLOCK - An electric vehicle charging station, which does not include a battery-backed Real Time Clock, is in a charging station network managed by a charging station network server. Upon booting, the charging station requests actual real time from a remote source. While the charging station has not received the actual real time, it records the time of charging station specific events in a local system time format that resets when the charging station loses power. The charging station maintains the events recorded in their local system time until actual time is received. When actual real time is received, the charging station synchronizes its local system clock with the actual real time and converts the time of each event into real time format. When actual time is received, the charging station converts the time of each event into real time format. After the time of the events are converted to real time format, they are communicated to the charging station network server for further processing. After synchronizing its local clock with actual real time, the charging station records the time of any subsequent events in actual real time.08-25-2011
20090132798ELECTRONIC DEVICE AND METHOD FOR RESUMING FROM SUSPEND-TO-MEMORY STATE THEREOF - An electronic device and a method for resuming from a suspend-to-memory (S3) state thereof are provided. The electronic device comprises a detecting circuit, a storage unit and a booting module. The detecting circuit outputs a state change value when detecting a state variation of any non-hot plug device. The storage unit is used for storing the state change value output from the detecting circuit. When the electronic device is resumed from the S3 state to the working state, a normal booting procedure is performed on the electronic device if the state change value is detected by the booting module.05-21-2009
20090083534REMOTE PC BOOTUP VIA A HANDHELD COMMUNICATION DEVICE - A method computer usable medium and computer system circuitry are disclosed for starting or “booting up” a computer from a remote location using a remote command device such as a cellular telephone. The method and system includes a secure means for remotely storing and transmitting security passwords.03-26-2009
20090164770HYPERVISOR RUNTIME INTEGRITY SUPPORT - A method and system are disclosed. In one embodiment the method includes computing, during runtime, an active hash value of a hypervisor on a computer platform using an authenticated integrity agent. The method also includes comparing the active hash value to a registered hash reference value. The method also includes verifying the integrity of the hypervisor when the active hash value and the registered hash reference value match.06-25-2009
20090164771METHOD AND APPARATUS FOR QUICKLY REANIMATING DEVICES FROM HIBERNATION - A system that causes a computing device to enter a hibernation mode. During operation, the system creates a hibernation image for the computing device by identifying processes that do not have visible user interface elements, and generating the hibernation image so that processes with visible user interface elements can be reanimated from the hibernation image first to get the computing device reanimated quickly, while the identified processes are reanimated later. Next, the system stores the hibernation image in non-volatile storage. The system then causes the computing device to enter the hibernation mode, wherein the active state of the computing device is preserved in non-volatile storage while power to volatile storage is turned off.06-25-2009
20090164769POLICY BASED PROVISIONING OF SHARED BOOT IMAGES - A method for policy based provisioning of shared boot images includes querying a storage name server for boot target that is in an accessible discovery domain. Boot target information about the boot target is received. A login request is sent to the boot target. The login request includes a flag specifying whether the login request is a first login request after a reboot.06-25-2009
20090187754SYSTEM WITH AT LEAST TWO BIOS MEMORIES - A system with at least two basic input-output system (BIOS) memories includes a chip unit, a control unit, and two or more BIOS memories. The chip unit includes a control pin. The control unit includes an enable pin and N output pins. The enable pin of the control unit is connected to the control pin of the chip unit. Each of the N BIOS memories is connected to one of the N output pins of the control unit correspondingly. The chip unit is configured to start the control unit. The control unit is configured to start the N BIOS memories according to voltages of the output pins of the control unit. N is an integer greater than one.07-23-2009
20090138694SPI AUTO-BOOT MODE - Systems and methods of detecting an auto-boot mode and booting data from a serial peripheral interface to a processor without the need of a read instruction utilizing a serial peripheral interface having an auto-boot mode detector are provided. In one embodiment, a serial peripheral interface comprises a serial processing component configured to serially communicate data between the processor and at least two peripherals, and an auto-boot component operably coupled to the serial processing component, comprising an auto-boot mode detector configured to determine whether a boot mode exists based on detecting whether serial input data is received during a predetermined wait state, and configured to selectively boot data to a start address associated with the processor based on the boot mode determination.05-28-2009
20090049291CONSISTENT DATA STORAGE SUBSYSTEM CONFIGURATION REPLICATION IN ACCORDANCE WITH SEQUENCE INFORMATION - Consistency for replicating data storage subsystem configurations in accordance with a “golden” configuration file. A data storage subsystem comprises a blade system with a plurality of slots, the blade system configured to support a plurality of blades and a storage system, each arranged in a predetermined slot of the blade system. A management module operates the blade system to first power on the storage system. In accordance with a “golden” configuration file, the storage system passes sequence information to the management module. The management module powers on the plurality of server blades in accordance with the sequence information. The storage system is configured with the “golden” configuration file to log on the server blades in accordance with the power on sequence to logically configure the server blades in accordance with the “golden” configuration file.02-19-2009
20110225404METHOD FOR BOOTING PORTABLE OBJECTS WITH MULTIPLE COMMUNICATION INTERFACES - A boot sequence method comprises a determination step 09-15-2011
20090063839LOW POWER DATA TRANSFER MODE FOR BATTERY POWERED PERSONAL COMPUTING DEVICES - Embodiments of the present invention provide a method, system and computer program product for a low power data transfer mode for mobile computing devices. In an embodiment of the invention, a method for low power data transfer in a battery powered computing device can be provided. The method can include powering up a battery powered computing device, booting into a primary personal computing operating system in the device and storing a document into fixed storage for the device, and subsequently re-booting into an auxiliary low-power consumption operating system in the device, establishing a short range radio frequency communications link between the battery powered computing device and an external pervasive device, and transmitting the stored document to the pervasive device over the short range radio frequency communications link.03-05-2009
20090063838MULTI-OPERATING SYSTEM DOCUMENT EDITING MODE FOR BATTERY POWERED PERSONAL COMPUTING DEVICES - Embodiments of the present invention provide a method, system and computer program product for a low power document editing mode for mobile computing devices. In an embodiment of the invention, a battery powered computing device can be configured for power optimized document editing, the computing device. The device can include a central processing unit (CPU), both coupled to a battery, memory, fixed storage and a display within a single computing case. The device also can include a primary personal computing operating system and also an auxiliary low-power consumption operating system each stored in fixed storage, each including a configuration to access an editable document in the fixed storage. Finally, the device can include a boot read only memory (ROM) programmed to selectively bootstrap into either the primary personal computing operating system or the auxiliary low-power consumption operating system.03-05-2009
20090063843Systems and Methods for Booting a Codec Processor over a High Definition Audio Bus - Systems and methods for booting a programmable processor such as a DSP that is incorporated into an HDA codec. The codec and a system memory containing boot program instructions are connected to an HDA bus. In a first mode, the DSP receives boot program instructions via the HDA bus and boots using these instructions. In a second mode, the DSP boots from instructions that are contained in a memory that is connected to the DSP. In one embodiment, the memory connected to the DSP is a component of a plug-in card, and the DSP is configured to determine whether the plug-in card is present, then boot from the memory on the plug-in card if it is present or boot from the system memory via the HDA bus if the plug-in card is not present.03-05-2009
20090144536Monitoring method and monitor apparatus - A monitoring method and a monitor apparatus thereof are disclosed. The monitor apparatus is used to monitor an USB port of a computer. The monitor apparatus comprises an input/output control unit and a basic input/output system code storage unit. The basic input/output system code storage unit is used to store a basic input/output system code. A monitor method comprises following steps: executing the basic input/output system code; determining whether the USB port connects with a USB device or not; if the USB port connects with a USB device, reading out an identification of the USB device; determining whether the identification is a certified identification or not; and executing a correspondingly process if the identification is not a certified identification.06-04-2009
20090144531BOOTING WITH SUB SOCKET PARTITIONING - A method of booting up a computer system comprising a first multi-cored processor comprising a first plurality of cores and a second multi-cored processor comprising a second plurality of cores is disclosed. The method may comprise configuring a first partition comprising a first one or more cores from the first plurality of cores and from the second plurality of cores, configuring a second partition comprising a second one or more cores from the first plurality of cores and from the second plurality of cores, and configuring a third partition comprising a third one or more cores from the first plurality of cores and one or more cores from the second plurality of cores.06-04-2009
20090259836RUNNING OPERATING SYSTEM ON DYNAMIC VIRTUAL MEMORY - A method making possible booting up and running a system image of an operating system together with diskspace or drivespace, either free or stored with data or application files, for use on the type of storage medium, such as but not limited to internal physical memory or internal RAM, that virtual memory allocated out of the system memory pool upon boot-up can be and is used for mapping for access of such type of storage medium by the operating system under concern in device(s), including computer system(s) or computer-controlled device(s) or operating-system-controlled device(s) capable of running the operating system under concern.10-15-2009
20090144532EFFICIENT METHOD FOR OPERATING SYSTEM DEPLOYMENT - Method and computer storage media for efficiently deploying an operating system are provided. A virtual hard drive file is received by a computing device. Upon receipt of the virtual hard drive file, the computing device is enhanced to expose and mount the virtual hard drive as a drive and boot option for the computing device. Thereafter, an initial boot sequence may be commenced utilizing the virtual hard drive file as the boot source. In some embodiments, a boot manager enhancer and a translator are utilized to do one or more of expose, mount and translate the virtual hard drive file. In some embodiments, a virtual SCSI miniport driver is utilized to do one or more of expose, mount, and translate the virtual hard drive file.06-04-2009
20110225412BOOTING AN OPERATING SYSTEM OF A SYSTEM USING A READ AHEAD TECHNIQUE - In one embodiment, the present invention includes a method for generating a list of files accessed during an operating system (OS) boot process to profile the OS boot process, and optimizing the list of files to generate an optimized file list for use in future OS boot processes, where the optimizing is according to a first optimization technique if the files were accessed from a solid state medium and according to a second optimization technique if the files were accessed from a rotating medium. Other embodiments are described and claimed.09-15-2011
20110225413METHOD, SYSTEM AND ARTICLE OF MANUFACTURE FOR SYSTEM RECOVERY - Provided are a method, system, and article of manufacture for system recovery. An operating system and a backup copy of the operating system are both maintained in a partition of a computational device. A boot loader receives an indication to load the backup copy of the operating system. The boot loader loads the backup copy of the operating system. The computational device is rebooted with the loaded backup copy of the operating system.09-15-2011
20110225409Method and Apparatus for Software Boot Revocation - A composite customer ID (CCID) is stored in the OTP memory of integrated circuit chipsets used by a number of different customers. The CCID includes individual customer IDs (CIDs) at defined index positions, each corresponding to a different customer. Each chipset allows or disallows software booting, based reading a certificate index value from a given customer's certificate, reading an OTP CID from OTP, as pointed to the by certificate index value, and evaluating the OTP CID with a certificate CID read from the certificate. Thus, while CCID carries information for a plurality of customers, each customer's certificate points only to that customer's OTP CID, which can be changed to revoke that customer's certificate without revoking the other customers' certificates. The CCID also may include a version number, where the chipsets allow or disallow software booting based on evaluating the certificate version number in view of the CCID version number.09-15-2011
20110225406System and Method for Pre-Operating System Encryption and Decryption of Data - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, an encryption accelerator communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The encryption accelerator may be configured to encrypt or decrypt data in response to a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) monitor for input/output operations occurring prior to loading of an operating system into the memory; and (ii) in response to detection of an input/output operation, communicate a command to the encryption accelerator to perform an encryption or decryption task upon data associated with an input/output operation.09-15-2011
20090198988METHOD FOR VERIFYING REFRESHED BIOS CONTENT - A method for verifying refreshed BIOS content includes the following steps. A virtual machine (VM) is established in a computer waiting for a system BIOS update by the use of a paravirtualization technique. The VM is booted. A new BIOS file content is copied to an address space in a designated range of a memory of a computer host. The computer host is booted with the content of the new BIOS file, and the paravirtual operating system runs on the same hardware platform of the computer host. And, whether the virtual operating system adopting the new BIOS file content runs normally or not is verified to confirm the correctness and safety of the content of the new BIOS file.08-06-2009
20090198992HANDHELD COMPUTING UNIT WITH MERGED MODE - A handheld computing unit includes a hardware section, an application section, and an operating system section. The hardware section and operating system section are operable to: detect another device; determine whether to merge functionality with the other device; and when it is determined to merge functionality with the other device, initiate a reboot of the handheld computing unit and of the other device in a merged mode, wherein, in the merged mode, the hardware section and a hardware section of the other device function as a single hardware section and the operating system section and an operating system section of the other device function as a single operating system section.08-06-2009
20090198991TRUSTED BOOT - In one embodiment, a method for trusted booting of a cryptographic processor system is disclosed. Default image(s) is loaded into a field-programmable logic chip or circuit (FPLC). The default image(s) cannot perform cryptographic processing, but can perform a first algorithm that is unclassified. A processor, internal or external to the FPLC, can be used with the default image. A multi-layer or multi-part key has portions stored in two different places. A protected image is decrypted with the multi-layer key using the first algorithm and loaded into the FPLC. Cryptographic processing is performed using a second algorithm classified by the government.08-06-2009
20090198990Accessory support system for remote inspection device - A remote inspection apparatus has an active display unit receiving image data in digital form and graphically rendering the image data on an active display. A communication medium connects devices to the active display unit, such as an imager head capturing the image data. A computer readable medium records one or more instances of software for operating the one or more devices. A computer processor located in the active display unit that operates a boot loader program to detects and sequentially interrogate the devices by different protocols in order to determine appropriate software to load and operate the devices.08-06-2009
20090049294METHOD FOR BOOTING COMPUTER SYSTEM - The invention relates to a method for booting a computer system. The method includes the steps of executing a hardware initialization process, starting a setting interface according to a trigger signal, determining whether a specific setting option belongs to a specific option group when the value of the specific setting option in the setting interface is changed and loading an operating system to the computer system when the specific setting option belongs to the specific option group.02-19-2009
20090287917SECURE SOFTWARE DISTRIBUTION - To protect against software piracy, a storage media has a cryptographically protected area that stores software to be installed onto a target device, such as a computer. The storage media may include a non-secure area holding boot files and an installation program. The installation program may gather target device-specific data for use by a certifying authority in generating a key that allows access to the secure area of the storage media only during the installation process. In this manner, a user never has access to the raw installation files, limiting the ability to copy and distribute those files for installation on non-authorized computers. The certifying authority may also prepare target device-specific data applied to the software before installation to create a custom software image that will only execute on the target device and that can be verified by the host OS prior to execution, allowing integrity confirmation.11-19-2009
20090055640Masking a Hardware Boot Sequence - One of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and/or thermal signatures that mask the electromagnetic and/or thermal signatures of the actual boot processor. Such masking may involve running the same boot code as the boot processor but without obtaining access to security information, such as the security key for accessing the system. The electromagnetic and/or thermal signatures generated by the execution of the masking code preferably approximate the electromagnetic and/or thermal signatures of the actual boot code executing on the boot processor. In this way, it is difficult to distinguish which processor is the actual boot processor.02-26-2009
20110145558Virtual Bus Device Using Management Engine - A management engine may be used to trap configuration cycles during the boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provision software to the platform even when the operating system is corrupted or non-functional.06-16-2011
20120144182APPARATUS AND METHOD FOR FAST BOOTING BASED ON VIRTUALIZATION TECHNIQUE - An apparatus for fast booting based on a virtualization technique includes: a hardware comprising a processor, a memory and a storage where a status information corresponding to an operating system (OS) is stored; and a virtual machine monitor (VMM) for interfacing between the OS and the hardware, wherein the VMM is operated by the processor and loads the status information on the memory. Herein, the status information may be pre-generated to include data in the memory in a state where the OS is completely booted.06-07-2012
20090063841MOTHERBOARD, COMPUTER SYSTEM AND MULTI-MONITORING METHOD THEREOF - A computer system includes a center processor, a monitoring unit, a water-cooling system and a basic input output system (BIOS) unit. The monitoring unit is coupled to the central processor, and it is used for monitoring a plurality of processor working states of the central processor and generating a plurality of signals. The water-cooling system is coupled to the monitoring unit, and then the monitoring unit is allowed to monitor a plurality of system working states of the water-cooling, system, wherein each of the system working states is respectively corresponding to one of the processor working states. The BIOS unit is coupled to the monitoring unit, and it is used for outputting a plurality of control commands to adjust the operation of the central processor and the water-cooling system according to the signals and the setting value of a user.03-05-2009
20090063842PRINTER - A printer includes: a nonvolatile storage unit, storing a plurality of types of software and enable keys for the respective pieces of the software; and a software update unit, when update information including several pieces of software and verification keys and new enable keys for the respective pieces of the software is provided, determining, whether or not the enable key in the nonvolatile storage unit pertaining to the corresponding software has a predetermined relationship with the verification key in the update information, with respect to each of the pieces of the software in the update information, and performing rewrite processing for rewriting the software and the enable key in the nonvolatile storage unit respectively to the software and the new enable key in the update information, with respect to each of the pieces of the software for which the enable key has the predetermined relationship with the verification key.03-05-2009
20090063835Method for firmware isolation - In one embodiment, the present invention includes a method for determining if an isolation driver is present and a processor supports virtualization, launching the isolation driver in a first privilege level different than a system privilege level and user privilege level, creating a 1:1 virtual mapping between a virtual address and a physical address, using the isolation driver, and controlling access to a memory page using the isolation driver. Other embodiments are described and claimed.03-05-2009
20090063834Auto-Switching Bios System and the Method Thereof - An auto-switching BIOS system and the method thereof, switches to dual BIOS by a hardware control circuit. After the system has been started with the first BIOS to the predetermined period of time and the BIOS_READY signal is detected as disabled, the hardware control circuit switches the system from the first BIOS to the second BIOS and restarts the system with the second BIOS.03-05-2009
20090055639Methods and system for modular device booting - The present invention a method for modular device booting comprising retrieving a first boot code from a non-volatile memory element, receiving a memory access request from at least one subsystem, said memory access including at least a boot status indication indicating a memory region and a memory address, if said received address and region match a predefined address and region, associating said at least one subsystem with a corresponding subsystem boot code address included in said retrieved first boot code, retrieving a corresponding subsystem boot code from said associated boot code address, and transferring said boot code to said corresponding subsystem.02-26-2009
20110225411STORAGE PROCESSING DEVICE AND PROGRAM09-15-2011
20090049290CONSISTENT DATA STORAGE SUBSYSTEM CONFIGURATION REPLICATION - Consistency for replicating data storage subsystem configurations in accordance with a “golden” configuration file. A data storage subsystem comprises a blade system with a plurality of slots, the blade system configured to support a plurality of blades and a storage system, each arranged in a predetermined slot of the blade system. A management module operates the blade system to first power on the storage system, and subsequently to power on the plurality of server blades in a sequential order that matches a blade system natural boot sequence order, skipping the storage system, and the storage system is configured with the “golden” configuration file to log on the server blades in accordance with the power on sequence to logically configure the server blades in accordance with the “golden” configuration file.02-19-2009
20120079261Control Word Obfuscation in Secure TV Receiver - A device for descrambling encrypted data includes a descrambler, a secure link, and a secure element that securely transmits a control word to the descrambler in a normal operating mode. The secure element includes a first secure register, a read-only memory having a boot code, a random-access memory for storing a firmware image from an external memory, and a processor coupled to the first secure register, the read-only memory, and the random access memory. The processor executes the boot code to generate the control word, stores the control word in the first secure register, and send the stored control word to the descrambler through a secure communication link. The descrambler may include a second secure register that is connected to the first secure register through the secure link. The first and second secure registers are not scannable during a normal operation. The secure link contains buried signal traces.03-29-2012
20120079260BASIC INPUT-OUTPUT SYSTEM CIRCUIT AND METHOD FOR USING THE SAME - A BIOS circuit for a computer includes a baseboard management controller (BMC), a central processing unit (CPU), a main basic input-output system (BIOS) storage, and a subsidiary BIOS storage. Both the main BIOS storage and the subsidiary BIOS storage store programs for controlling the computer. The CPU executes the programs stored in the main BIOS storage to control the computer. When data of the programs stored in the main BIOS storage is missing or corrupted, the BMC copies data of the programs stored in the subsidiary BIOS storage to the main BIOS storage to recover the missing or corrupted data in the main BIOS storage.03-29-2012
20090083535INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: a connection port to which an external device is connected; and a processor that executes a BIOS and runs an operating system, wherein, when executing the BIOS, the processor operates to: determine whether or not the external device is connected to the connection port; continues to perform a legacy process and boot the operating system when determined that a prescribed type of the external device is connected; and terminates the legacy process and boot the operating system when determined that the prescribed type of the external device is not connected.03-26-2009
20080263350UPDATE IN-USE FLASH MEMORY WITHOUT EXTERNAL INTERFACES - A method, apparatus and program storage device for updating a non-volatile memory in an embedded system is provided. The invention includes detaching the non-volatile memory from all expectable non-volatile memory references, creating a temporary, volatile-memory file system for allocation of volatile memory space as needed for the non-volatile memory update process, copying all procedural code required to perform the non-volatile memory update into the volatile memory, changing the system search path definitions temporarily to point to the volatile memory, and performing the non-volatile memory update.10-23-2008
20080263349BOOTING SYSTEM, BOOT PROGRAM, AND METHOD THEREFOR - A booting system, a boot program, and a method therefor are provided. A boot source device and a boot target device are connected to each other via a transfer interface. The transfer interface is an interface where booting is supported by a BIOS of the boot target device. The boot source device transfers a first object corresponding to booting data which allows the boot target device to establish and use a connection including an interface other than the transfer interface, which is not supported by the BIOS, via the transfer interface. After the boot target device is enabled to use the interface other than the transfer interface, the boot source device transfers a second object corresponding to booting data for booting up an OS of the boot target device or the like via the transfer interface and transfer interfaces and to the boot target device to boot the boot target device.10-23-2008
20080263347NETWORK DEVICE AND REBOOTING METHOD THEREOF - A network device connected to a server includes a firmware upgrading determining module, a communication module, a storage module, a reboot determining module, and a reboot scheduling module. The firmware upgrading determining module determines whether current firmware of the network device needs to be upgraded. The communication module downloads the newest firmware from the server, and upgrades the current firmware if the current firmware needs to be upgraded. The storage module saves a reboot flag and a preset reboot time window. The reboot determining module determines whether the network device needs to be rebooted immediately according to the reboot flag, and determines whether the network device has a preset reboot time window. The reboot scheduling module determines what time to reboot during the reboot time window if the network device does not need to be rebooted immediately and the network device has a preset reboot time window.10-23-2008
20080263346Method and device for securely sending bootstrap message in device management - A method and device for securely sending a bootstrap message from a server (i.e., a device management (DM )server) to a device in a device management system, the method comprising acquiring first information by the device, receiving, by the device, a bootstrap message from the server, acquiring, by the device, second information from the received bootstrap message, and verifying the bootstrap message by the device, whereby it is effective to securely send the bootstrap message from the server to the device by checking up whether the first information is identical to the second information.10-23-2008
20080263344Pre-Loading Data - A battery-powered device comprising: a memory storing software essential to the provision of normal functions of the device; a first processing section (10-23-2008
20110231643INFORMATION PROCESSING DEVICE, POWER SUPPLY CONTROL METHOD AND STORAGE MEDIUM - An information processing device includes: a power-off detection unit for detecting a signal relating to a power-off operation of a user; an application program termination unit for terminating a predetermined application program when the power-off operation is performed; and a control unit for passing control, after the termination of the application program, to a state in which normal execution can be started faster than normal power-off, and power consumption is lower than in the normal execution.09-22-2011
20110231641INFORMATION-PROCESSING APPARATUS AND METHOD OF STARTING INFORMATION-PROCESSING APPARATUS - An information-processing apparatus includes a main system that presents a function as the information-processing apparatus and has a function of acquiring time information from a time server, and a subsystem managing the main system. The main system starts up in start mode which is either an ordinary-start mode or a specified mode provided to acquire the synchronized time information from the time server based on a start-mode instruction issued from the subsystem. The subsystem starts up the main system in the specified mode when starting the main system being at rest, wherein the subsystem revises management-system time obtained from a clock device, which is controlled by the subsystem, based on the synchronized time information acquired through the main system started in the specified mode, and restarts the main system in the ordinary-start mode by determining the revised management-system time to be initial time used to start the main system.09-22-2011
20110231642Systems and Methods for Accelerated Loading of Operating Systems and Application Programs - Systems and methods for providing accelerated loading of operating system and application programs upon system boot or application launch are disclosed. In one aspect, a method for providing accelerated loading of an operating system comprises the steps of: maintaining a list of boot data used for booting a computer system; preloading the boot data upon initialization of the computer system; and servicing requests for boot data from the computer system using the preloaded boot data. In another aspect, a method for providing accelerated launching of an application program comprises the steps of: maintaining a list of application data associated with an application program; preloading the application data upon launching the application program; and servicing requests for application data from a computer system using the preloaded application data.09-22-2011
20110231640METHODS AND APPARATUS FOR PRIORITY INITIALIZATION OF A SECOND PROCESSOR - Methods and systems provide for activating a second processor by a first processor in a dual processor device early within an initialization routine to enable the second processor to help complete initialization operations. The first processor may prepare a second processor chip for start up, configure the second chip's pins, program the second processor, download a firmware image on the second processor, and initiate operations on the second processor. By performing this initialization early within the initialization routine, the second processor can assist in the initialization routine.09-22-2011
20110231639POWER LOCK-UP SETTING METHOD AND ELECTRONIC APPARATUS USING THE SAME - A power lock-up setting method and an electronic apparatus using the same are provided. The power lock-up setting method includes following steps. A trigger signal generated by a pressed power switch is received by a pin of a GPIO interface and transmitted to a control unit, such that the control unit starts the electronic apparatus, and a power-on-self-test of a logic processing unit is performed by a processing module. Whether the GPIO interface is set to a power lock-up state is determined by the logic processing unit. If so, a level of the pin is set to a disable level. An operating system is loaded by the processing module to perform an operating system booting process. Accordingly, when the electronic apparatus is under an operating environment of the operating system, the trigger signal is forbidden to be transmitted to the control unit when being generated again.09-22-2011
20090144534Data Processing Systems and Methods - Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware, and data hiding techniques—sometimes alone, sometimes in combination. Many of these improvements can be applied to increase the security of computer systems, and networks of which they form part.06-04-2009
20090204803HANDLING OF SECURE STORAGE KEY IN ALWAYS ON DOMAIN - Techniques for handling a secure storage key maintain the key in an always on domain and restore the key to the encryption/decryption engine when the engine is turned back on. The secure storage key however is only accessible by the boot loader code, which provides a secure chain of trust. In addition, the techniques allow the secure storage key to be updated.08-13-2009
20110225408CACHE BOOT MECHANISM - A block device driver performs system boot using cache data and thus provides a mechanism that reduces disk/IO waiting time during system boot.09-15-2011
20090106543BOOT BLOCK FEATURES IN SYNCHRONOUS SERIAL INTERFACE NAND - Embodiments are provided for protecting boot block space in a NAND memory device connected to a host device via an SPI interface. One such method includes programming a boot block password into the NAND memory device such that the host device is required to provide the boot block password in order to access the boot block space. A counter may be provided to track the number of times the host device provides an incorrect password, permanently locking the boot block space if the counter reaches a predetermined value. A further method includes associating each of various areas of the boot block space with at least one write lock bit, setting the write lock bit to a lock enable or lock disable value, and locking or unlocking an area of the boot block space depending on the value of its associated write lock bit. Areas of the boot block space may include a single boot block page, a single boot block, or a plurality of boot blocks.04-23-2009
20090240933Computer system architecture and operating method for the operating system thereof - In order to develop a mobile operating system for a computer, first the mobile operating system must be independent from the computer hardware device. Therefore, the present invention discloses a new computer system architecture which loads a Transient Resident Operating System (TROS) from an external device and provides a predefined hardware device driver to the operating system, and then the TROS can be stored into a portable memory storage device to be a Mobile Operating System (MOS). By applying the technique disclosed in the present invention, the TROS can work beyond the Intrinsic Operating System (IOS) of the computer without the mutual interference from each other, such that a computer environment with a Parasitic Operating System (POS) is created.09-24-2009
20090198989BIOS FOR A COMPUTING DEVICE WITH HANDHELD AND EXTENDED COMPUTING UNITS - A handheld computing unit includes a processing module, a main memory interface, a baseband processing module, an RF section, input/output (I/O) interfaces, a bus structure, a handheld connection structure, and a ROM. The ROM includes a first section for storing a power on self test (POST) of basic input/output system (BIOS) and a second section for storing a boot loader of the BIOS. The boot loader includes a remote mode operating system boot loader and a docked mode operating system boot loader. The remote mode operating system boot loader is used to load a remote mode operating system when in a remote mode and the docked mode operating system boot loader is used to load a docked mode operating system when in a docked mode, which includes at least a portion of the remote mode operating system.08-06-2009
20090249056APPARATUS AND METHOD FOR RETRIEVING NON-VOLATILE ITEMS IN PORTABLE TERMINAL - Provided are an apparatus and a method for reducing a booting time by separately storing Non-Volatile (NV) items for at least one frequency band supported by a portable terminal in a non-volatile memory, and retrieving the stored NV items from a memory to which the stored NV items are copied whenever a booting process is performed. The apparatus includes a memory and a controller. The memory stores the file system including NV items including parameters used for driving and initializing a portable terminal. The controller generates and stores NV items representing transmission/reception performance values for the at least one frequency band supported by the portable terminal from the parameters, and copies the stored NV items during a booting process of the portable terminal.10-01-2009
20090249052BOOTING AN ELECTRONIC DEVICE USING FLASH MEMORY AND A LIMITED FUNCTION MEMORY CONTROLLER - A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if any, steps to take to account for write activity during the boot process. Alternatively, the BIOS may use a reserved portion of flash memory so that wear leveling for boot-related data, such as a shut-down flag, is not needed.10-01-2009
20120198224Encryption Keys Distribution for Conditional Access Software in TV Receiver SOC - A method for securely generating and distributing encryption keys includes generating, by a secured server, a pair of keys including a first key and a second key and providing, by a key distributing unit, the first key to a first recipient and a second key to a second recipient. The first recipient may use the first key to encrypt a data file and send the encrypted data file via a non-volatile memory device to a target subscriber. The second recipient may program the second key into an one-time-programmable register contained in a secure element during a manufacturing process. The secure element may further include a random access memory configured to store an image of the encrypted data file, a read-only memory containing a boot code, and a processing unit coupled to the random-access memory and the read-only memory and operative to decrypt the encrypted data file.08-02-2012
20120198222CONFIGURING AND CUSTOMIZING A SPECIFIC-PURPOSE CLIENT HAVING A WINDOWS-BASED EMBEDDED IMAGE USING EXTENSIBLE MARKUP LANGUAGE (XML) CONFIGURATION - Examples of methods and apparatus are provided for configuring and customizing a specific-purpose local client having a windows-based embedded image using extensible markup language (XML) configuration and obviating reinstallation of an entire windows-based embedded image onto the specific-purpose local client. The apparatus may include a retrieval module of the specific-purpose local client configured to automatically locate a remote repository server containing an XML configuration file and automatically obtain the XML configuration file from the remote repository server each time the specific-purpose local client boots up. The apparatus may include an apply settings module of the specific-purpose local client configured to automatically apply a configuration change to the windows-based embedded image based on the XML configuration file each time the specific-purpose local client boots up. The configuration change persists across a reboot of the specific-purpose local client while obviating reinstallation of an entire windows-based embedded image onto the specific-purpose local client.08-02-2012
20120198219Component Drivers for a Component of a Device - A device including a ready only memory to include component drivers for at least one component of the device, a controller to determine whether a bootable storage device includes at least one operating system, and an embedded application to select and load component drivers onto the device for at least one of the components before installing an operating system from the bootable storage device.08-02-2012
20090249055SYSTEM AND METHODS FOR BOOTING ELECTRONIC DEVICES - The invention provides a boot method capable of reducing boot time even in the case of a change in the configuration of boot files. A boot file is booted from a hard disk drive in a computer equipped with a multitasking operating system. A plurality of tasks are observed, the tasks being created and sequentially executed in order to read out boot files. This observation is carried out at the corresponding boot and a log in the past boot is not used. On the basis of the observed boot files, a prefetch boot file is selected. The entire selected prefetch boot file is filled into a boot cache. The boot file is loaded from the boot cache to a main memory.10-01-2009
20090249054METHOD FOR BOOTING COMPUTER DEVICE - A method for booting a computer device includes steps of executing the POST and loading a commercial film form a storage unit into a volatile memory unit, wherein the computer device can update the commercial film via connecting to a network. Then the operating system is loaded.10-01-2009
20090249053METHOD AND APPARATUS FOR SEQUENTIAL HYPERVISOR INVOCATION - In some embodiments, the invention involves a system and method for invoking a series of hypervisors on a platform. A hardware-based secure boot of a chained series of virtual machines throughout the life of the pre-operating system (OS) firmware/BIOS/loader/option ROM execution, with component-wise isolation of the pre-extensible firmware interface (PEI) and driver execution environment (DXE) cores is utilized. In an embodiment, a Cache-As-RAM (CAR) based hypervisor, executing directly from Flash memory manages sequential invocation of a next hypervisor. Other embodiments are described and claimed.10-01-2009
20090222653COMPUTER SYSTEM COMPRISING A SECURE BOOT MECHANISM - A secure boot processing may be accomplished on the basis of a non-volatile memory that is an integral part of the CPU and which may not be modified once a pre-boot information may be programmed into the non-volatile memory. During a reset event or a power-on event, execution may be started from the internal non-volatile memory, which may also include public decryption keys for verifying a signature of a portion of a boot routine. The verification of the respective portion of the boot routine may be accomplished by using internal random access memories, thereby avoiding external access during verification of the boot routine. Hence, a high degree of tamper resistance may be obtained, for instance, with respect to BIOS modification by exchanging BIOS chips.09-03-2009
20100275001INFORMATION PROCESSOR - According to one embodiment, an information processor, includes: a storage module which stores a plurality of charging modes associated with a plurality of external devices to be charged when an operating system is not in operation; an input module which receives a charging mode selection request; and a test module which receives the charging mode in the received selection request from the storage module, and tests the charging mode on at least one of the external devices connected to the information processor.10-28-2010
20090240934COMPUTER SYSTEM WITH DUAL BOOT-PROGRAM AREA AND METHOD OF BOOTING THE SAME - A computer system with a dual boot-program area, comprises: a processing unit; a BIOS ROM having a primary boot-program area, a secondary boot-program area, and a BIOS main-code area, wherein a first code is both stored at a first address of the primary boot-program area and a second address of the secondary boot-program area; and a BIOS-switching circuit, connected to the BIOS ROM, further comprising a detecting circuit and an address-switching circuit. The detecting circuit can control the address-switching circuit to be operated in an enable mode or a disable mode. A command, issued from the processing unit and for retrieving the first code, is sent to the first address after a power button of the computer system is pressed if the address-switching circuit is operated in the disable mode; or, the command is sent to the second address if the address-switching circuit is operated in the enable mode.09-24-2009
20090254742NAVIGATION SYSTEM AND METHOD WITH SWITCHABLE MULTI-LANGUAGE INTERFACES - A navigation system and method that allows switching between multi-language operating interfaces. It provides multi-language operating interfaces in the storage unit of the navigation system. During the navigation system operation, the user is prompted by Basic Input Output System (BIOS) to select a language of operating interface to display. The navigation system is then installed by executing the index file of the selected language to display the navigation system operating interface in the selected language.10-08-2009
20090259837COMPUTER SYSTEM - A computer system including a first memory unit, a second memory unit and a switch unit is provided. The first memory unit stores a first BIOS. The second memory unit stores a second BIOS. The switch unit has a first configuration and a second configuration. Upon the computer system being started, the switch unit receives an enable signal. When the switch unit is in the first configuration, the enable signal is provided to the first memory unit to start the first basic input/output system. When the switch unit is in the second configuration, the enable signal is provided to the second memory unit to start the second basic input/output system.10-15-2009
20100180109System for Registering and Initiating Pre-Boot Environment for Enabling Partitions - A method for registering and initiating a pre-boot environment for enabling partitions. The method provides a basic input output system (CIOS) with an application program interface (API) that accesses a Logical Clock Address (LCA) sector number when a boot configuration flag is set, the LCA sector number stores an operating environment manager which then boots the information handling system to an appropriate partition.07-15-2010
20100161954COMPUTER START-UP SYSTEM, COMPUTER START-UP METHOD, AND COMPUTER START-UP PROGRAM - To start-up a computer system promptly at the time of power-on. The system includes an expansion card having an initialization command set in advance and a main body unit on which the expansion card is mounted. The main body unit includes a central processing section for executing initialization of the expansion card at the time of power-on based on the initialization command, a history holding section for storing the initialized expansion card, and a dictionary section for storing a common command which is the initialization command common to different expansion cards. The central processing section executes the common command, and also executes the initialization command set in the expansion card other than the expansion card stored in the history holding section and not included in the common command.06-24-2010
20080307216METHOD AND APPARATUS FOR BOOTING A COMPUTER SYSTEM - In investigating the cause of a fault in a computer storage system, it is considered useful to previously prepare maintenance logical units (LUs) of a simple structure, the operation of which has been confirmed. If the same number of LUs as servers are prepared for each server as in the prior art, the efficiency is low. Furthermore, securing these LUs complicates assignment of the LUs for construction of a system and a work for addressing the fault. The present invention provides a computer system free of these problems. The computer system has a first computer for executing a first OS (operating system), a second computer for executing a second OS, and a storage array system. The storage array system uses a disk device having a logical unit (LU) for storing a boot loader, as well as the first and second OSes. The boot loader is executed on any one of the two computers, reads in any of the OSes corresponding to the currently operating computer into this operating computer, and executes the read OS.12-11-2008
20100153696Pre-boot securing of operating system (OS) for endpoint evaluation - Methods and apparatus involve evaluating endpoint computing assets. The endpoint has both a traditional operating system for applications, and the like, and another operating system during a pre-boot phase of operation. During use, the traditional operating system identifies a last evaluation status of the computing device at a time just prior to shutting down. Upon a next booting, the pre-boot operating system loads and examines [reads] the last evaluation status. If the last evaluation status requires any completion action in order to comply with a predetermined computing policy, either or both the operating systems attend to its effectuation, including communication/handoff by way of one or more security agents. In a variety of ways, effectuation occurs by: determining a present location of the computing device, quarantining the computing device from certain network traffic; VPN enforcement; patching applications; firewall involvement; etc. Computer program products are also disclosed.06-17-2010
20130219161Direct Migration of Software Images with Streaming Technique - A mechanism is provided for migrating a software image installed on a source data-processing entity to a target data-processing entity. The target data-processing entity is booted from a preliminary bootstrap program. The software image is mounted as a remote mass memory on the target data-processing entity. A primary bootstrap program of the software image is copied onto a local mass memory of the target data-processing entity. The target data-processing entity is re-booted from the primary bootstrap program thereby loading a streaming function, and serving each request of accessing a memory block on the target data-processing entity by the streaming function. In response to the memory block missing from the local mass storage, the streaming function downloads the memory block from the software image and stores the memory block into the local mass memory. Otherwise, the streaming function retrieves the memory block from the local mass memory otherwise.08-22-2013
20120246454ELECTRONIC DEVICE AND METHOD FOR CONTROLLING TEST PROCESS - In a method controls a test process of an electronic device, a booting mode of a test program is set as a non-preemptible mode. The method invokes system service programs from a storage device of the electronic device upon the condition that an operating system (OS) of the electronic device is booted. The method further boots a user-defined service program, loads the test program to test a target object of the electronic device using the user-defined service program, then boots system application programs and user application programs of the electronic device.09-27-2012
20130219160SYSTEM AND METHOD FOR BOOTING UP A COMPUTER BASED ON DATA CAPTURED IN A NON-VOLATILE SEMICONDUCTOR MEMORY DURING A LEARN MODE - A system includes a timer and a control module. The control module: in response to a first request for first data, determines whether the first data is stored in a non-volatile semiconductor memory (NVSM); in response to the first data not being stored in the NVSM, (i) loads the first data from a hard disk drive (HDD) and boots up a computer a first time based on the first data, and (ii) while operating in a learn mode and while loading the first data from the HDD, captures a portion of the first data in the NVSM; in response to the timer indicating an end of a period during which the computer is booted up the first time, ceases the capturing of the first data; and based on the portion of the first data captured in the NVSM during the learn mode, boots up the computer a second time.08-22-2013
20100185845SECURE BOOT TERMINAL, SECURE BOOT METHOD, SECURE BOOT PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted. The terminal comprises a CPU, a software module storage unit, a certificate storage unit, an updating unit for updating the software module and certificate, a security device provided with a configuration information storage unit for storing the configuration information of the software module, an alternate configuration information storage unit for storing the configuration information of a software module in the configuration before the update, and a boot control unit for verifying and executing the software module by using the certificate. The terminal verifies the certificate of the software module by comparing the configuration information stored by the configuration information storage unit with the configuration information stored by the alternate configuration information storage unit.07-22-2010
20100185843HARDWARE ENCRYPTING STORAGE DEVICE WITH PHYSICALLY SEPARABLE KEY STORAGE DEVICE - Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data inaccessible. Destruction of the separable key device can result in virtual destruction of the encrypted data. The cryptographic information on the separable key device can be provided by a storage device manufacturer, or by a provisioning computing device. The separable key device can be directly communicationally coupled to a provisioning computing device or it can establish a secure communication tunnel with the provisioning device through a computing device to which the separable key device is communicationally coupled. Cryptographic information can be provided by, and deleted from, the provisioning computing device prior to completion of the booting of that device.07-22-2010
20100161952PERFORMANCE OPTIMIZATIONS BY DYNAMIC REDUCTION OF FILE ALLOCATION TABLES - Performance optimizations by dynamic reduction of file allocation tables (FAT). A method of a file system includes reading a boot sector to determine a count of FAT instances. The method may set a count of FAT instances referred to in a boot sector to one if the count is greater than one. The method may modify the boot sector to refer to a data sector including a FAT instance as a reserved data sector. In addition, the method may include setting the count of FAT instances to one during at least one of a periodic operation of a dedicated application program interface and a file system mounting.06-24-2010
20100262819METHOD AND APPARATUS FOR IMPLEMENTING MULTIPLE SERVICE PROCESSING FUNCTIONS - A multi-service processing method, including: configuring different cores of a multi-core processor to process different services; and sending received packets to the cores in the pre-defined service processing sequence. The multi-core processor apparatus, includes the configuration management unit, the packet distributing unit, and the multi-core processor. The method and apparatus can save investments in devices while implementing multiple service processing functions.10-14-2010
20100174894Method, Apparatus, and System for Configuring an Operating System on a Target Computer - A method, apparatus, and system are disclosed for configuring an operating system on a target computer. A configuration module configures a target computer as a diskless client. A boot module boots the target computer to a setup state. A communication module establishes communications between the target computer, a donor storage device of a donor computer, and a virtual disk. A copy module copies a configuration image from the donor storage device to the virtual disk. The configuration image comprises an operating system and a software configuration installed on the donor computer. A modification module modifies the configuration image on the virtual disk to conform to a hardware configuration of the target computer.07-08-2010
20100185846COMPUTER PRODUCT, STORAGE DEVICE, AND FIRMWARE MANAGEMENT METHOD - According to one embodiment, an electronic apparatus includes a plurality of storage modules, a rewrite module, a start module, and a switch module. The storage modules store a plurality of firmware items, respectively. The rewrite module rewrites at least one of the firmware items other than a firmware item being executed with a new firmware item. The start module starts the electronic apparatus with one of the firmware items. The switch module switches, when abnormality is detected in the firmware item for starting the electronic apparatus, the firmware item to another firmware item to start the electronic apparatus.07-22-2010
20100185844EVASION OF POWER ON SELF TEST DURING AN OPERATING SYSTEM INITIATED REBOOT - A system and method to evade the power on self test during an operating system initiated reboot is disclosed. In one embodiment, a method for optimizing reboot process of a computer includes determining a status of a power on self test (POST) performed during a prior booting of the computer when an operating system (OS) initiated rebooting of the computer is triggered, loading information obtained during the POST of the prior booting of the computer into a basic input output system (BIOS) of the computer if the status of the POST performed during the prior booting of the computer indicates a success of the POST, and performing the rebooting of the computer using the information, wherein a subsequent POST associated with the rebooting of the computer is skipped during the rebooting of the computer.07-22-2010
20100185842COMPUTER SYSTEM WITH TWO OPERATING DEVICES AND CONTROL METHOD THEREOF - A computer system includes at least a first and a second operating device and a control module. The control module sends at least one signal to a central processing unit for managing and controlling the first and the second operating device, and copying the contents of any one of the two operating devices to the other operating device, so that both of the first and second operating devices include an operating system, and the computer system can select any one of the first and second operating devices for booting the operating system and power off or power on the other non-selected operating device.07-22-2010
20100262817USER SELECTABLE DATA WIPE - A data storage device includes a computer-readable medium encoded with a computer program that, when executed communicates with a basic input/output system (BIOS), receives a user selection from the BIOS to wipe the data storage device and performs a wipe of the data storage device. In an embodiment, the wipe of the data storage device includes writing a series of 10-14-2010
20110107074Electronic Device Capable of Automatically Setting up Operating Systems and Related Method and System - To reduce human resource cost, a method of automatically, consecutively setting up multiple operating systems, for an electronic device operating in an operating system, includes clearing a partition sector of the electronic device during operation of the operating system to generate an emptied boot record status, and setting up a target operating system according to the emptied boot record status and a setup procedure associated with the target operating system when the electronic device reboots.05-05-2011
20120272049TOUCH CONTROL METHOD FOR SETTING BASIC INPUT OUTPUT SYSTEM AND COMPUTER SYSTEM USING THE SAME - A touch control method for setting the basic input output system (BIOS) is provided. The setting method includes the following steps. The BIOS transmits an initial configuration data to a memory. An application program reads the initial configuration data from the memory and evocates an input interface displaying on a touch panel. The input interface includes a plurality of selecting items corresponding to the initial configuration data. The application program receives a setting signal from the touch panel and executes the selecting item according to the setting signal. The application program produces a renewal configuration data and the application program stores the renewal configuration data in the memory. The application program rewrites the renew configuration data back to the BIOS.10-25-2012
20100262818Computer system and method of booting the same - A computer system and a method of booting a computer system using a solid state drive (SSD) as a main storage device is provided. The method includes mapping an address of a memory included in the SSD to an address used by a central processing unit (CPU) to select a boot code, uploading the boot code of an operating system (OS) stored in a non-volatile memory block included in the SSD to the memory included in the SSD, generating an interrupt signal based on a progress rate of the boot code upload, and performing a boot operation based on the boot code uploaded to the memory included in the SSD in response to the interrupt signal.10-14-2010
20100191951PROVISIONED FIRMWARE UPDATES USING OBJECT IDENTIFIERS - Methods, devices, and systems are provided for remotely updating provisioning data in devices or a population of devices. An update message is generated that includes an Object Identifier (OID) that uniquely identifies eligible devices or components for the provisioning data update. If an eligible device receives the update message, then the new provisioning data is loaded on the device, thereby replacing the old provisioning data on the device.07-29-2010
20100191950System and Method for Processing Booting Failure of System - A method for processing booting failure of a computer system is adapted for being performed at a computer. The method includes the following steps. First, a parameter selecting signal is generated according to a triggering signal by a control module. Second, a driving parameter is chosen from a look-up table according to the parameter selecting signal by a basic input output system (BIOS), and the driving parameter is loaded into the BIOS and provided to a driving module. Third, a memory is driven according to the driving parameter by the driving module. Fourth, the driving parameter is stored by BIOS.07-29-2010
20100191949INFORMATION PROCESSING TERMINAL AND FALSIFICATION VERIFICATION METHOD - An information processing terminal that performs falsification verification at the time of bootstrapping thereof includes: a state sensor that senses a connection of an external connector or a data reception via the external connector, to judge whether or not a program stored in the information processing terminal is in a rewritable state; a flag storage that stores a flag referred to at the time of bootstrapping of the information processing terminal therein; a flag controller that turns on the flag according to a judged result that the program is in the rewritable state by the state sensor to record the turn-on flag in the flag storage; and a falsification verifier that judges whether or not it is necessary to carry out falsification verification according to a status of the flag, and performs falsification verification of the program only in the case in which the flag in the flag storage is turned on, at the time of bootstrapping of the information processing terminal.07-29-2010
20100191947MOBILE TERMINAL AND METHOD FOR CONTROLLING ACCESSING OF DEVICE THEREOF - A mobile terminal and its device accessing control method are disclosed. When power is applied to the terminal, the terminal executes BIOS information. When certain identification information (ID) is received, whether or not the received identification information is registered one. If the inputted identification information is a registered one, a device and/or application is initialized or the use of the device and/or application is prevented and an operating system is booted according to corresponding device setting information.07-29-2010
20100153698HARD DISK TEMPERATURE MONITORING DEVICE AND HARD DISK TEMPERATURE MONITORING METHOD - A hard disk temperature monitoring device for monitoring a temperature of a hard disk in a computer system is provided. A hard disk stores an operating system. A basic input/output system (BIOS) has a setting configuration. When the setting configuration is a first setting value, operation of the hard disk is restored. When the setting configuration is a second setting value, the operation of the hard disk is stopped. A thermal sensor detects a temperature of the hard disk. A keyboard controller (KBC) is electrically connected to the thermal sensor via a data transmission channel for detecting the temperature of the hard disk in real time. If the KBC detects that the temperature of the hard disk rises to a first predetermined temperature, the setting configuration is set to the second setting value, and the BIOS stops the operation of the hard disk according to the second setting value.06-17-2010
20120198221SPECIFIC-PURPOSE CLIENT WITH CONFIGURATION HISTORY FOR SELF-PROVISIONING OF CONFIGURATION AND OBVIATING REINSTALLATION OF EMBEDDED IMAGE - Examples of specific-purpose local clients are provided for self-provisioning of configurations and for obviating reinstallation of entire windows-based embedded images onto the specific-purpose local clients. Each local client may have a windows-based embedded image with a write-filter, and may include a configuration history memory unit configured to store a plurality of extensible markup language (XML) configuration files. The configuration history memory unit may be in a persistent storage area of the local client to allow the plurality of XML configuration files to be retained on the local client when it is shut down. The local client may include a retrieval module configured to facilitate automatically locating a remote repository server containing a new XML configuration file, to facilitate automatically obtaining the new XML configuration file from the remote repository server over a network, and to facilitate automatically obtaining a previous XML configuration file from the configuration history memory unit.08-02-2012
20100161953HANDLING SENSORS IN A CONTEXT AWARE PLATFORM - The context engine of a context aware platform may comprise a provider manager coupled to context providers and the provider manager may communicate with the context providers using application programming interfaces (API). To optimize the use of system resources, the provider manager may load/unload the context providers based on value of a load field of a hint signal or on prediction values. The context providers is to activate a first set of sensors of the plurality of sensors if the preferred activity level for the first set of sensors is set to activate state in the hint signal. The context providers is to deactivate a second set of sensors of the plurality of sensors if the preferred activity level for the first set of sensors is set to deactivate state in the hint signal.06-24-2010
20090077368Controller for a Mass Memory and Method for Providing Data for a Start Process of a Computer - In the process for providing data for a start process of a computer by a controller (03-19-2009
20090077366Workflow Management to Automatically Load a Blank Hardware System with an Operating System, Products, and Service - The exemplary embodiments provide a computer implemented method, apparatus, and computer usable program code for managing a workflow for assembling a data processing system according to a specific customized software configuration. An installation request from a remote data processing system is received. The installation request comprises an identity associated with the remote data processing system. An order associated with the identity is retrieved. A process configuration based on the order is determined. A system image associated with the process configuration is retrieved, forming an associated system image. The associated system image is transferred to the remote data processing system.03-19-2009
20090077365System and method for analyzing CPU performance from a serial link front side bus - Monitoring of boot progress for a multiprocessor information handling system is performed with a test module running on a CPLD. RAM integrated in the CPLD stores boot progress information passed through an I/O buffer located between the processors and the firmware that boots the processors. Downloading of the boot progress from the RAM to an external device, such as through a serial port, provides a processor trace that is analysis and debugging of the firmware by recording processor operations through the boot progress.03-19-2009
20090077364DATA-PROCESSING ARRANGEMENT - A data-processing arrangement (MPS) comprises a main processor (MPR) and an auxiliary processor (APR). A system-program code (SYS) causes the main processor to write an application-program code (APCi+1) into a shared memory (DPRAM). The system-program code further causes the main processor to write an address indication, which indicates where the application-program code has been written into the shared memory, into a predefined memory location. A startup-program code (SPC) causes the auxiliary processor to retrieve the address indication from the predefined memory location so as to subsequently transfer the application-program code from the shared memory to an application-program memory (APM), which belongs to the auxiliary processor.03-19-2009
20100235617SYSTEM RECOVERY METHOD AND EMBEDDED SYSTEM WITH AUTOMATIC RECOVERY FUNCTION - A system recovery method and an embedded system with an automatic recovery function used between a network and a server are introduced. The embedded system includes a nonvolatile memory storing a first part program code and a processor electrically connected to the nonvolatile memory and the network. The method includes the following steps, the embedded system enters a boot process; when the processor of the embedded system in the boot process determines that the first part program code in the nonvolatile memory does not satisfy a first specific condition, the processor transmits a signal through the network to establish a signal connection with the server; and the processor downloads a backup program code from the server through the network for execution to complete the boot process.09-16-2010
20100241839Loading operating systems using memory segmentation and ACPI based context switch - Methods, systems, apparatuses and program products are disclosed for managing multiple OSes within a single computer and the like.09-23-2010
20100228959COMMUNICATION DEVICE AND METHOD FOR STARTING UP THE COMMUNICATION DEVICE - A method for starting up the communication device includes searching a non-volatile storage unit of the communication device for start up data of the communication device according to a predetermined identifier of the start up data, loading the start up data into a volatile storage unit of the communication device, starting the communication device according to the start up data in the volatile storage unit. The method also includes searching the non-volatile storage unit for data except for the start up data, load the data except for the start up data into the volatile storage unit.09-09-2010
20100217964METHOD AND APPARATUS FOR CONTROLLING ENABLEMENT OF JTAG INTERFACE - A method, device and system for controlling JTAG interface enablement within a communication device. The JTAG interface can be selectively enabled based on the receipt of an encrypted access token generated by an access token server. The access token server generates the access token in response to an end user providing appropriate device-specific information. The access token includes appropriate information that, upon appropriate authentication and decryption, can temporarily device bind the boot code image of the device in a manner that enables the JTAG interface. Alternatively, the access token includes appropriate information that instructs the general purpose processor to choose between JTAG interface enablement information and JTAG interface disablement information for use with the boot code image of the device. The access token can include expiration information that causes an enabled JTAG interface to revert back to its disabled status upon expiration of the access token.08-26-2010
20100217965Method of centralized ethernet network shutdown - A method is disclosed of centralized Power over Ethernet network shutdown, which comprises the steps of: 08-26-2010
20100217967REAL-TIME COMMUNICATION SECURITY FOR AUTOMATION NETWORKS - A framework, device and method are disclosed for providing broadcast communication security over Ethernet within an automation system, wherein a security plug provides secure working of the automation system. The security plug can be implemented using ASIC/FPGA technology to provide compatibility with existing systems and an intuitive plug-and-play model. An exemplary system can address jitter-sensitivity by providing a real-time architecture, with minimal transmission latencies. The security plug can have separate security and communication modules that make provisions for protocol independent working of the security plug, within these networks. The method can include bootstrapping, secret key establishment and secure communication, for providing real-time guarantees.08-26-2010
20100217966Computing system, booting method and code/data pinning method thereof - The booting method of a computing system includes determining whether boot data of an operating system is pinned to a main memory, reading boot data from a storage device to pin the read boot data to the main memory when relocation of the pinned boot data is required, and performing a booting operation using the pinned boot data.08-26-2010
20100250911SENSOR FOR USE IN AUTOMATION TECHNOLOGY AND METHOD FOR CONFIGURING A SENSOR - The present invention is directed to a sensor for use in automation technology for detecting a measurand, particularly for detecting objects or articles, and a method for configuring a sensor. The sensor includes: a sensor element for measuring a physical variable; a first connecting means for connecting the sensor to a peripheral unit in an operating mode; and a control/evaluation unit for controlling the sensor element, for processing a measured signal from the sensor element and for outputting an output signal to the first connecting means, which control/evaluation unit has a memory for the storage of at least configuration data and program data of the sensor; wherein a second connecting means connects the sensor to an external computer for a configuring mode; in the memory of the control/evaluation unit there is stored configuring software, which can be uploaded into a RAM of an external computer when the sensor is connected to the external computer; and the configuring software is adapted for automatic configuration of the sensor or interactive configuration thereof by a user.09-30-2010
20100250912COMPUTING DEVICE DEPLOYMENT USING MASS STORAGE DEVICE - Computing device deployment and configuration using a mass storage device is provided. A generic computing device is provided to a customer or end user. A mass storage device is used to distribute configuration information to the generic computing device. The configuration information includes customer-specified or ordered software applications or other features. The configuration information can also include updates to the computing device system software. The customer or end user couples the mass storage device to the generic computing device in order to load the configuration information into the computing device. After the configuration information is loaded, the computing device is configured for the customer's use. Further features, such as creating customized images, are also provided.09-30-2010
20100217963System, method and computer-readable medium for providing and executing a sequence of launch of applications at boot-up - Methods, systems and computer-readable medium for enabling a user to direct a computational device to store a desired sequence of launch of software applications stored within, or accessible to, the computational device are provided. The user may direct the computational device to initiate a boot-up of an operating system of the computational device while integrating a launch of software applications as instructed by the stored sequence of launch. The computational device may be enabled for communication with an electronic communications network, e.g., the Internet or a telephony system, and at least software application may be downloaded from the electronic communications network. The additional application may be downloaded from a server upon direction of an OEM, marketer or other member of the stream commerce from which the computer was acquired or provided.08-26-2010
20100211768SYSTEM FOR PERFORMING HARDWARE CALIBRATION DURING STARTUP, AND METHOD OF CALIBRATION - Disclosed is a system including: a calibration executing unit that performs a calibration on hardware during the system startup so as to allow the system to properly operate; and a correction data retaining unit that retains a piece of correction information in association with an environmental condition during the calibration, the correction information indicating a setting for the hardware calibrated by the calibration executing unit. If the correction data retaining unit retains the correction information associated with an environmental condition equivalent to the environmental condition at a time when the system is started up, the calibration executing unit performs the hardware setting on the basis of the retained correction information instead of calibrating the hardware.08-19-2010
20100211766Nonvolatile memory device including a buffer RAM and boot code management method thereof - A nonvolatile memory device may includes a cell array to store a boot code; a boot RAM to store the boot code; a data RAM to store user data being exchanged with the external device; and a controller to separately store a boot code provided from the cell array in the boot RAM and the data RAM when a booting operation is performed.08-19-2010
20100211769Concurrent Execution of a Smartphone Operating System and a Desktop Operating System - A non-smartphone computing system, such as a laptop or desktop personal computer, can be booted into either or both a smartphone operating system and a desktop operating system. The smartphone operating system may be booted first to allow use of the functionality provided by the smartphone operating system while the desktop operating system is booting. Through an appropriate user action, such as the selection of a pre-defined key, key sequence, or by use of a switch, the computing system can dynamically switch between the smartphone operating system and the desktop operating system. Files and folders can also be synchronized and/or shared between the smartphone operating system and the desktop operating system, thereby providing access to these files from each respective operating system even while the other operating system is not executing.08-19-2010
20100235615METHOD AND SYSTEM FOR DISCOVERY OF A ROOT FILE SYSTEM - A method for discovery of a root file system that includes obtaining a tag corresponding to a boot image for an operating system, identifying, by a boot loader, a location of the boot image having a predefined value matching the tag, loading a kernel of the operating system retrieved from the boot image, and transferring execution to the kernel, wherein the boot loader provides the tag for the location to the kernel. The method further includes identifying, by the kernel, the location of the root file system based on the tag provided by the boot loader, and executing the operating system on a processor using the root file system identified by the kernel.09-16-2010
20100235616METHOD AND SYSTEM FOR DISPLAYING INFORMATION ON INSTALLED UNITS - An exemplary embodiment of the present invention provides a method for providing information about units installed in a computing device. The method includes identifying an installed unit prior to an initialization of an operating system and obtaining information about the installed unit, wherein the information comprises a regulatory identification number, a manufacturer's logo, or a combination thereof. The method also includes receiving a request to provide information about the installed unit and providing the information about the installed unit.09-16-2010
20100241841System and Method for Securing Executable Code - A system and method for the secure storage of executable code and the secure movement of such code from memory to a processor. The method includes the storage of an encrypted version of the code. The code is then decrypted and decompressed as necessary, before re-encryption in storage. The re-encrypted executable code is then written to external memory. As a cache line of executable code is required, a fetch is performed but intercepted. In the interception, the cache line is decrypted. The plain text cache line is then stored in an instruction cache associated with a processor.09-23-2010
20100241840SYSTEM AND METHOD FOR RESOURCE ASSIGNMENT - A resource assignment system includes a driver on an option ROM mounted on a PCI (Peripheral Components Interconnect) device, arranged on a memory by a BIOS (Basic Input/Output System), and configured to perform hardware resources assignment under a Pre-Boot environment; and an OS driver arranged on the memory by the BIOS, and configured to perform the hardware resource assignment under an OS environment. The BIOS includes a resource management table which shows a range of an I/O space to be assigned to a bridge device in a layer higher than that of the PCI device which requests the I/O space; and an ACPI table which is used to notify a hardware configuration and data to use an extended I/O space to the OS. The resource management table includes a Pre-Boot table in which assignment of a first granularity to a Legacy-I/O space for a Pre-Boot environment is defined; and an OS table in which assignment of a second granularity to the extended I/O space for an OS environment is defined.09-23-2010
20100241837COMPUTER WITH BOOTABLE RESTORATION - A bootable restoration computer includes: at least one mass storage device; at least two mass storage device partitions in the at least one mass storage device, including first and second partitions; a partition image restoration program; at least one partition image; at least one human interface device; a primary operating system with graphical user interface; a secondary operating system; and, a boot loader responsive to the human interface device that provides for selecting between the primary secondary operating systems. The primary operating system resides on the first partition and is configured so that its standard locations for storing user-created files are folders rooted on at least one of any partition other than the first partition. The at least one partition image is an image of the first partition, and resides on at least one of any partition other than the first partition. If no opportunity is taken to select the secondary operating system in a predefined time, the computer loads the primary operating system. If the opportunity is taken, the partition image restoration program restores the partition image to the first partition.09-23-2010
20100250910COMPUTER SYSTEM AND SETTING MANAGEMENT METHOD - In a computer system including a server having a BIOS and a management module, the server includes therein a memory area and a server controller, and the management module includes therein a backup memory area and a management-module controller. When the BIOS changes the BIOS setting, the BIOS stores the BIOS setting into both of the memory area and the backup memory area by way of the server controller and the management-module controller. Here, the management module operates independently of the server. Accordingly, when a BIOS-setting read request is issued from the outside, the management-module controller makes the response to the request source by reading the data stored into the backup memory area.09-30-2010
20090037723Method for the Autonomic Configuration of a Data Storage Device - A method is disclosed for configuring a data storage device. A storage module stores configuration data on a remote storage system that may include operating systems, applications, updates, and an index. A boot module boots a computer system from a program other than the regular boot program to provide access to a network in communication with the remote storage system. A device configuration module autonomically downloads and installs the operating systems, applications, and updates in response to data stored in an index on the remote storage system.02-05-2009
20100211767COMPUTER SYSTEM, MEMORY CIRCUIT ON MOTHERBOARD AND BOOTING METHOD THEREOF - A method for booting a computer system is disclosed. The computer system has a main memory. The method includes the steps of providing a backup memory, replacing the main memory by the backup memory when the computer system is booted and the main memory fails to operate normally, and decompressing the program codes of the BIOS to the backup memory to perform the backup booting procedure.08-19-2010
20110022831Method for Operation System Startup - A method for operation system startup includes steps of switching on hardware startup; determining whether there is a trigger signal; reading an initial parameter from a storage device, and loading the initial parameter into a startup program when there is no trigger signal, executing the startup program; and entering operational system.01-27-2011
20120144181MOTHERBOARD AND METHOD FOR DISPLAYING HOST SYSTEM PARAMETER - A motherboard and a method for displaying a host system parameter are provided. The motherboard includes a bridge circuit receiving the host system parameter, a microcontroller connected to the bridge circuit, and a transmitter connected to the microcontroller. The microcontroller is capable of directly capturing the host system parameter from the bridge circuit and then transmitting the system parameter to the transmitter when the motherboard is powered on.06-07-2012
20110238970System and method to lock electronic device - A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described.09-29-2011
20100100719METHOD FOR REDUCING BOOTING TIME AND COMPUTER USING THE SAME - The invention provides a method for reducing booting time and a computer using the same. The method includes the following steps. The computer is shut down. After the step of shutting down the computer, the computer is booted up to make the computer enter into a power-saving mode. Thus, when a user performs an operation to boot up the computer, the computer resumes a normal state from the power-saving mode.04-22-2010
20100088501Post speedup in oprom systems with intervention support - Techniques related to personal computers and devices sharing similar architectures are disclosed. Particularly shown is a system and method for enabling improved computer initialization speed achieved by methods including causing apparently premature timeouts when fruitlessly waiting for human intervention.04-08-2010
20080313451DATA RECOVERY METHOD - The present invention provides a data recovery method in a system with storage of default values and prior configuration values, including executing initialization of the system; loading the default values; detecting a status of a first flag to generate a first detection result; and, determining whether a boot-up sequence is complete according to the first detection result.12-18-2008
20090276613METHOD OF SHARING BASIC INPUT OUTPUT SYSTEM, AND BLADE SERVER AND COMPUTER USING THE SAME - A blade server is provided. The blade server includes at least one motherboard, and a backplane. The backplane is coupled to the at least one motherboard, and includes a memory unit and a switch unit. The memory unit is adapted for storing a BIOS. The switch unit is coupled between the motherboard and the memory unit, for coupling the memory unit to one of the at least one motherboard. The present invention is adapted for using less memory units when configuring a blade server.11-05-2009
20090327682System and Method for Transferring Configuration Information to an Embedded Device Using a Command Line Interface - A system and method is disclosed for transferring configuration information to an embedded device associated with an option ROM during those periods in which the option ROM is disabled. The method of the present invention involves the enumeration of PCI devices within the system and the determination of whether the PCI devices are associated with an option ROM and whether the option ROM is enabled. If the embedded device is associated with an option ROM and if the option ROM is not enabled, the option ROM is loaded to a shadow memory and the command-line interface of the option ROM is called to transfer configuration data to the embedded device. The option ROM is later removed from shadow memory to remove the footprint of the option ROM in shadow memory.12-31-2009
20120036346PARTIAL HIBERNATION RESTORE FOR BOOT TIME REDUCTION - Checkpoint snapshots of segments of system memory are taken while an operating system is booting in a computer system. The segments of system memory are stored in non-volatile memory as hibernation files. In response to detecting a request for a system reboot of the OS, an affected hibernation file, which corresponds to an affected segment of system memory that will change during the system reboot of the OS, is identified. A restoration of the system memory via a wake-up from hibernation is then initiated. The wake-up from hibernation proceeds until the affected hibernation file is reached, such that initial steps in the system reboot are bypassed. Thereafter, subsequent steps, which are after the bypassed initial steps in the system reboot, are executed.02-09-2012
20110113230APPARATUS AND METHOD FOR SECURING AND ISOLATING OPERATIONAL NODES IN A COMPUTER NETWORK - A system and method for securing firmware from malware in a computer processing system having a trusted node daughterboard connected to at least one operational node motherboard. The method includes the steps of sending a power on signal from the trusted node daughterboard to the operational node motherboard when it is desired to utilize the operational node motherboard for computer processing purposes. Pre-boot data is then requested from the operational node motherboard and is sent from the trusted node daughterboard to the operational node motherboard to enable operation of the operational node motherboard.05-12-2011
20100199080Method and System for Diagnosing and Programming Industrial Vehicles - A method and system for diagnosing and programming industrial vehicles, especially lift trucks, is provided. The method and system utilizes a computer that is connected to an area network having at least one server, e.g. the internet. The computer is also connected through an electronic interface to a lift truck's data bus.08-05-2010
20100199078METHOD OF SAFE AND RECOVERABLE FIRMWARE UPDATE AND DEVICE USING THE SAME - A safe and recoverable firmware update method which for a remote embedded electronic device and the device thereof. The method includes reading an update status in a flash memory, and determining the update status. If the update status is “DEFAULT”, a default firmware is executed. If the update status is not “DEFAULT”, the update status is further determined if it is “UPDATED”. If the update status is “UPDATED”, a configuration area is set as “BOOTING” and a new firmware is executed. If the update status is not “UPDATED”, the update status is determined if it is “RUNNEW”. If the update status is “RUNNEW”, a new firmware and an update validation method are executed. If the update validation method gets an update completion validation message, the update status is set as “RUNNEW”. If the update status is not “RUNNEW”, a default firmware is executed.08-05-2010
20090282232MEMORY DEVICE BOOT COMMAND - Memory devices and methods facilitate initiation and termination of boot data output from a memory device through the use of received commands. For example, boot data output is initiated in response to a command indicative of a desire to enter a boot mode of operation. The initiate boot command may include a base command and a unique argument indicative of a desire to enter the boot mode of operation. Boot data output may be terminated by a received command indicative of a desire to terminate the boot mode of operation. The terminate boot command may include the same base command as the initiate boot command with any argument other than the argument indicative of a desire to enter the boot mode of operation.11-12-2009
20090327681SELF TEST INITIALIZATION - A system to perform an information handling system (IHS) initialization includes one or more subsystems to receive a command to power on the IHS, initialize a processor cache memory to emulate a random access memory (RAM), determine whether a manufacturing self test is being performed on the IHS, and in response to the manufacturing self test being performed, complete the initialization without a complete memory initialization.12-31-2009
20110066839System And Method For Providing A System Management Command - Exemplary embodiments of the present invention disclosed herein relate to a method of providing a system management command. The method comprises receiving from an authorized requestor information identifying the electronic device and a request to issue a system management command to the electronic device. The method additionally comprises providing, in response to the request, a system management command, information identifying a source of the command as a trusted source and the information identifying the electronic device. Also disclosed are an electronic device and a computer system according to the invention.03-17-2011
20110066838INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM AND INTEGRATED CIRCUIT FOR THE REALIZATION THEREOF - The present invention provides an information processing apparatus that is capable of continuously performing secure boot between module groups in the case where software of a terminal device consists of module groups provided by a plurality of providers, while keeping independence between the providers. The information processing apparatus is provided with a linkage certificate that contains a first configuration comparison value 03-17-2011
20110066837Single-Chip Flash Device with Boot Code Transfer Capability - A Multi-Media Card (MMC) Single-Chip Flash Device (SCFD) contains a MMC flash microcontroller and flash mass storage blocks containing flash memory arrays that are block-addressable rather than randomly-addressable. An initial boot loader is read from the first page of flash by a state machine and written to a small RAM. A central processing unit (CPU) in the microcontroller reads instructions from the small RAM, executing the initial boot loader, which reads more pages from flash. These pages are buffered by the small RAM and written to a larger DRAM. Once an extended boot sequence is written to DRAM, the CPU toggles a RAM_BASE bit to cause instruction fetching from DRAM. Then the extended boot sequence is executed from DRAM, copying an OS image from flash to DRAM. Boot code and control code are selectively overwritten during a code updating operation to eliminate stocking issues.03-17-2011
20110066836OPERATING SYSTEM BOOTING METHOD, COMPUTER, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, a CPU boots a small OS having a function of executing a target application, boots the target application on the booted small OS, and boots a CPU dispatcher for switching an execution OS. The CPU boots a rich OS capable of executing applications larger in number than applications executed by the small OS by using the CPU dispatcher, in a background of the small OS, while causing the target application booted on the small OS to run. After the rich OS is booted, the CPU boots the target application on the booted OS separately from the target application running on the small OS. The CPU passes an execution state of the target application running on the small OS to the target application booted on the rich OS and shifting the execution OS from the small OS to the rich OS.03-17-2011
20110066835METHOD AND SYSTEM FOR SECURELY PROTECTING A SEMICONDUCTOR CHIP WITHOUT COMPROMISING TEST AND DEBUG CAPABILITIES - A semiconductor chip may be operable to block the debug interfaces when the semiconductor chip boots up from the boot read-only memory (ROM). The semiconductor chip may be operable to authenticate a debug certificate received by the semiconductor chip and enable one or more debug interfaces in the semiconductor chip based on the information resulting from the authentication of the debug certificate. The debug certificate may be in a form of a cryptographic public key certificate. A unique device ID which may be generated at boot and stored in the memory may be used by the semiconductor chip to authenticate the debug certificate. The device ID may be generated using the cryptographic public key that is stored in the one-time programmable (OTP) memory in the semiconductor chip and a cryptographic hash algorithm.03-17-2011
20100268925SYSTEM AND METHOD FOR POPULATING A DEDICATED SYSTEM SERVICE REPOSITORY FOR AN INFORMATION HANDLING SYSTEM - An information handling system includes a processor, a memory device coupled to the processor, and a dedicated system service repository (DSSR) coupled to the processor. The DSSR is configured to store a base image that includes a plurality of partitions and a first system configuration image, wherein the first system configuration image is stored in a first partition of the plurality of partitions, wherein the first system configuration image is configured to provide in-band and/or out-of-band managed access to the DSSR when executed; and by accessing the first system configuration image, the DSSR is populated with a second system configuration image, wherein the second system configuration image is stored in a second partition of the plurality of partitions.10-21-2010
20100191948BOOT CONTROL METHOD OF COMPUTER SYSTEM - A computer system comprises two or more computers including at least one standby computer and a management computer which controls the computers. The management computer manages unique identification information which is assigned to an Ethernet controller of each computer. When a failure has occurred to an active computer, the management computer sets the unique identification information which has been assigned to the Ethernet controller of the failed computer to the Ethernet controller of the standby computer and the standby computer boots up a software image for the failed computer by use of the unique identification information which has been set to its Ethernet controller by the management computer.07-29-2010
20100191945PORTABLE DEVICE WITH USER INTERFACE - A portable device (07-29-2010
20090222652EMBEDDED MEMORY PROTECTION - One embodiment of the present application includes a microcontroller (09-03-2009
20090172384SYSTEMS AND METHODS FOR CONFIGURING, UPDATING, AND BOOTING AN ALTERNATE OPERATING SYSTEM ON A PORTABLE DATA READER - Systems and methods are provided for updating configuration settings, updating an OS image, and booting an alternate OS on a portable data reader including a reading engine for reading data from an object. Configuration settings of a portable data reader may be updated by detecting whether a storage device having a set of updated configuration settings stored thereon has been coupled to the portable data reader and, if so, updating one or more configuration settings on the portable data reader with one or more of the updated configuration settings from the storage device.07-02-2009
20090319768COMPUTER, REMOTE ACTIVATION METHOD, AND REMOTE ACTIVATION PROGRAM - To activate respective OSs separately through a network even in a virtual machine in which a plurality of OSs are installed, an M-packet acquiring unit acquires a received magic packet. An address detecting unit detects a MAC address that is stored in the magic packet. A control-list storage unit records correspondence between MAC addresses and guest OSs, and defines whether to activate the respective OSs by a remote operation. An activation determining unit refers to the control-list storage unit and determines whether to activate a guest OS that corresponds to the MAC address stored in the magic packet. A guest-OS control unit activates a guest OS that is determined to be activated by the activation determining unit.12-24-2009
20090319767DATA PROCESSING APPARATUS - The present invention provides a data processing apparatus realizing reduced load on a host CPU and improved performance. An arithmetic unit includes an SIMD processor for processing a plurality of pieces of data by a single instruction, and a second CPU coupled to the SIMD processor via an arithmetic unit bus and controlling the SIMD processor. A host system includes a host CPU for controlling the entire data processing apparatus, a built-in memory and a peripheral circuit coupled to the host CPU via a first bus, and a peripheral circuit coupled to a second bus. The second CPU accesses an external flash/ROM via the arithmetic unit bus and the first bus, and the SIMD processor accesses an external memory via the second bus. Therefore, the load on the host CPU can be reduced, and the performance of the entire apparatus can be improved.12-24-2009
20090319766PROVISIONING AN UNKNOWN COMPUTER SYSTEM - A method of provisioning an unknown computer system is disclosed. The method includes detecting a computer system to be provisioned, determining that the computer system is unknown to a configuration management system, and identifying a global identifier and a digital certificate to be used to provision the computer system. The method further includes communicating the global identifier and the digital certificate from a network based boot strap server or from boot strap media to the computer system prior to loading an operating system onto the computer system.12-24-2009
20080313453Boot Validation in Imaging Devices - A boot validation system and method may be used in a computer system to validate boot code before allowing the computer system to execute the boot code. In particular, a secure hash algorithm may be used to compute a hash value of the boot code and the computed hash value may be compared to a preprogrammed hash value stored in a secure non-volatile device. If the hash values match the boot code may be validated and the system may then be allowed to execute the boot code. Once the boot code is validated, the boot code may be executed to validate other code (e.g., firmware) in the computer system. In an exemplary embodiment, the boot validation system and method may be used in an imaging device, such as a printer.12-18-2008
20090144533Firmware exclusive access of a peripheral storage device - A method includes searching a peripheral storage device for a key during a firmware boot process of a computer system. Operating system access to the peripheral storage device is disabled if the key exists. Another method includes disabling operating system access to a peripheral storage device coupled to a pre-determined attachment point of a computer system during a firmware boot process of the computer system.06-04-2009
20110238969INTELLIGENT BOOT DEVICE SELECTION AND RECOVERY - Techniques for recovering virtual machine state and boot information used to boot an installed guest operating system on systems where the information has either been lost or is not present are described.09-29-2011
20120198225COMPUTER SYSTEM FOR ACCESSING CONFIDENTIAL DATA BY MEANS OF AT LEAST ONE REMOTE UNIT AND REMOTE UNIT - A computer system for accessing confidential data via at least one remote unit (08-02-2012
20090113198Methods, Systems and Media for Configuring Boot Options - Implementations described herein generally provide methods of configuring boot options. One method may generally include receiving on a remote management information handling system (IHS), boot information relating to a remotely configured HIS, using the boot information on the remote management IHS to create boot options and sending the boot options from the remote management IHS to the remotely configured IHS.04-30-2009
20090113195System and Method for Extension of the BIOS Boot Specification - A system and method is disclosed for extending the BIOS Boot Specification. The specification is extended to accommodate the identification of a greater number of bootable devices. The specification is also extended so that the identifier for each bootable device identifies the default boot order of the device. The specification is also extended to provide additional information about the type of each bootable device and whether each bootable device is an onboard or add-in device. The extension of the BIOS Boot Specification also allows for the designation of certain entries as placeholders for devices that that are supported by the computer system, but not present in the computer system.04-30-2009
20090019274DATA PROCESSING ARRANGEMENT COMPRISING A RESET FACILITY - A data processing arrangement (MPS) comprises a plurality of data processors (SPR, PM01-15-2009
20100223452CENTRAL PROCESSING UNIT CAPABLE OF MULTI-BOOT USING DESJOINT MEMORY SPACES - A central processing unit capable of multi-boot using disjoint memory spaces. The central processing unit comprises a plurality of internal registers communicably coupled to each of a plurality of disjoint memory spaces. The internal registers may be configured to designate one or more of the memory spaces as an active memory space or a standby memory space.09-02-2010
20100223451BOOT CONTROL METHOD AND APPARATUS - A boot control method of a program in an information processing apparatus to which a device can be connected, the method including a search step of searching for a running program that is running on the information processing apparatus when the device is connected, a determination step of determining whether the running program found in the search step includes a program unfit for concurrent running that is unsuited for concurrent running with preset device-corresponding software that is booted in response to connection of the device, and a boot step of booting the device-corresponding software if the running program does not include the program unfit for concurrent running and performing control so as not to boot the device-corresponding software if the running program includes the software unfit for concurrent running.09-02-2010
20100223453INTEGRATED CIRCUIT FOR VALIDATING AND DECRYPTING SOFTWARE DATA - An integrated circuit is provided. The IC runs a boot program that verifies programs before the programs can be loaded onto, or run by, the IC by verifying whether the programs are signed with a boot key, verifies, with the boot program, a developmental boot program signed with the boot key which verifies developmental programs before the developmental programs can be loaded onto, or run by, the IC by verifying whether the IC has a predetermined identifier, and loads the verified developmental boot program and run the loaded developmental booth program thereby enabling loading or running of the developmental programs on the IC if the IC has the predetermined identifier. The IC is programmed with program code configured to receive encrypted software data, decrypt the software data, and validate the software data. The decrypted software is executed only when the validation is successful.09-02-2010
20120144179FAST COMPUTER STARTUP - Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information.06-07-2012
20120144178FAST COMPUTER STARTUP - Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information.06-07-2012
20120144177FAST COMPUTER STARTUP - Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information.06-07-2012
20110119476HARDWARE RESET BUTTON EQUIVALENT SOFTWARE RESET METHOD FOR NETWORK DEVICE - A software reset method that can be used to reset a network device 05-19-2011
20110119475GLOBAL SYNCHRONIZATION OF PARALLEL PROCESSORS USING CLOCK PULSE WIDTH MODULATION - A circuit generates a global clock signal with a pulse width modification to synchronize processors in a parallel computing system. The circuit may include a hardware module and a clock splitter. The hardware module may generate a clock signal and performs a pulse width modification on the clock signal. The pulse width modification changes a pulse width within a clock period in the clock signal. The clock splitter may distribute the pulse width modified clock signal to a plurality of processors in the parallel computing system.05-19-2011
20090106545BOOTING METHOD FOR COMPUTER SYSTEM - A booting method for a computer system with a keyboard and a central processing unit (CPU). In the present method, the keyboard is initialized first. After that, the CPU is initialized in turn. Finally, other hardware devices of the computer system are initialized. The method modifies the order of the hardware initializations so as to determine whether to use system default values or BIOS setup values set by a user to do the initializations based on an input signal received by the keyboard before initializing the CPU. As a result, the situation of using the incorrect BIOS setup values for initializations, which leads to failure in booting the computer system, can be avoided.04-23-2009
20100306521METHOD AND SYSTEM FOR ISCSI BOOT IN WHICH AN ISCSI CLIENT LOADS BOOT CODE FROM A HOST BUS ADAPTER AND/OR NETWORK INTERFACE CARD - Certain aspects of a method for iSCSI boot may include loading boot BIOS code from a host bus adapter or a network interface controller (NIC) by an iSCSI client device. A connection may be established to an iSCSI target by the iSCSI client device after loading the boot BIOS code. The boot BIOS code may be chained to at least one interrupt handler over iSCSI protocol. An operating system may be remotely booted from the iSCSI target by the iSCSI client device based on chaining the interrupt handler. An Internet protocol (IP) address and/or location of the iSCSI target may be received. At least one iSCSI connection may be initiated to the iSCSI target based on chaining at least one interrupt handler. The iSCSI target may be booted in real mode if at least one master boot record is located in the memory.12-02-2010
20100306523RESTORING A SOURCE FILE REFERENCED BY MULTIPLE FILE NAMES TO A RESTORE FILE - Provided are a method, system, and program for restoring a source file referenced by multiple file names to a restore file. An operation is processed to restore a source file having a first file name to a restore file, wherein the source file is in a state of being accessed by a process. A determination is made as to whether a second file name references the source file. A first temporary file name and a second temporary file name are created that both reference the restore file in response to determining that the second file name references the source file. The first temporary file name is renamed to the first file name and the second temporary file name is renamed to the second file name. After the renaming of the first and second temporary file names, the first and second file names reference the restore file.12-02-2010
20100306522Method and system of file manipulation during early boot time using portable executable file reference - A system and method for enabling access to user-level data is described. One embodiment includes accessing a user-level portable executable (PE) file. In this embodiment, the boot-loader registry of a computer is modified during an installation period to include a reference to the user-level PE file. The operating system uses the reference during an early boot-time to image the PE file into memory as a boot-file.12-02-2010
20110113228Rules-Based, Mode-Driven Manager for Timer Bounded Arbitration Protocol Based Resource Control - An example apparatus includes a processor, a memory, and an interface that connects the processor, the memory, and a set of components. The set of components includes a first component configured to acquire a mode from members of an HA cluster and a second component configured to enforce mode pairing rules for members of the HA cluster. Once the desired mode pairing has been determined, a third component takes actions configured to either achieve the mode pairing according to rules for members of the HA cluster or to selectively force a hardware reset of one or more members of the HA cluster upon determining that a split brain scenario is possible based, at least in part, on the mode of the members of the HA cluster. The example apparatus therefore implements a rules-based manager for timer bounded arbitration protocol based resource control.05-12-2011
20090037722Integration Model for Instant-On Environment - An instant-on environment consists of components residing in a computer boot ROM and/or also on a mass storage device. Main components to the instant-on environment include a loader, EPG1, and EPG2. The loader is a module that is integrated into the computer boot ROM, based on an embedded OS, that functions to load other instant-on environment components. There are various methods of integrating the loader into boot firmware to optimize for different requirements. EPG1 is a first user screen that appears on the computer display within seconds after power-on, and from which the user can choose to launch one of the instant-on environment's applications or launch the primary OS. EPG2 is launched if the user chooses to launch an instant-on environment application. EPG2 is a Linux-based desktop environment that the user enters once he selects an application from EPG1.02-05-2009
20090037721PROGRAM DEVELOPMENT METHOD, PROGRAM DEVELOPMENT SUPPORTING SYSTEM, AND PROGRAM INSTALLATION METHOD - An development environment of a high security level is provided for a key-installed system. Development of a program for a system having an LSI device which includes a secure memory is performed by providing another LSI device having the same structure and setting the provided LSI device to a development mode which is different from a product operation mode. Alternatively, the provided LSI device is set to an administrator mode to perform development and encryption of a key-generation program. The LSI device is set to a key-generation mode to execute the encrypted key-generation program, thereby generating various keys.02-05-2009
20090037720Hard Disk Security Method in a Computer System - This invention presented a hard disk security method in a computer system, which provides a hard disk security mechanism combining with the power-on password function for the storage data in a hard disk by restoring the partition table into the BIOS ROM in advance, and deleting the partition table of the hard disk to secure the hard disk.02-05-2009
20090070575MEMORY WITH DATA SYNCHRONIZATION FROM AND FOR A DRIVE CONTROLLER OF A MACHINE - The aim of the invention is to improve the start-up of an electrical machine drive control system comprised of at least one machine (03-12-2009
20090070574Remote diagnostic apparatus - Example apparatus and methods associated with remote diagnostics are described. One apparatus embodiment includes a logic to determine a state of a device associated with a computing platform to which the apparatus is operably connected. The apparatus embodiment may include logic to provide a signal to a remote logic regardless of the state of the computing platform. The apparatus embodiment may also include logic to receive a signal from a remote logic regardless of the state of the computing platform. The apparatus may facilitate actions associated with remote diagnostics including, inventorying add-on devices, controlling add-on device diagnostic execution, and selectively configuring the computing platform based on add-on device diagnostic results.03-12-2009
20130132712HANDLING DEVICE AND METHOD FOR VOLTAGE FAULTS - A handling device and method for voltage faults applicable for using in a computer system. The handling method includes acquiring a signal of voltage fault. According to the signal of voltage fault and by looking up at tables, an operating status of the computer system corresponding to the signal of voltage fault is acquired, and generating a control signal according to the operating status. Then, the computer system according to the control signal is restarted.05-23-2013
20100313004RESTART SUPPORT DEVICE - Provided is a restart support program which executes a method of supporting restart of the system in a computer when the system in which a sequence flow representing an order in which a plurality of processings are executed, one or more objects which are processing targets in each processing, and one or more operations for each object are defined has stopped execution in certain processing. The restart support program stores version information related to a version of an object which transitions with an operation in association with each processing for each object. When the system has stopped execution in certain processing, the restart support program determines processing in which execution has to be restarted from among a plurality of processings based on success and failure of processing, an object and version information of each object which are stored in association with processing, and an object and version information of each object which are actually stored in the system.12-09-2010
20130013905BIOS FLASH ATTACK PROTECTION AND NOTIFICATION - A system and method for BIOS flash attack protection and notification. A processor initialization module, including initialization firmware verification module may be configured to execute first in response to a power on and/or reset and to verify initialization firmware stored in non-volatile memory in a processor package. The initialization firmware is configured to verify the BIOS. If the verification of the initialization firmware and/or the BIOS fails, the system is configured to select at least one of a plurality of responses including, but not limited to, preventing the BIOS from executing, initiating recovery, reporting the verification failure, halting, shutting down and/or allowing the BIOS to execute and an operating system (OS) to boot in a limited functionality mode.01-10-2013
20100306520ELECTRONIC APPARATUS AND BOOTING METHOD OF THE SAME - An electronic apparatus and a booting method of the same are provided. The booting method of the electronic apparatus, including a non-volatile first storage unit storing a device initialization file and a device execution file, and a volatile second storage unit, includes: loading the device execution file from the first storage unit into the second storage unit at an initial booting; generating reference information about the loaded device execution file; maintaining power supplied to the second storage unit when the electronic apparatus is turned off; loading and executing the device initialization file from the first storage unit into the second storage unit at a rebooting; and executing the device execution file stored in the second storage unit with reference to the reference information.12-02-2010
20130138937Method And System For Managing Plant Operation - Disclosed herein are methods and systems for advising and operating a power plant and related devices. In an embodiment, a power plant operator via a client 05-30-2013
20130138938METHOD, RECORDING MEDIUM, AND ELECTRONIC DEVICE FOR REDUCING BOOT TIME - The present invention relates to a method of reducing the boot time of an electronic device (i.e., improving the boot speed of the electronic device), such as a computer, an electronic device to which the method is applied, and a recording medium on which the method is recorded. There is provided a method of booting an electronic device includes hiding at least one first device of devices, included in the electronic device, through an initial start-up program, loading drivers corresponding to remaining devices other than the at least one first device, from among the included devices, by driving an Operating System (OS) of the electronic device, and unhiding the hidden at least one first device through the initial start-up program according to a predetermined event.05-30-2013
20130138939METHOD FOR PROCESSING BOOTING ERRORS - A method for processing booting errors for a computer having multiple voltage regulator downs (VRDs) includes reading a boot sequence including multiple power-on stages, and each power-on stage corresponds to a boot voltage and one of the VRDs; performing the power-on stages according to the boot sequence, and determining whether an output voltage of the VRD corresponding to each power-on stage is equal to the corresponding boot voltage; and when the output voltage of any one of the VRDs is not equal to the corresponding boot voltage, performing a debugging procedure.05-30-2013
20130138940COMPUTER SYSTEM AND METHOD FOR UPDATING BASIC INPUT/OUTPUT SYSTEM THEREOF - A computer system including a central processing unit (CPU), a chipset connected to the CPU, a baseboard management controller (BMC) connected to the chipset, and a basic input/output system (BIOS) unit connected to the BMC is provided. The BMC switches a connection mode which the BMC connecting to the BIOS unit between a local mode and a bypass mode. The BIOS unit communicates with the chipset directly, when the connection mode is switched to the bypass mode. The BMC switches the connection mode from the bypass mode to the local mode, when the BIOS unit should be updated. Then, the BMC communicates with the BIOS unit directly, and the BIOS updating file is written into the BIOS unit.05-30-2013
20130138941METHOD AND APPARATUS TO CONTROL BOOTING OF COMPUTER SYSTEM - A method of controlling booting of a computer system includes determining whether a booting mode of a basic input/output system (BIOS) set in the computer system is a first mode in which supportability of an extensible firmware interface (EFI) is automatically determined, if the booting mode of the BIOS is determined as the first mode, determining whether an operating system (OS) that is stored in a first storing unit and performs booting of the computer system supports the EFI, setting the booting mode of the BIOS as one of a mode in which the EFI is supported and a mode in which the EFI is not supported, based on the determination result regarding whether the OS supports the EFI and controlling booting of the computer system in the set booting mode.05-30-2013
20130138943SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE AND ELECTRONIC SYSTEM MOUNTED THE SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE - An electronic system has a plurality of semiconductor integrated circuit deices which are connected in series via a single signal line. One semiconductor integrated circuit device of the plurality of semiconductor integrated circuit devices sequentially reads the setting data of each of the plurality of the semiconductor integrated circuit devices from a storage unit, sets the setting data of the one semiconductor integrated circuit device to a functional circuit of the one semiconductor integrated circuit device, and transfers second setting data of another semiconductor integrated circuit device to the another semiconductor integrated circuit device via the single signal line.05-30-2013
20130138944METHODS AND SYSTEMS FOR MODIFYING DISK IMAGES TO PROVIDE NETWORK INTERFACE CARD TEAMING CAPABILITIES - A system for modifying a virtual disk to provide network interface card (NIC) teaming capabilities to a virtual disk. The system can include a virtual disk that has access to one or more NICs. In some instances, the NICs are included in a NIC team that is also available to the virtual disk. A teaming module executing on a computer can identify the NIC team and responsively obtain a media access control (MAC) address of the NIC team. In response to obtaining the NIC team MAC address, the teaming module can obtain a network boot MAC address that was used to PXE boot the virtual disk. The teaming module can then replace the NIC team MAC address of each NIC in the NIC team with the obtained network boot MAC address. The system then boots from the virtual disk that has the modified NIC team configuration.05-30-2013
20130138945SYSTEMS, METHODS, AND MEDIA FOR DISABLING GRAPHIC PROCESSING UNITS - An information handling system (IHS) provides a method for managing power consumption. The method includes detecting a power-on in the IHS, wherein the IHS comprises a first graphics processing unit (GPU) and at least one additional GPU. The method also includes determining if a normal boot is implemented in the IHS and determining if an instant-on boot occurred if the normal boot is implemented. The at least one additional GPU is disabled if an instant-on boot occurred.05-30-2013
20100325408Method and Apparatus for Maintaining a Partition When Booting Another Partition - In a processing system with a main partition and a sequestered partition, the main partition sends an interrupt to the sequestered partition before calling an operating system (OS) boot loader for the main partition. The sequestered partition may then enter an interrupt handler. After the sequestered partition enters the interrupt handler, an address line of the processing system may be disabled, and the OS boot loader for the non-sequestered partition may be called. The sequestered partition may then determine whether the address line has been re-enabled. The sequestered partition may remain in the interrupt handler until after the address line has been re-enabled. Other embodiments are described and claimed.12-23-2010
20130145140SYSTEM AND METHOD FOR TEMPORARY SECURE BOOT OF AN ELECTRONIC DEVICE - The invention discloses system and method of temporary secure boot process of an electronic device. The method comprises: generating a first token according to an identification data of the electronic device; sending a request along with the first token to a service provider, the request corresponding to a boot package; receiving a second token and a boot package from the service provider; verifying the second token and the boot package; and executing the boot package according to verification result.06-06-2013
20100325407Electronic Digital Device - There is provided an electronic device comprising an FPGA unit (100), a first and a second memory (210, 220) for storing boot data for the FPGA unit and a digital potentiometer (300) for storing a first and a second setting. In the first setting of the potentiometer the first memory (210) is coupled to the FPGA unit (100) and in the second setting of the potentiometer the second memory (220) is coupled to the FPGA unit (100) for booting.12-23-2010
20100325406COMPUTER SYSTEM AND MANAGEMENT DEVICE - A cloud computing system is provided in order to meet the requirement for efficiently processing a large amount of information, and to meet the requirement for stable performance. This is achieved by a computer system including a user terminal, a plurality of servers connected to the user terminal through a network to provide services to the user terminal, and a management device for managing a server for providing a service to the user terminal. In the computer system, the user terminal transmits the boot information indicating one boot mode among fix boot, first boot, and not-first boot, to the management device. The management device selects a server for providing a service to the user terminal based on the boot information. Then, the selected server provides the service to the user terminal.12-23-2010
20100325403Half duplex GPIO firmware debugger - Methods, systems, apparatuses and program products are disclosed for communications such as may be used for debugging computers and similar electronic products at a level suitable for low level firmware. This may find application, for example, in environments after cache initialization around the time of memory bring up or motherboard device enumeration but including durability into and beyond software loading.12-23-2010
20100332816RESILIENCY AGAINST FIELD-UPDATED SECURITY ELEMENTS - User terminal resilience to application elements may be provided. Upon initialization, a user terminal may detect elements associated with the user terminal's operation. The user terminal may load each of the elements in turn and determine whether the element causes a fault in the user terminal. Elements that result in a fault may be disabled from being loaded in the future.12-30-2010
20100169631AUTHENTICATION FOR RESUME BOOT PATH - Methods and systems to perform an authentication operation after resuming from a sleep state are presented. In one embodiment, a method includes starting a boot process from a sleep state. The method further includes providing platform services to support an authentication operation as part of the boot process and determining whether to complete the boot process based at least on results of the authentication operation.07-01-2010
20110010532BOOTING METHOD AND COMPUTER SYSTEM USING THE BOOTING METHOD - A booting method adaptable to a computer system having a processor, a memory and a bootable medium, wherein the bootable medium has an operating system, the booting method comprises the steps of activating a basic input/output system (BIOS); reserving a reserved area in the memory according to a setting of a setting space; copying the operating system from the bootable medium to the reserved area as an operating system copy; and activating the operating system copy from the reserved area.01-13-2011
20100199082MICROPROCESSOR BOOT-UP CONTROLLER, NONVOLATILE MEMORY CONTROLLER, AND INFORMATION PROCESSING SYSTEM - An information processing apparatus has a multi-valued NAND nonvolatile memory including a plurality of word lines and a plurality of memory cells connected to the respective word lines. Each memory cell has a plurality of threshold voltages, and is divided into a first and a second storage area. A program code is stored in the first storage area, and user data is stored in the second storage area. The apparatus also includes a volatile memory to which the program code is transferred from the multi-valued NAND nonvolatile memory. The apparatus further includes a CPU connected to the volatile memory and configured to operate based on the program code transferred to the volatile memory.08-05-2010
20090037719Enabling a heterogeneous blade environment - In one embodiment, the present invention includes a method for receiving a request for power-up of a first blade of a chassis, enabling the first blade to power-up in a reduced boot mode and receiving a communication including characteristic information and policy information associated with the first blade, and analyzing the characteristic information and the policy information to determine a policy and a boot configuration for the first blade. Other embodiments are described and claimed.02-05-2009
20110029764BIOS FIELD MAPPING - BIOS field mapping includes generating basic input/output system (BIOS) information by defining property identifications using a visual form code language and determining that a proprietary set-up service is accessible. The BIOS field mapping then includes converting the visual form code language to a binary format and storing the property identifications in binary format on a setup database as data hidden from an operating system. A BIOS driver may then request the property identifications causing a transfer of the property identifications to the BIOS driver.02-03-2011
20110029765COMPUTING DEVICE BOOTING UTILIZING DISPERSED STORAGE - A computing device boot-up method begins by a processing module detecting a boot-up of the computing device. The method continues with the processing module addressing a distributed basic input/output system (BIOS) memory to retrieve a plurality of error coded BIOS data slices. The method continues with the processing module reconstructing BIOS data from the plurality of error coded BIOS data slices using an error coding dispersal function. The method continues with the computing device booting up in accordance with the BIOS data.02-03-2011
20110029766SYSTEM, APPARATUS, AND METHOD FOR BIOS LEVEL CONTEXTUAL CONFIGURATION OF RESOURCES - A system and method for a contextual control of resources of a computer. A plurality of detection modules may inform a configuration module of context changes and events. A database may store a plurality of configuration parameters and policies. A configuration module may configure a BIOS of a computer according to events, context and configuration policies. Other embodiments are described and claimed.02-03-2011
20110035575MULTIPROCESSOR SYSTEM COMPRISING MULTI-PORT SEMICONDUCTOR MEMORY DEVICE - A multiprocessor system comprises first and second processors connected to a multi-port semiconductor memory device. The multi-port semiconductor memory device comprises a shared memory area and a plurality of mailbox areas used for inter-processor communication. The first and second processors use a single nonvolatile memory device for storing boot data and transmit information for booting via the shared memory area.02-10-2011
20110035574Running a Computer from a Secure Portable Device - An operating system is booted from a secure peripheral device on a host computer. The secure peripheral device, which includes a memory, is communicatively coupled with the with the host computer. A first operating system is booted from the memory of the secure peripheral device. A secondary operating system is launched on the first operating system.02-10-2011
20110119474Serial Peripheral Interface BIOS System and Method - Various embodiments disclosed herein are directed to a serial peripheral interface-based (SPI-based) BIOS system for improved upgrading of a BIOS software image in a gaming machine. The system includes a flash BIOS chip and a SPI BIOS chip. The flash BIOS chip is operable to be written to by an Intel chipset for storage of an onboard Ethernet controller's information, wherein the flash BIOS chip may contain a new BIOS software image. The SPI BIOS chip comprises a traditional BIOS including gaming extensions to the BIOS. The SPI BIOS chip can be disabled from write actions at a jumper/circuit level. When a SPI BIOS write enable jumper circuit is ON, a write protect pin of the serial peripheral interface BIOS is in the disabled state. In this regard, when the write protect pin is in the disabled state, the SPI BIOS content may be updated to the new BIOS software image from a BIOS install compact flash. When the BIOS write enable jumper circuit is OFF, the write protect pin of the serial peripheral interface BIOS is in enabled state. In this regard, when the write protect pin is in the enabled state the serial peripheral interface BIOS content cannot be updated05-19-2011
20100332814PORTABLE LIGHT WEIGHT LDAP DIRECTORY SERVER AND DATABASE - A lightweight embedded directory server with portable LDAP data is disclosed. The directory server and database comprises a processing chip, an on-chip processing unit, an on-chip memory system, and an on chip input/output system. The memory system stores an embedded operating system and an embedded directory server, and is also used for storing data to be processed by the processing unit. The input/output system is provided for connecting the processor chip to one or more applications for supplying directory services to the one or more applications. A portable memory device stores a directory database, and, in use, this memory device is releasably connected to the on chip input/output system. An on-chip driver is used to perform read and write operations on the portable memory device; and a boot loader software program is used for starting execution of the embedded directory service.12-30-2010
20110113229Method for Shortening the Boot Time of a Computer System - A computer system having an operating environment configured for enabling boot up in a relatively short time is disclosed. A hard disk is utilized to store a boot file. A run process list registers a process to be run during boot up. When the computer system is being booted up, if the run process list registers a process to load the boot file, a process control unit does not control a process management unit, so that the process is run as usual. If the process is not registered, the process management unit suspends the process. When the suspended process is called by another process later, the process control unit makes the process resumed on demand.05-12-2011
20110113227ELECTRONIC EQUIPMENT AND BOOT METHOD, STORAGE MEDIUM THEREOF - An electronic equipment is provided, which includes a plurality of boot devices and a basic input/output system (BIOS). The BIOS is electrically coupled to the boot devices and used for recording driving parameters of the boot devices and a driving sequence of the driving parameters. The BIOS drives the boot devices by using the driving parameters according to the driving sequence, so as to perform a system booting operation of the electronic equipment. When any one of the boot devices accomplishes the system booting operation, the BIOS adjusts a driving parameter corresponding to the boot device as a first order of the driving sequence, so that the boot device becomes a first selected system booting device. Furthermore, a boot method for an electronic equipment and a storage medium thereof are provided.05-12-2011
20110113226Distribution Of Software Updates - Methods, apparatuses, and systems for distribution of software updates are described. A file representing a difference between a first software stack and a second software stack and a task sequence may be received at a computer. The task sequence may represent instructions for installing the second software stack on the computer using the file and a stored image that represents the first software stack. The computer then may execute the task sequence to use the file and the stored image to install the second software stack on the computer. In one example, a second file representing a difference between the first software stack and a third software stack may be received by the computer, and the task sequence may include further instructions for installing the second software stack based on the first file, the second file, and the stored image.05-12-2011
20100332813SYSTEM AND METHOD FOR UTILIZING A PROTECTED/HIDDEN REGION OF SEMICONDUCTOR BASED MEMORY/STORAGE - A method for accessing a protected area of a solid-state storage device via firmware control is described. During system initialization, firmware components are loaded and executed to initialize a computer system. These firmware components include a firmware driver for accessing solid-state storage devices connected to the computer system. The system firmware enables a protected area on a solid-state storage device's media to be accessed under firmware control. After firmware accesses, the protected area is closed from access by non-firmware entities by “hiding” the true size of the media such that those entities are unaware of this area of the media. Mechanisms are disclosed for providing firmware access to the protected area only during pre-boot, and for both pre-boot and run-time operations. The firmware-controlled media access scheme may be used to load firmware stored on solid-state media during pre-boot and to store system information in the protected area during pre-boot and/or run-time operations.12-30-2010
20110113232METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR MEMORY MANAGEMENT IN DEVICES USING SOFTWARE DEFINED RADIOS - An apparatus may include a processor configured to maintain a profile comprising data about software defined radio usage. The processor may be further configured to determine a subset of the plurality of software defined radios. The processor may be additionally configured to determine computing resources required for loading an available software defined radio that is not currently loaded into the memory based at least in part upon the maintained profile and the determined subset. The processor may also be configured to determine based at least in part upon the determined required computing resources whether sufficient computing resources are available for loading the available software defined radio into the memory. The processor may further be configured to initiate a reboot of loaded software defined radios if sufficient computing resources are not available for loading the available software defined radio. Corresponding methods and computer program products are also provided.05-12-2011
20110113231SYSTEM AND METHOD FOR PROVIDING SECURE RECEPTION AND VIEWING OF TRANSMITTED DATA OVER A NETWORK - A method and system for securely opening an e-mail attachment in a computer processing environment having a trusted node daughterboard connected to at least one operational node motherboard with an e-mail processing system operatively coupled to the trusted node daughterboard. The method includes the steps of when an e-mail attachment is to be opened, sending a power on signal from the trusted node daughterboard to the operational node motherboard when it is desired to utilize the operational node motherboard for opening an e-mail attachment. Pre-boot data is then requested from the operational node motherboard and is sent from the trusted node daughterboard to the operational node motherboard to enable operation of the operational node motherboard for securely opening an e-mail attachment.05-12-2011
20090049295Determining a boot image based on a requesting client address - A method, computer-readable storage medium, and boot server that, in an embodiment, receive a command that requests a name of a boot image and a network address of a boot server that contains the boot image, invoke a plug-in to determine the name of the boot image based on an address of a client that sent the command, and send the name of the boot image and the network address of the boot server to a client that sent the command. In various embodiments, the address of the client may be a network address or a MAC (Media Access Control) address. The client retrieves the boot image via the name, and the boot image initializes the client when executed at the client. The name of the boot image is changed to a second name and sent to the client in response to another command.02-19-2009
20110040961BINDING DATA TO A COMPUTING PLATFORM THROUGH USE OF A CRYPTOGRAPHIC MODULE - Using a cryptographic co-processor (02-17-2011
20110040960Method and System for Securely Updating Field Upgradeable Units - Devices and methods for securely upgrading devices, such as field upgradeable units, are disclosed. In response to receiving an update object, a device may determine whether a predefined location of memory includes a predetermined value. Based on the value in the predefined location, the device may store the received update object in a verification portion of the memory. After verifying the authenticity of the update object, the device may copy the update object from the verification portion of the memory to an inactive portion. The inactive portion of the memory can be swapped with an active portion of the memory, such that the inactive portion becomes active.02-17-2011
20110040959IMAGE REPRODUCING APPARATUS AND METHOD - An image reproducing apparatus and method of controlling the image reproducing apparatus are provided. The method of controlling the image reproducing apparatus includes: determining whether external power is supplied; performing a first booting operation when the external power is supplied; and controlling the image reproducing apparatus to operate in a sleep mode if an operation start signal is not received until the booting operation is completed. The method further includes controlling the image reproducing apparatus to perform a second booting operation to operate in a normal mode after an operation start signal is received. The method further includes performing a resuming operation so that the image reproducing apparatus operates in a normal mode when the operation start signal is received while the image reproducing apparatus operates in the sleep mode. The method further includes operating in an end mode when the sleep mode continues for a predetermined time or longer.02-17-2011
20110040958METHOD OF SWITCHING COMPUTER OPERATING SYSTEMS - The present invention relates to a method of switching operating systems in a computer, with which the computer executes the procedure of switching different operating systems. A first operating system executes a process of switching to a second operating system. A process of restoring backup data of a BIOS is executed. The BIOS reads computer system information of an initial state backed up in a memory of the computer and configures the computer to make the computer restored to the initial state of booting. The BIOS calls and executes an interruption service to search a loader of the second operating system. The loader loads the second operating system into the memory. The second operating system boots up and is entered.02-17-2011
20100153697Methods and systems for embedded user authentication and/or providing computing services using an information handling system configured as a flexible computing node - Methods and systems for providing embedded user authentication and/or providing computing services using an information handling system configured as flexible computing node, and which may be implemented to perform preboot authentication of users. The flexible computing node may also be configured to provision the appropriate work environment for a given user based on one or more user parameters (e.g. entitlements, location, network connection, and/or other parameters).06-17-2010
20100146255MOTHERBOARD, STORAGE DEVICE AND CONTROLLER THEREOF, AND BOOTING METHOD - A motherboard, a storage device and a controller thereof and a booting method are provided. In the present invention, when powered on, an unfetch signal is transmitted to a central processor unit (CPU) by a controller such that an operation of the CPU is suspended. Next, a system firmware in the storage device is loaded by the controller. After the system firmware is loaded, a fetch-done signal is transmitted to the CPU by the controller such that the CPU starts executing a booting procedure.06-10-2010
20110083002SYSTEM AND METHOD PROVIDING A PLUGGABLE ARCHITECTURE FOR TASK MANAGEMENT ON COMPUTERS - A system and method retrieve an image using a first computer processor, and transmit the image from the first computer processor to a second remote computer processor. The first computer processor and the second remote computer processor are coupled via a network connection. The image is received at the network connection, and the image is a lightweight operating system that is configured to be stored in and execute in a virtual memory coupled to the second remote computer processor. The second remote computer processor is not equipped with additional hardware or an agent to receive or execute the image.04-07-2011
20110087871CONSUMER ELECTRONIC DEVICE AND METHOD OF CONTROLLING A CONSUMER ELECTRONIC DEVICE - A method and apparatus for controlling a consumer electronics (CE) device, are provided. The method includes determining, when a touch is sensed, whether the touch corresponds to a booting request, and performing a booting operation when the touch is a booting request; and controlling the CE device to operate in a sleep mode when an operation start signal is not received until the booting operation is completed, and controlling the CE device to operate in a normal mode when an operation start signal is received before the booting operation is completed. The apparatus includes a touch sensing unit; which senses a touch to the CE device; a determining unit which determines whether the touch sensed by the touch sensing unit corresponds to a booting request; a booting unit, and a control unit controlling the CE device.04-14-2011
20090210690METHOD OF UPDATING BASIC INPUT OUTPUT SYSTEM AND MODULE AND COMPUTER SYSTEM IMPLEMENTING THE SAME - A method for recovering a BIOS unit, an updating module thereof and a computer system are provided. When the computer system is in a standby mode, and the updating module is coupled with the computer system and detects that a first start unit is enabled, data in the BIOS unit of the computer system are overwritten with program codes stored in the storage unit.08-20-2009
20100138643Media controller - A media controller is disclosed, which is a memory storing device, made up of an operating system and a piece of multimedia software, where the operating system is made merely for the multimedia software and available for the booting. And the multimedia software is an application program running on the operating system and is able to fetch the songs stored in the computer for overdubbing and sound effects processing. The selection of the memory storing device is the first priority to read during the booting. Once the new setting is saved, the computer is then ready to reboot. The memory storing device then takes charge of the execution of the operating system in the memory storing device. A user is then ready to run the multimedia software on the operating system, and further to operate the input device to fetch the songs stored in the computer for overdubbing and sound effects processing, to greatly achieve the stable playing of sound effects by making use of the existing computer equipment.06-03-2010
20110213955MEMORY INITIALIZATION METHOD, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM RECORDING AN INITIALIZATION PROGRAM, AND INFORMATION PROCESSING APPARATUS - A memory initialization method in a boot sequence of an information processing apparatus having a memory and a plurality of processors sharing the memory, the memory initialization method includes initializing a first area of the memory required for an operation of the firmware and a second area of the memory required for a kernel activation by executing the firmware stored in a first storage by a first processor, storing the kernel to the initialized second area from a second storage by executing the firmware by the first processor, making a second processor activate and execute the kernel stored in the second area by executing the firmware by the first processor, and initializing a remaining area of the memory by the kernel executed by the second processor and the firmware executed by the first processor in parallel.09-01-2011
20110213953System and Method for Measuring Staleness of Attestation Measurements - A method is provided for determining with a first device, staleness of attestation measurements at a second device. The method includes booting up the second device at a first time, the second device having a communication portion, a security portion, a basic input/output system and a trusted protection module. Further, the method includes generating an initial counter based on the booting up of the second device at the first time. A current counter is then generated based on a second time after the first time. The method additionally includes providing a request to the second device from the first device, the request requesting booting information and current information, the booting information being based on the initial counter, the current information being based on the current counter. Still further, the method includes providing a response to the first device from the second device, the response including the booting information and the current information. Finally, the method includes determining, via the first device, the generated initial counter and the current counter based on the response.09-01-2011
20090327683SYSTEM AND METHOD TO ACCELERATE ACCESS TO NETWORK DATA USING A NETWORKING UNIT ACCESSIBLE NON-VOLATILE STORAGE - In some embodiments, the invention involves a network controller having a pattern matching unit to identify whether boot file requested from a network accessible storage device for booting are stored locally in non-volatile memory accessible to the network controller. When required boot files are stored locally, the locally stored files are sent to the processor to boot the operating system. In an embodiment, retrieved boot files are automatically cached by the network controller in the accessible non-volatile memory. In other embodiments, a service operates to ensure coherency between locally store boot files and the boot filed stored on the network accessible storage. In another embodiment, data other than boot files may be stored and retrieved from the non-volatile memory. Other embodiments are described and claimed.12-31-2009
20090327685Efficient root booting with solid state drives and redirection write snapshots - A system and method for root booting includes a plurality of computing devices that each boot from a read-only base volume of an attached storage device that includes data common to the computing devices. The attached storage device also includes a plurality of volumes, each dedicated to one of the computing devices, which are redirect on write snapshots of the read-only base volume including unique items for the respective computing device. The read-only base volume may be stored in one or more solid state drives which may be configured as a RAID (redundant array of independent disks) and/or mirrored with one or more other storage drives. The plurality of volumes may each be stored in one or more hard disk drives which may be configured as a RAID. The attached storage device may be operable to add common data to the read-only base volume.12-31-2009
20090327678Enhancing Security of a System Via Access by an Embedded Controller to A Secure Storage Device - System and method for performing pre-boot security verification in a system that includes a host processor and memory, an embedded microcontroller with an auxiliary memory, e.g., an on-chip ROM, or memory controlled to prohibit user-tampering with the contents of the memory, and one or more pre-boot security components coupled to the embedded microcontroller. Upon power-up, but before host processor boot-up, the embedded microcontroller accesses the auxiliary memory and executes the program instructions to verify system security using the one or more pre-boot security components. The one or more pre-boot security components includes at least one identity verification component, e.g., a smart card, or a biometric sensor, e.g., a fingerprint sensor, a retinal scanner, and/or a voiceprint sensor, etc., and/or at least one system verification component, e.g., TPM, to query the system for system state information, and verify that the system has not been compromised.12-31-2009
20120173861DATA CARD AND A BOOTING METHOD FOR THE DATA CARD - The present invention discloses a method for a data card to report a port, including: initializing a power-on startup module and a compact disk (CD) reporting and processing module in the boot phase, where the CD reporting and processing module is configured to report a data card as a CD, interact with a terminal, and realize CD reading; and reporting a data card as a CD to a terminal in the boot phase. The data card is reported as a CD after initialization of the power-on startup module and the CD reporting and processing module, rather than after the initialization of the power-on startup module in the boot phase and the user application modules in the network access phase. In this way, the terminal user can quickly find that the data card is reported as a CD after the data card is inserted, which improves the user experience.07-05-2012
20110125992SYSTEM TOOL PLACEMENT IN A MULTIPROCESSOR COMPUTER - A multiprocessor computer system comprises a plurality of nodes and an application placement module operable to place an application on a selected group of the compute nodes. The application placement module includes a system tool helper operable to manage operation of a system tool on the selected group of the compute nodes, the system tool operable to monitor execution of the application. Managing system tool operation comprises at least one of distributing, executing, and ending the system tool on one or more compute nodes.05-26-2011
20110131399Accelerating Wake-Up Time of a System - A method for accelerating a wake-up time of a system is disclosed. The method includes scrubbing and making available for allocation a minimum amount of memory, executing a boot-up operation of an operating system stored on the system, and scrubbing and making available for allocation an additional amount of memory in parallel with and subsequent to the boot-up operation of the operating system. The system may include one or more nodes, each of the nodes having a minimum node resource configuration associated therewith that corresponds to a minimum number of processors included in a node that are required to be activated in order to activate the node. The system may further include one or more partitions, where each partition encompasses at least one node. Each partition may be assigned a priority in relation to other partitions, and the partitions may be successively activated based on the assigned priorities.06-02-2011
20100235618START-UP OF COMPUTING SYSTEMS - A computing device is provided that includes a computing unit, which has a working memory and a processing unit, and a boot memory having control instructions for operating the computing device. The control instructions are stored in boot memory and are to be transferred to the computing unit at start-up of the computing device. A boot control unit is connected to the computing unit by at least a first and a second interface and connected to the boot memory by a third interface. The boot control unit is configured to transfer a first part of the control instructions from the boot memory via the first interface to the computing unit and to transfer a second part of the control instructions from the boot memory via the second interface to the computing unit.09-16-2010
20110078430GAMING MACHINE HAVING A SECURE BOOT CHAIN AND METHOD OF USE - An electronic gaming machine (EGM) comprises a memory storing boot program code comprising first code; a central processing unit (CPU) arranged to access the memory and initiate a boot process by reading the first code from the memory; and a monitoring device having or with access to validation code and arranged to take at least one protective action if the first code does not match the validation code.03-31-2011
20100131748COMPUTER SYSTEM WITH REDUCED STORAGE DEVICE AND ASSOCIATED BOOTING METHOD - A computer system with integrated storage device for storing both a basic input/output system (BIOS) code and an operating system (OS) code and an associated booting method are provided. The computer system includes a central processing unit, a storage device controller and the storage device. The BIOS code and the OS code are stored in an invisible are and a visible area of the storage device, respectively. At first, the storage device controller is activated to read data from an architecture information area of the storage device to perform initialization. Then, the initialized storage device controller converts a read-only memory access command issued from the central processing unit into a suitable format to control loading of the BIOS code from the invisible area. At last, the storage device controller controls loading of the OS code from the visible area to finish the booting of the computer system.05-27-2010
20100131746Method and apparatus to support separate operating systems in partitions of a processing system - A processing system with multiple processing units may support separate operating systems (OSs) in separate partitions. During an initialization process, a preboot manager in the processing system may copy software to a sequestered area of memory in the processing system. The preboot manager may also configure the processing system to hide the sequestered area of memory from a first partition of the processing system. Also, the preboot manager may use a first processing unit in the processing system to boot an OS on the first partition, and the preboot manager may transmit a boot trigger from the first processing unit to a second processing unit in the processing system. The boot trigger may cause the second processing unit to use the software in the sequestered area of memory to boot a second partition of the processing system. Other embodiments are described and claimed.05-27-2010
20110087873INFORMATION PROCESSING APPARATUS AND ITS CONTROL METHOD - An information processing apparatus includes: a first recording medium that stores a first system controller for allowing to execute boot processing of the information processing apparatus and is accessed by using a first access path in a tree structure or by using a second access path based on a first conversion table representing a correspondence between the first and second access path; a memory disk generation section allowing to secure a memory disk section that operates as a second recording medium and is accessed by using a third access path; a conversion table generation section allowing to generate a second conversion table representing a correspondence between the second and third access path; and a duplication controller allowing to copy the first system controller onto the memory disk section as a second system controller and allowing to duplicate the first and second system controllers based on the second conversion table.04-14-2011
20110087872Firmware Verified Boot - Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing system during a boot process, a header section of a read-write portion of firmware of the computing system. The example method further includes generating, using a first cryptographic hash algorithm, a message digest corresponding with the header. The example method also includes decrypting, using a first public-key, an encrypted signature corresponding with the header. The example method still further includes comparing the message digest corresponding with the header and the decrypted signature corresponding with the header. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header match, the example method includes continuing the boot process. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header do not match, the example method includes halting the boot process.04-14-2011
20110087870COMPUTING DEVICE WITH DEVELOPER MODE - Methods and apparatus for implementing modes of operation of computing device are disclosed. An example apparatus includes a mode-selection input device having a first state and a second state. The example apparatus also includes firmware operably coupled with the mode-selection input device. In the example apparatus, when the mode-selection input device is in the first state, the firmware is configured to cause the computing device to operate in a first mode of operation, a user mode. In the example apparatus, when the mode-selection input device is in the second state, the firmware is configured to cause the computing device to operate in second mode of operation, a developer mode.04-14-2011
20100191946APPARATUS, SYSTEM, AND METHOD FOR IMPROVING USER BOOT VIA A STORAGE AREA NETWORK - An apparatus, system, and method are disclosed for remotely booting a client from a storage area network (“SAN”). A connection module enables a client, such as a diskless client, to connect to two or more storage area networks (“SANs”), the SANs belonging to a group of redundant SANs, each SAN in the group redundantly storing at least a portion of substantially identical operating system data for the client. The boot module enables the client to remotely boot an operating system from the two or more redundant SANs. The boot module makes at least one read request to each of the two or more connected SANs, each read request configured to retrieve a disparate portion of the operating system data for loading the operating system onto the client. The boot module loads the operating system onto the client using a combination of data retrieved from the two or more connected SANs.07-29-2010
20100017590Method and Related Computer System Capable of Executing Programs for a Computer System - A method capable of executing programs for a computer system operating in a shut down state includes generating a control instruction while a key of the computer system is pressed down; storing the control instruction; and performing actions according to the control instruction when the computer system is booted up.01-21-2010
20090210691Memory System and Memory Management Method Including the Same - A booting method of a digital processing having a first processor and a second processor is provided. An interface between the first processor and the outside is stopped. A second processor program code is transmitted to a second memory from a first memory. A second stage loader (SSL) for the first processor is transmitted to a buffer of the second processor from the first memory. A first processor program code is transmitted to the second memory from the first memory under the control of the second processor and an interface between the first processor and the outside is resumed. The first processor program code is downloaded fast into the second memory to decrease booting time of the digital processing system.08-20-2009
20090327680Selecting a Random Processor to Boot on a Multiprocessor System - Pervasive logic is provided that includes a random event generator. The random event generator randomly selects which processor of a plurality of processors in the multiprocessor system is to be a boot processor for the multiprocessor system. A corresponding configuration bit for the randomly selected processor is set to identify the processor as a boot processor. Based on the setting of the configuration bits for each processor in the plurality of processors, a selection of a security key is made. The security key is then used to decrypt the boot code for booting the multiprocessor system. Only the randomly selected boot processor is able to select the correct security key for correctly decrypting the boot code, which it then executes to bring the system to an operational state.12-31-2009
20090327684Apparatus and method for secure boot environment - In some embodiments, a processor-based system may include at least one processor, at least one memory coupled to the at least one processor, a boot block stored at a first memory location, a capsule update stored at a second memory location, a startup authenticated code module to ensure the integrity of the boot block upon a restart of the processor-based system, code which is executable by the processor-based system to cause the processor-based system to validate the boot block with the startup authenticated code module upon the restart of the processor-based system, and, if the boot block is successfully validated, to validate the capsule update for the processor-based system with the startup authenticated code module. Other embodiments are disclosed and claimed.12-31-2009
20090307477INSTALLATION OF SOFTWARE ONTO A COMPUTER - An indication is received from a user to initiate installation of an operating system onto a storage device of a computer. The storage device is partitioned into an original partition and a new partition. Installation software for the operating system is loaded onto the new partition. The computer is booted into the installation software on the new partition. The operating system is installed onto the original partition via the installation software on the new partition. The computer is then re-booted into the operating system on the original partition and the new partition is removed from the storage device.12-10-2009
20100005286METHOD FOR BOOTING COMPUTER SYSTEM - A method for booting a computer system is provided. In the method for booting the computer system, a memory space is created using a BIOS to simulate a virtual disk. The virtual disk is used to execute operations which have to be executed via a floppy disk drive. The operations are executed in the virtual disk via the BIOS. Thus, the floppy disk drive is not needed, and the cost is reduced. In addition, time consumed in reading data from the floppy disk is reduced, and installing speed also increases.01-07-2010
20090037717FIRMWARE RETRIEVAL ACROSS A NETWORK - A system comprises a processor and non-volatile storage coupled to the processor. The non-volatile storage comprises firmware that is executable by the processor. The processor determines whether the firmware is available to be executed. If the firmware is not available to be executed, the processor determines a location across a network and retrieves a second firmware image from that location.02-05-2009
20100037043STORAGE DEVICE SELECTION AND SWITCHING SYSTEM - A storage device control system is disclosed for selecting a storage device to connect to a computer from a plurality of available storage devices and for controlling the manner in which the storage devices can be connected to the computer.02-11-2010
20100037041Booting a Computer System from Central Storage - A filter driver that is loaded during an initial part of the boot process enable operating systems that are not capable of booting from central storage to be booted from central storage. According to this technique, an initial set of operating system files is loaded into system memory from a local storage volume. The initial set of files includes a small subset of all of the operating system files and includes a boot loader, a kernel, boot time drivers, a file system driver, and a filter driver. The filter driver takes control over the loading of the remainder of the operating system files, so that these files are loaded from central storage instead of the local storage volume.02-11-2010
20100037042SYSTEM FOR SWITCHING BIOS SET-VALUES - An exemplary system for switching BIOS set-values includes a south bridge chip, a memory unit, a switching unit, and a BIOS chip. The south bridge chip is connected to the memory unit and the switching unit, and connected to the BIOS chip via a bus. The memory unit is configured for storing a plurality of groups of predetermined BIOS set-values. The switching unit controls the south bridge chip to selectively read a group of BIOS set-values from the memory unit, and then to write the group of BIOS set-values into the BIOS chip.02-11-2010
20100058046Method and Apparatus for Secure Instantly-Available Applications in a Computer System - A method and apparatus for instantly-available applications in a computer system is presented. A computer that incorporates fast non-volatile primary memory for storing the application software and/or operating system, resulting in an instant-on computer is presented. Large parts of the application code and/or operating system code are stored in non-volatile write-protectable areas of the memory that cannot be modified by malicious sources, resulting in a secure computer. It solves the problem of typical computers having to load the applications from a slow device such as the hard disk to the main memory. This loading is avoided by permanently housing the applications in a non-volatile main memory. The system also solves the problem of corruption of application software areas from malicious sources. The memory system contains writeable and write-protected areas and a memory controller that controls the access to the various regions of the memory.03-04-2010
20090217025Method and System for Implementing a Diagnostic or Correction Boot Image Over a Network Connection - The present invention is directed to a system that initiates specific maintenance and diagnostic boot images on remote computers. The system is used to select a particular remote device over a network. A particular new boot image is also selected, and that boot image is tailored to operate a maintenance or diagnostic function on the target machine. The new boot image is downloaded to the target, and the target is rebooted with the new boot image. The new boot image is selected from other specific boot images. Upon reboot, the new boot image performs the diagnostic or maintenance routines on the remote target machine. At some predetermined point, the original boot image is swapped back, and the machine rebooted once again. This returns the machine to its original image.08-27-2009
20090217024Recovering from Hard Disk Errors that Corrupt One or More Critical System Boot Files - A system, method, and program product is provided that recovers from a sector error affecting a critical file. A damaged sector prevents a critical file from being read prevents the computer system from booting. A controller records a sector number corresponding to the damaged sector. The system is rebooted using an alternative boot media. The system accesses the primary nonvolatile storage media after the rebooting. The damaged sector number is read from the error log and a file map is used to determine the critical file that is stored in the damaged sector. A backup copy of the critical file is retrieved from a backup media. The backup copy is written to the primary media using undamaged sectors and the critical file is mapped to the undamaged sectors. The system is subsequently booted successfully from the primary nonvolatile storage media.08-27-2009
20090217023Method for upgrading a microprocessor-controlled device with a new software code via a communication network - In a method for equipping a microprocessor-controlled device with new software code via a communication network, the device has a non-volatile program memory, with two memory areas, a first memory area and a second memory area. The first memory area (boot sector) is provided for a basic program, which provides a first operating system and first functionalities of the device, and the second memory area (update sector) is provided for the software code to be transferred. The first memory area is protected by hardware means against overwriting. The following method steps are performed. First, there is a system boot with the basic program from the first memory area. In such case, a system variable UPDATE is read. In case this has the value “perform update”, an invocation of a function “perform firmware update” occurs. Then this variable is set to the value “invalid firmware”. Next, a connection is established to a superordinated unit and the new software code is transferred into the device. Following storage of the new software code in the second memory area, a test of the new software code for bit error is performed. In case bit errors have occurred during the transfer, a new system boot is performed. If no bit errors have occurred, the new software code is executed from the second memory area and the system variable UPDATE is written with the value “valid firmware”. Through this method, a safe equipping of microprocessor-controlled devices with new software code via a communication network is possible.08-27-2009
20100070752Stable Active X Linux based operating environment - An engine, system and method of providing a stable ActiveX Linux-based operating system. The engine, system and method include a plurality of computing hardware, capabilities for booting the plurality of computing hardware using a Linux operating system, and capabilities for accessing, via a scripting compatibility layer that ports non-native applications to the Linux operating system, of an ActiveX enabled web browser that is non-native to the Linux operating system.03-18-2010
20100070745COMPUTER SYSTEM AND METHOD FOR BOOTING UNDER LOW TEMPERATURE STATE - A method for booting a computer system under a low temperature state is disclosed. When a trigger signal of a pressed power button on the computer system is detected, a hard disk temperature will be obtained via a temperature sensor to determine whether the hard disk temperature is less than a first predetermined temperature. If the hard disk temperature is less than the first predetermined temperature, a heater is activated to heat the hard disk and a low temperature event will be set. Next, if the hard disk temperature has reached or is greater than the second predetermined temperature, the computer system will be under activation. Then before a loading component of the computer system is activated, the low temperature event will be read. Therefore, output loading of the loading component is decreased to activate an system component of the computer system with a low loading state.03-18-2010
20100070750IMAGE PROCESSING APPARATUS AND PROGRAM STARTING UP METHOD - An image processing apparatus has first through n-th pluralities of programs which, when executed by a computer processor, perform respectively first through n-th functions of the image processing apparatus, where n denotes an integer more than 1, and starts up, on a function-by-function basis, the first through n-th pluralities of programs respectively corresponding to the first through n-th functions. The image processing apparatus starts up, in a predetermined sequence, respective programs included in any one plurality of programs among the first through n-th pluralities of programs to a state in which the plurality of programs performs a corresponding function.03-18-2010
20110154008ELECTRONIC DEVICE AND METHOD FOR BOOTING UP AND SHUTTING DOWN THE ELECTRONIC DEVICE - A method for booting up and shutting down an electronic device is applied in the electronic device. The electronic device includes a processor, a first storage, and a second storage. The speed of the processor accessing data from the first storage is faster than the speed of the processor accessing data from the second storage. The second storage stores the boot data for booting up the electronic device. The method includes: receiving signals for booting up the electronic device; detecting whether the first storage stores the boot data; and obtaining the boot data from the first storage to boot up the electronic device if the first storage stores the boot data. A related electronic device is also provided.06-23-2011
20100064126Method and system for providing hybrid-shutdown and fast startup processes - A system and corresponding method are disclosed to provide hybrid-shutdown and fast startup processes. The system allows a computer to quickly return to its last state before power-off instead of going through the hardware enumeration and configuration of a normal full system boot. The system enables fast system startup regardless of the number of pre-loaded software as long as there is no hardware configuration change since the previous power-off. Therefore, PC manufacturers can freely add value-add software without compromising the boot time. The system is integrated into the computer's power-off path, thus delivering a true power-off state and the lowest power consumption level.03-11-2010
20100058043ENHANCED CAPABILITIES IN PROVISIONING - Some embodiments of enhanced capabilities in provisioning on computing machines in a networked system have been presented. In one embodiment, a software vendor deploys a centralized server to an internal network of a customer. The provisioning capabilities of a centralized server are extended to support an additional type of platform by downloading a set of kickstart files associated with the additional type of platform from a software vendor. The centralized server may provision on a computing machine coupled to the centralized server within the internal network based on a type of a platform of the computing machine using one or more of the plurality of kickstart files.03-04-2010
20120137117SYSTEM AND METHOD FOR PROVIDING SECURE VIRTUAL MACHINES - The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the equipment and other users executing on the processor, which is an advantageous feature for rentable, secure computers. In addition to the hardware extensions required to secure a virtualizable computer, an infrastructure for the deployment of such processors is also provided. Furthermore, a signaling flow to establish the various relationships between the owner, user and manufacturer of the equipment is disclosed.05-31-2012
20120137115METHOD AND DEVICE FOR SIMULATING A RESET SIGNAL IN A SIMULATED SYSTEM ON CHIP - A method and system for simulating a reset signal in a modeled system comprises a reset control module and a module to be reset. Operations of the system include emitting by a control thread of the control module a reset signal, receiving by the module to be reset the reset signal, waking up a thread of the module to be reset, and waiting for a reset signal. If the thread is woken up by the reset signal further operations include activating a reset exception by the thread, and if a reset exception is raised, making the thread wait for a reboot signal, transmitting the reboot signal by the control thread to the module to be reset, and after receiving the reboot signal, activating the thread which executes and waits for a reset signal.05-31-2012
20120137114METHOD AND CIRCUIT FOR RESETTING REGISTER - A method for reset a register includes the following step: a computer starts to be booted and perform a booting procedure. Wherein, the computer includes at least one register. Power is supplied to the at least one register. Determine if the computer is booted successfully. If it is determined that the computer fails to be booted, the at least one register is kept to be grounded for a predetermined period of time to reset the at least one register. After the at least one register is grounded, power is supplied to the at least one register again, and the computer is rebooted.05-31-2012
20100070749Embedded Electronic Device and Booting Method Thereof - An embedded electronic device and a booting method thereof are provided. The embedded electronic device, for downloading an initiation image from one of a plurality of initiation image source devices according to at least one option pin, comprises a boot memory, for storing a boot code and a plurality of initiation image source sequence tables; a microprocessor, for executing the boot code and downloading the initiation image according to one of the initiation image source sequence tables; a register, for storing a status of the at least one option pin; and a bus, coupled to the boot memory, the microprocessor and the register, for transmitting data between the boot memory, the microprocessor and the register; wherein the initiation image source sequence table is selected according to the status stored in the register, and the sequence of the initiation image source devices accessed by the microprocessor is determined according to the initiation image source sequence table.03-18-2010
20100058041Method and Apparatus for Secure Instantly-On Computer System - A method and apparatus for an instantly-on computer system is presented. A computer that incorporates fast non-volatile primary memory for storing the operating system, resulting in an instant-on or instant-booting of the computer. Large parts of the operating system code and application code are stored in non-volatile write-protectable areas that cannot be modified by malicious sources, resulting in a secure computer. It solves the problem from typical computers having to load the operating system and applications from a slow device such as the hard disk to the main memory. This loading is avoided by permanently housing the operating system in a non-volatile main memory. The system also solves the problem of corruption of operating system areas from malicious sources. The memory contains writeable and write-protected areas and a memory controller controls the access to the various regions of the memory.03-04-2010
20100058047ENCRYPTING A UNIQUE CRYPTOGRAPHIC ENTITY - A method of encrypting a unique cryptographic entity (UCE), where a client device receives a global-key (GK-) encrypted UKD comprising a GK-encrypted UCE and a GK-encrypted unit key number (UKN). The client device verifies that the GK-encrypted UKN is the same as a pre-provisioned value and then decrypts the GK-encrypted UKD using a global key (GK). The client device then re-encrypts the decrypted UKD using a device user key (DUK) to determine a DUK-encrypted UCE and a DUK-encrypted UKN. The DUK-encrypted UKN is verified as not equal to the GK-encrypted UKN. The DUK-encrypted UKN is then appended to the DUK-encrypted UCE to form a DUK-encrypted UKD and stored in a memory.03-04-2010
20100058044MULTIPROCESSOR COMMUNICATION DEVICE AND METHODS THEREOF - During a boot process of a data processing device having a master bootstrap processor device and multiple slave processor devices, memory associated with the master bootstrap processor is not accessible. Accordingly, the master bootstrap processor communicates configuration information to a slave processor by writing configuration information to a register associated with the slave processor. The slave processor communicates an acknowledgment to the master bootstrap processor in response to reading the configuration information.03-04-2010
20100058042Techniques for Booting a Stateless Client - A technique for booting a stateless client includes booting a virtual machine (VM) monitor on the client. The VM monitor is stored in a non-volatile memory area of a memory subsystem (of the client) and a first portion of an operating system (which does not include any state information for the operating system) is stored in the non-volatile memory area of the client. Booting of the operating system for the client is initiated and a remote storage (that stores a second portion of the operating system that includes state information for the operating system) is accessed via a communication link. Booting of the operating system for the client is completed using the second portion of the operating system.03-04-2010
20100070748Device and methods for simulating controller area network signals - The invention relates to a device of generating simulation signals for Controller Area Network (CAN). The device in this invention simulates CAN data streams normally generated by electronic control units (ECUs) in automobiles, vehicles, boats, etc. without the presence of these ECUs. The device in this invention has a visual display of simulated signals' values. In addition, this invention reveals a remote terminal method and software. The remote terminal software in this invention can control the simulated signal via graphic user interfaces. The remote terminal software in this invention also displays the precise values of simulated signals via graphic user interfaces. Furthermore, this invention presents an advantageous method using a license identification management technique to change the functionality and features of the simulation device without any hardware modifications and without sending the device back to the device manufacturer.03-18-2010
20130013909METHOD AND APPARATUS FOR ESTABLISHING SAFE PROCESSOR OPERATING POINTS - A system and method is provided for establishing safe processor operating points. Some embodiments may include a tamper resistant storage element that stores information regarding one or more operating points of an adjustable processor operating parameter. Some embodiments may further include an element to determine what the current processor operating point is of the operating parameter, and an element to compare the current operating point of the operating parameter with the stored information.01-10-2013
20110078428PORTABLE DESKTOP DEVICE AND METHOD OF HOST COMPUTER SYSTEM HARDWARE RECOGNITION AND CONFIGURATION - A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop.03-31-2011
20110083007RECORDING DEVICE AND METHOD FOR ACTIVATING THE SAME - A recording device (04-07-2011
20110083005Enabling a heterogeneous blade environment - In one embodiment, the present invention includes a method for receiving a request for power-up of a first blade of a chassis, enabling the first blade to power-up in a reduced boot mode and receiving a communication including characteristic information and policy information associated with the first blade, and analyzing the characteristic information and the policy information to determine a policy and a boot configuration for the first blade. Other embodiments are described and claimed.04-07-2011
20110083004PERFORMING RECOVERY OF A HEADLESS COMPUTER - To perform recovery of a headless computer, a direct connection is established by the headless computer with a recovery computer over a network link. After establishing the direct connection, the headless computer is initiated in recovery mode. The headless computer receives a recovery routine from the recovery computer, and the recovery routine is executed in the headless computer to implement a procedure to receive a recovery image from the recovery computer. The recovery image upon loading in the headless computer causes loading of software for recovery of the headless computer.04-07-2011
20110083003System And Method For Safe Information Handling System Boot - Information handling system security is maintained by locking the information handling system from boot of an operating system with a service processor of the information handling system. The service processor obtains authorization for boot from a third party authentication service by providing authentication information to the authentication service and requiring a successful authentication for boot. For example, the service processor releases a token upon successful authentication to authorize boot. In one embodiment, the authentication service sends a token to the service processor for the service processor to use to authorize boot.04-07-2011
20100241838METHOD AND SYSTEM FOR FIRMWARE UPDATES - A method for updating computing device firmware may comprise: (a) receiving a transmission of firmware update data; (b) writing the firmware update data to a firmware update data partition; and (c) writing the firmware update data to an active firmware partition.09-23-2010
20110072255PROVISIONING OF OPERATING ENVIRONMENTS ON A SERVER IN A NETWORKED ENVIRONMENT - The illustrative embodiments disclose a computer implemented method, apparatus, and computer program product for provisioning a server on a network. In one embodiment, the process sends a server identifier to a management server in response to receiving a boot command. The management server uses the server identifier for identifying a designated operating environment for the server to form a designated operating environment identifier. The process then receives, from the management server, the designated operating environment identifier and a first bootstrap code. The process uses the first bootstrap code to extract information for identifying a local operating environment on the server. Thereafter, the process compares the local operating environment to the designated operating environment and initiates a final boot sequence of the server based on the comparison of the local operating environment and the designated operating environment.03-24-2011
20120303944DATA RECOVERING SYSTEM AND METHOD - A basic input output system (BIOS) chip and method recovers specific data when an update of the BIOS chip begins. The BIOS chip obtains a space from a memory of a motherboard and names the space. The BIOS chip saves specific data from a non-volatile random access memory (NVRAM) of the BIOS chip into the space when an update of the BIOS chip begins. The BIOS chip reads the specific data from the space and saves the specific data into the NVRAM of the BIOS chip when the update of the BIOS chip is completed.11-29-2012
20120303943INFORMATION PROCESSING APPARATUS AND AUTHENTICATION CONTROL METHOD - According to one embodiment, a control module determines whether a second authentication key is present in a authentication key storage device when an information processing apparatus is powered on. The control module displays an identification code input screen for inputting an identification code if the second authentication key is not present, causes a storage device to execute an identification code authentication process of determining whether the identification code which is input to the identification code input screen agrees with the first identification code, and generates a third authentication key and stores the third authentication key in the authentication key storage device if the identification code authentication process is successfully carried out.11-29-2012
20120303942CACHING OF BOOT DATA IN A STORAGE DEVICE - Example embodiments relate to caching data in a storage device. In example embodiments, a storage device is configured to receive a command to access data on the storage device. In response, the storage device may determine whether a computing device to which the storage device is coupled is currently booting. When the computing device is currently booting, the storage device may cache the data in a first portion of a cache used to cache boot data.11-29-2012
20120303941METHOD AND APPARATUS FOR SECURING CPUS BOOTED USING ATTACHED FLASH MEMORY DEVICES - The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time.11-29-2012
20110078429ELECTRONIC DEVICE AND BOOTING METHOD THEREFOR - An electronic device with a plurality of operating systems includes a mode selecting module, a firmware module, an operating system selecting module and a boot loader module. The mode selecting module selects a desired booting mode from a plurality of booting modes. The booting modes includes a manufacture booting mode, a normal booting mode, a rescue booting mode, and a recover booting mode. The firmware module stores the manufacture booting mode, the normal booting mode, the rescue booting mode, and the recover booting mode. The operating system selecting module selects from a plurality of operating systems according to the selected booting mode. The boot loader module loads the selected operating system. A booting method for the electronic device is also disclosed.03-31-2011
20110078432RETRIEVING BOOT INSTRUCTIONS FROM NONVOLATILE MEMORY - Systems and processes for booting a device can be implemented by detecting a reset signal associated with the device and retrieving a predetermined page of data from a nonvolatile memory location into a register associated with the nonvolatile memory. The nonvolatile memory may be designed and implemented such that each page of data is retrieved from the nonvolatile memory as a unit, and the page of data includes instructions for use in booting the device. A command to read data stored in the register is received, and the command can include an address identifying a location of one or more instructions within the register. In response, the one or more instructions are retrieved from the register for execution by a processor.03-31-2011
20110072254METHOD AND SYSTEM FOR SECURED DYNAMIC BIOS UPDATE - In some embodiments, the invention involves providing a secure BIOS update to selective user operating systems in a platform conforming to virtualization technology. In an embodiment, a provision agent in a service operating system identifies requests for BIOS updates received from a management console and forwards authorized update requests to a virtual machine monitor (VMM) for processing the updates according to platform policy. An update may be applied immediately to some user operating systems and be delayed in others. Some updates may require an immediate reboot of the platform. Other embodiments are described and claimed.03-24-2011
20110060898COMPUTER MOTHERBOARD WITH BASIC INPUT OUTPUT SYSTEM CAPABLE OF BUILT-IN BIOS FRESH - A computer motherboard with a Basic Input Output System (BIOS) is characterized by built-in BIOS fresh. The BIOS includes a first means and a second means. The first and second means are code internally provided in the BIOS and executable by a CPU of the computer motherboard in an execution environment preset by the BIOS. The first means selects a BIOS update file stored in a storage device. The second means enables the BIOS update file to be refreshed in a BIOS memory. After the computer motherboard enters a BIOS setup utility, a user selects an option of execution of the first or second means to let BIOS fresh takes place without using an operating system.03-10-2011
20110072256EFFICIENT METHOD FOR OPERATING SYSTEM DEPLOYMENT - Method and computer storage media for efficiently deploying an operating system are provided. A virtual hard drive file is communicated by a computing device, such as a server. The virtual hard drive file may be compounded with a boot manager enhancer and/or a translator. Upon receipt of the virtual hard drive file, a computing device is enhanced to expose and mount the virtual hard drive as a drive and boot option for the computing device. Thereafter, an initial boot sequence may be commenced utilizing the virtual hard drive file as the boot source. In some embodiments, a boot manager enhancer and a translator are utilized to do one or more of expose, mount, and translate the virtual hard drive file. In some embodiments, a virtual SCSI miniport driver is utilized to do one or more of expose, mount, and translate the virtual hard drive file.03-24-2011
20110252225COMPUTER SYSTEM AND BOOTUP AND SHUTDOWN METHOD THEREOF - A computer system and a bootup and shutdown method thereof are provided. The computer system includes a memory, a chipset, a basic input/output system (BIOS), and an embedded controller, and an operating system (OS) is executed in the computer system. In the shutdown and bootup method, the embedded controller is notified to prepare to enter into a standby mode when the BIOS intercepts a shutdown instruction issued by the OS. The content of a register of the chipset is set according to the standby mode. A current operation mode data of the computer system is retained, and power is continuously supplied to the memory to make the computer system enter into the standby mode.10-13-2011
20110060897DEVICE BOOTUP FROM A NAND-TYPE NON-VOLATILE MEMORY - Systems and methods are provided for using a NAND-type non-volatile memory (“NVM”), such as NAND flash memory, to store NV pre-boot information for a bootloader (e.g., a second state bootloader) or an operating system. The NV pre-boot information can include, for example, environment variables storing the configuration or state of an electronic device. In some embodiments, an electronic device including the NAND-type NVM may allocate a portion of the super blocks in the NAND-type NVM to storing the NV pre-boot information. The electronic device may store a redundant copy of the NV pre-boot information into the allocated portion of each IC die of the NAND-type NVM.03-10-2011
20100306519SYSTEM AND METHOD FOR MAINTAINING THE SECURITY OF MEMORY CONTENTS AND COMPUTER ARCHITECTURE EMPLOYING THE SAME - A secure memory system and a method of maintaining the security of memory contents. One embodiment of the system includes: (1) a security control module configured to transmit a system memory secure mode signal and processor secure mode signal to place the system in a secure mode, (2) a secure memory bridge coupled to the security control and system memory and configured to encrypt and decrypt data associated with the system memory based on a state of the system memory secure mode signal and (3) a boot processor coupled to the security control module and the secure memory bridge and configured to transmit requests to the secure memory bridge in the secure mode and an unsecure mode.12-02-2010
20110252224NETWORK-BASED OPERATING SYSTEM MOBILITY - For operating system mobility across heterogeneous computing platforms, a method may include periodically identifying whether an operating system is active until a determination that the operating system is inactive. Upon the determination that the operating system is inactive, one of a plurality of boot profiles that are each stored in association with a respective one of a plurality of computing platforms may be selected. The at least one boot profile may be associated with a target computing platform. The selected boot profile may be used in a booting process for booting the operating system on the target computing platform.10-13-2011
20120278598DISABLING COMMUNICATION PORTS - Example embodiments disclosed herein relate to enabling or disabling a port by writing to a reset write-once register. A boot process for a device is initiated. The reset write-once register is set, during the boot process, to disable or enable the port.11-01-2012
20110016300APPARATUS AND METHOD FOR FAST BOOTING COMPUTER SYSTEM - An apparatus and method for fast booting a computer system are provided. When a system power-off is requested in a computer system such as a desktop of notebook computer, a boot code comprising a BIOS code or the BIOS code and an OS kernel code is written to a specific area of a RAM, and then the computer system is turned off while continuously supplying power to the specific area of the RAM. When a system power-on is requested, the boot code written to the specific area of the RAM is executed to fast boot the computer system, thus effectively reducing a user's standby time until the completion of the system boot process.01-20-2011
20110016301SYSTEM AND METHOD FOR INITIATING A MULTI-ENVIRONMENT OPERATING SYSTEM - Various embodiments of the present invention provide a mobile computing device that operates multiple, co-existing and independent operating system environments on a common kernel. A booting process for initiating a multiple operating system environment is also provided. Additionally, various embodiments of the present invention include processes for managing a switch between one operating system environment to a second operating system environment.01-20-2011
20110016302INFORMATION PROCESSING APPARATUS, STORAGE MEDIUM, AND DATA RESCUE METHOD - According to one embodiment of an information processing apparatus includes: a storage medium including, a first partition that stores a first operating system and data, and a second partition that stores a second operating system and a data rescue program; a switch that allows a user to enter a command for booting the second operating system; and a boot control section that boots the second operating system when the command is entered. The data rescue program is executed when the second operating system is booted, and performs at least one of recovering and backing up the data stored in the first partition.01-20-2011
20100262820METHOD OF CONTROLLING A PDA PHONE AND PDA PHONE USING THE SAME - A method for controlling a PDA (personal digital assistant) phone is provided. A first interface configuration file and a second interface configuration file are provided. An interface selection command is received, designating the first or second interface configuration file. A first boot procedure is performed. The first or second interface configuration file is loaded and displayed as an operation interface of the PDA phone.10-14-2010
20100082969EMBEDDED DEVICE FOR IMPLEMENTING A BOOT PROCESS ON A HOST - An embedded device, for implementing a boot process on a host, is provided. This embedded device includes servers supporting various industry-standard Internet protocols and services related to the boot process. This embedded device also includes a storage medium that stores boot options for multiple Operating Systems (OSs).04-01-2010
20100070746METHOD FOR BOOTING SYSTEM UNDER LOW TEMPERATURE STATE AND COMPUTER DEVICE USING THE SAME - A method for booting a computer device under a low temperature state is provided. A trigger signal is detected when a power button is pressed. A hard disk temperature of a hard disk is obtained via a temperature sensor to determine whether the hard disk temperature is less than a first predetermined temperature. If so, a heater is activated to heat the hard disk until the hard disk temperature is greater than the first predetermined temperature. If the hard disk temperature is greater than the first predetermined temperature, the heater is turned off and afterwards a voltage of a battery cell is checked if the voltage has reached a predetermined voltage. If the voltage of the battery cell has reached the predetermined voltage, a system component of a computer device is activated.03-18-2010
20100070744BOOT DRIVE SELECTION - A boot drive of a computing system is identified during at least two runtime environment of the computer system. The computer system includes at least two storage devices. An indicia is created on a selected storage device. The at least two storage devices are scanned for the indicia during a subsequent runtime environment of the computer system after the first runtime environment.03-18-2010
20100064127METHOD FOR UPDATING BASIC INPUT/OUTPUT SYSTEM AND METHOD FOR REPAIRING THEREOF - The invention relates to a method for updating a basic input/output system (BIOS) and method for repairing the BIOS. A part of a program code of the BIOS is stored in a backup memory block in advance. If the BIOS fails to update, the backup program code can be adopted to start up a computer system and then the BIOS will be repaired.03-11-2010
20110258428DATA PROCESSOR AND DATA PROCESSING SYSTEM - A reset controller is adopted which performs control for causing an external reset terminal to be shared for external output of a reset signal and input of a reset signal from outside, allowing a reset input from the external reset terminal in a state in which a power supply voltage is stable, and causing, when a reset factor due to turn-on of a power supply voltage or a reduction in the level of the power supply voltage is detected by a detection circuit, an input/output buffer to output a reset signal to the external reset terminal and masking the inflow of the reset signal from the input/output buffer to its input path, using a signal detected by the detection circuit. A mask period is assumed to be a period longer than a period from reset instructions to a reset release.10-20-2011
20110258425BOOT PARTITIONS IN MEMORY DEVICES AND SYSTEMS - The present disclosure includes boot partitions in memory devices and systems, and methods associated therewith. One or more embodiments include an array of memory cells, wherein the array includes a boot partition and a number of additional partitions. Sequential logical unit identifiers are associated with the additional partitions, and a logical unit identifier that is not in sequence with the sequential logical unit identifiers is associated with the boot partition.10-20-2011
20110258424Distributive Cache Accessing Device and Method for Accelerating to Boot Remote Diskless Computers - A distributive cache accessing device for accelerating to boot remote diskless computers mounted in a diskless computer equipped with WAN-bootable hardware, such as an iSCSI host bus adapter (HBA), allows to access data required to boot the diskless computers or run application programs thereon from an iSCSI target or other diskless computers having the distributive cache accessing device via a network. The retrieved iSCSI data blocks are temporarily stored in the local distributive cache accessing device. If any other diskless computer requests for the iSCSI data blocks, the temporarily stored iSCSI data blocks can be accessible to the diskless computer. Given installation of large number of diskless computers, the network traffic of the iSCSI target is alleviated and booting remote diskless computer is accelerated.10-20-2011
20120204020SELF REGULATION OF THE SUBJECT OF ATTESTATION - Attestation by a self-regulating attestation client. The attestation client requests a credential of health from an attestation service, which includes an ordered attestation log and proof of integrity and freshness of the log. The attestation client receives the requested credential of health, which certifies the attestation client was healthy when it requested the credential of health and that the attestation service trusts the attestation client to be healthy each time the attestation client authenticates using the credential of health. The attestation client receives a request to authenticate that it is healthy using the credential of health, verifies that it is currently healthy, and performs the requested authentication.08-09-2012
20110154009REMOTE MANAGEMENT OF UEFI BIOS SETTINGS AND CONFIGURATION - In an information handling system (IHS), remote management of basic input/output system (BIOS) settings and configuration includes maintaining a BIOS setting/configuration database, providing an application to communicate a BIOS setting/configuration from the database to a BIOS system, determining whether the BIOS setting/configuration communicated from the database to the BIOS system is a special BIOS configuration capsule packet, and validating BIOS setting/configuration.06-23-2011
20110154005AUTOMATED BATTERY CALIBRATION - A computing device executes a boot process. During boot process execution, the computing device initiates automatic calibration of a battery connected to the computing device.06-23-2011
20110154007Low energy boot options for devices - A method includes determining an amount of energy in a consumable energy source, such as a battery, that forms part of a device. The method further includes facilitating selection of a next software boot mode for the device from a plurality of possible software boot modes based at least on the determined amount of energy in the consumable energy source. The next software boot mode can be, by example, one of booting a reduced energy user interface enabling the composition and storage of at least one message, booting a reduced energy user interface with a communication protocol stack enabling the composition and transmission of at least one message, and booting a communication protocol stack enabling the transmission of at least one stored message.06-23-2011
20110154006MECHANISM FOR DETECTING A NO-PROCESSOR SWAP CONDITION AND MODIFICATION OF HIGH SPEED BUS CALIBRATION DURING BOOT - Memory channel training parameters are function of electrical characteristics of memory devices, processor(s) and memory channel(s). Training steps can be skipped if the BIOS can determine that the memory devices, motherboard and processor have not changed since the last boot. Memory devices contain a serial number for tracking purposes and most motherboards contain a serial number. Many processors do not provide a mechanism by which the BIOS can track the processor. Described herein are techniques that allow the BIOS to track a processor and detect a swap without violating privacy/security requirements.06-23-2011
20090144538Patch installation at boot time for dynamically installable, piecemeal revertible patches - A method for booting a computer operating system is provided. A boot loader is loaded from a first flash memory to a random access memory and executed. In one embodiment, the boot loader loads from a second flash memory to a random access memory an operating system file system image archive, installs the operating system file system image archive as a root file system, loads from the second flash memory multiple operating system patches stored separately from the base operating system file system image archive, and installs the multiple operating system patches over the root file system. In another embodiment, the boot loader loads and executes an initialization script that performs the operations instead of the boot loader.06-04-2009
20080320294USER SELECTABLE CONFIGURATION OPTIONS APPLICATION FOR INACCESSIBLE NONVOLATILE STORAGE AT BOOTSTRAP - Embodiments of the present invention address deficiencies of the art in respect to applying user configurable options during bootstrap and provide a novel and non-obvious method, system and computer program product for user selectable configuration options application for inaccessible nonvolatile storage at bootstrap. In one embodiment of the invention, a method for user selectable configuration options application for inaccessible nonvolatile storage at bootstrap can be provided. The method can include powering up a motherboard for a computer system and reading user selectable configuration options for the computing system from sticky bits prior to bootstrap for the motherboard. The method further can include applying the user selectable configuration options to the computing system. Finally, the method can include performing bootstrap for the motherboard subsequent to applying the user selectable configuration options.12-25-2008
20080320295METHOD AND APPARATUS FOR VIRTUALIZATION OF APPLIANCES - A method and apparatus for the virtualization of appliances provides an embedded operating system (OS) which is included in the system boot ROM of a personal computer. When the system boots, the OS is launched and looks for all available virtual appliances from, for example, the following places: local USB, flash card, e.g. SD, xD, CF, CDROM/DVD, or other storage media; local hard disk storage; and the Internet, e.g. an appliance server. The user selects an appliance to use from the OS, whereupon the appliance is loaded and launched. If the selected appliance is not on a local storage, then it is downloaded, e.g. over the Internet from an appliance server. The downloaded appliance can be cached in local storage media such that, the next time it is needed, it need not be downloaded from the appliance server. The user can also elect to boot an operating system from the hard disk, if an operating system and hard disk are installed, or to power-off the system.12-25-2008
20090138695Method and apparatus for restoring system using virtualization - A display device includes a display panel and a fixing member fixed to the panel, the fixing member being formed of a resin material and being disposed to cover at least a portion of each surface of the display panel and increases durability of the display panel against external impact applied thereto and decreases thickness of the display device.05-28-2009
20090119499METHOD AND MICRO-SYSTEM FOR UPDATING CONFIGURATIONS OF TARGET SYSTEM IN COMPUTER - A technique for updating configurations of a target system in a computer. The method comprises booting, based on Preboot Execution Environment technology, a micro-system for updating configurations of a target system before booting the target system, the micro-system performing the steps of: (a) acquiring target configuration packages via a network from a server; (b) extracting target configuration data from said target configuration packages; and (c) updating the configurations of said target system by using said target configuration data, wherein said micro-system is independent of said target system.05-07-2009
20090113197EXPEDIENT PREPARATION OF MEMORY FOR VIDEO EXECUTION - A computer system that initializes a fraction of the computer system's memory for execution of video during booting of the computer system is provided. The computer system can include a first portion of BIOS code on a ROM device, wherein the first portion includes instructions for initializing the fraction. The computer system further can include a second portion of BIOS code that copies itself to the fraction upon completion of initialization of the fraction, wherein the second portion executes on the fraction and wherein the second portion initializes system memory and initializes a video buffer. The computer system further can include a copy of the second portion located on the ROM device, wherein the copy of the second portion executes until video buffer initialization is completed but before all of the system memory is initialized. Further, the video buffer displays video before all of the computer system's memory is initialized.04-30-2009
20110258426BOOTING AND CONFIGURING A SUBSYSTEM SECURELY FROM NON-LOCAL STORAGE - According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor (e.g., general-purpose processor such as a CPU) share a storage device that is associated with or attached to the application processor. An example of such a multifunctional computing device may be a Smartphone device having a cellular phone and handheld computer functionalities. There is no specific storage device directly associated with or attached to the wireless communications processor (hereinafter simply referred to as a wireless processor). Instead, the wireless processor communicates with the application processor via a high speed communications link, such as a USB link, to access code and data stored in the storage device (e.g., flash memory device) associated with the application processor.10-20-2011
20080229091Remote Activation Device For A Computer - A remote activation device for enabling WOL capability in a target computer that is not connected to a wired network is disclosed. The remote activation device is WOL compatible and simulates a network host computer using WOL technology for “waking-up” the target computer. The remote activation device generally comprises a microcontroller and a communications controller. The device is connected to the target computer via the communications controller of the device and a wired network adapter of the target computer. As such, the remote activation device forms a “mini-network” with the target computer. The remote activation device generates and sends a WOL magic packet to the target computer instructing the computer to power ON. Once the computer is powered ON, the computer is able to wirelessly connect to a WLAN in the target computer's work environment. A computer administrator is then able to manage the target computer via network host computer. Alternatively, a computer user is able to commence work on the target computer.09-18-2008
20080229092Secure Boot Across a Plurality of Processors - Boot code is partitioned into a plurality of boot code partitions. Processors of a multiprocessor system are selected to be boot processors and are each provided with a boot code partition to execute in a predetermined boot code sequence. Each processor executes its boot code partition in accordance with the boot code sequence and signals to a next processor the successful and uncompromised execution of its boot code partition. If any of the processors does not signal successful completion and/or uncompromised execution of its boot code partition, the boot operation fails. The processors may be arranged, with regard to the boot operation, in a daisy chain, ring, or master/slave arrangement, for example.09-18-2008
20080229090Memory Card, Memory System Including the Same, and Operating Method thereof - Provided is a memory card device. The memory card device includes a flash memory and a controller. The flash memory includes a boot area storing boot data, and a user area storing user data. The controller accesses the boot area or the user area according to an external command. Boot data can be stored in a memory card integrated in an electronic device. Also, when a host requests an access to boot data/user data stored in the memory card, the boot data/user data can be accessed under control of the controller.09-18-2008
20080229089Remote network device provisioning - Various embodiments are disclosed relating to remote network device provisioning. A method is disclosed, the method comprising discovering a network address associated with a device on a network based on a discovery response received in response to a discovery request provided to the device. One or more configurable boot options associated with the device may be determined based at least in part on the discovery response. One or more of the configurable boot options may be configured on the device, wherein, upon reboot of the device using the configured boot options, a software image is provided to the device.09-18-2008
20110161650PROCESSOR SYSTEM - An electronic circuit includes a more-secure processor having hardware based security for storing data. A less-secure processor eventually utilizes the data. By a data transfer request-response arrangement between the more-secure processor and the less-secure processor, the more-secure processor confers greater security of the data on the less-secure processor. A manufacturing process makes a handheld device having a storage space, a less-secure processor for executing modem software and a more-secure processor having a protected application and a secure storage. A manufacturing process involves generating a per-device private key and public key pair, storing the private key in a secure storage where it can be accessed by the protected application, combining the public key with the modem software to produce a combined software, signing the combined software; and storing the signed combined software into the storage space. Other processes of manufacture, processes of operation, circuits, devices, wireless and wireline communications products, wireless handsets and systems are disclosed and claimed.06-30-2011
20110161649SYSTEMS AND METHODS FOR BOOTING A BOOTABLE VIRTUAL STORAGE APPLIANCE ON A VIRTUALIZED SERVER PLATFORM - One embodiment is a method for booting a bootable virtual storage appliance on a virtualized server platform. One such method comprises: providing a virtual storage appliance on a server platform, the virtual storage appliance configured to manage a disk array comprising a plurality of disks, and wherein at least one of the disks comprises a hidden boot partition having a boot console; powering up the server platform; loading boot code on the server platform; loading the boot console from the hidden boot partition; and the boot console loading boot components for a virtualization environment.06-30-2011
20110161648SOFTWARE LOADING METHOD AND APPARATUS - A method and an apparatus that enable loading of computer programs to a trusted computing platform. The computer program loading is enabled by executing a first program loader (06-30-2011
20110161646Method for performing quick boot and general boot at bios stage - A method for performing a quick boot and a general boot at a basic input output system (BIOS) stage is described. A computer is powered on. An embedded controller firmware or a BIOS determines whether a quick boot key is pressed. If the quick boot key is not pressed, a boot flag is changed from Quick Boot to General Boot. If the quick boot key is pressed, the BIOS determines whether the boot flag is set to Quick Boot. If it is determined that the boot flag is set to Quick Boot, an initialization of drivers preset by the quick boot is performed, and uninitialized drivers are initialized at a stage when an operating system is started. If it is determined that the boot flag is set to General Boot, an initialization of all drivers is performed.06-30-2011
20110047367Combining Resources of Multiple Bios Roms and Managing Them As A Single Entity - A method and related computer program product for combining resources of multiple RAID controllers and managing them as a single entity, comprising searching the RAID controllers for the most appropriate version of the firmware to be executed, determining whether a more appropriate version of the firmware was previously loaded into system memory, unloading inappropriate versions of the firmware, loading the most appropriate version of the firmware and initializing all RAID controllers as a commonly managed entity having combined resources.02-24-2011
20120204021Updating Programmable Logic Devices - Updating programmable logic devices (‘PLDs’) in a symmetric multiprocessing (‘SMP’) computer, each compute node of the SMP computer including a PLD coupled for data communications through a bus adapter, the bus adapter adapted for data communications through a set of one or more input/output (‘I/O’) memory addresses, including configuring the primary compute node with an update of the configuration instructions for the PLDs; assigning, by the PLDs at boot time in an SMP boot, a unique, separate set of one or more I/O addresses to each bus adapter on each compute node; and providing, by the primary compute node during the SMP boot, the update to all compute nodes, writing the update as a data transfer to each of the PLDs through each bus adapter at the unique, separate set of one or more I/O addresses for each bus adapter.08-09-2012
20100325405METHOD OF RUNNING MULTIPLE OPERATING SYSTEMS ON AN X86-BASED COMPUTER - Two or more distinct operating systems (OSs) are loaded simultaneously and run on an x86 computer system. Each OS is booted serially and in such a way that the OS resides in a separate memory footprint than the other OSs by partitioning the memory map. The partition of the memory map includes a low memory region, dedicated memory partitions for storing each OS, and dedicated regions for storing shadows of the low memory region and the ACPI for each OS. Switching between the two or more resident OSs is performed by sleeping the current OS and then resuming the desired OS using the shadow previously stored for the desired OS. None of the resident OSs require any modification in order to run in this fashion.12-23-2010
20110055543WIMAX TERMINAL AND A STARTING METHOD THEREOF - The present invention discloses a starting method of a WiMAX terminal and a terminal thereof, wherein, the starting method comprises: step S202, calculating a load command and a firmware required to be loaded for starting the terminal in advance to obtain a first firmware Hash and a first load command Hash, and storing the first firmware Hash and the first load command Hash in a predefined memory of the terminal; step S204, in response to a starting operation of the terminal, performing starting process and starting a boot loader; step S206, the boot loader executing the load command transmitted by a driver of the terminal to download the firmware to the terminal; step S208, the boot loader calculating a second firmware Hash of the downloaded firmware and a second load command Hash of the load command transmitted by the driver; step 210, the boot loader judging whether the first firmware Hash matches with the second firmware Hash, and judging whether the first load command Hash matches with the second load command Hash, and permitting to start the terminal under the circumstances that the first firmware Hash matches with the second firmware Hash and the first load command Hash matches with the second load command Hash.03-03-2011
20110055542METHOD FOR ACTIVATING OS, AND PROTOCOL CONVERTER - A protocol converter includes a MBR emulation unit connectable to a connector for an internal hard disk drive and configured to provide MBR in response to a request from a system BIOS, a first interface configured to acquire an OS from a remote hard disk drive through a network in response to an OS acquisition request from a secondary boot loader, a second interface configured to provide the secondary boot loader with the OS acquired by the first interface, and a conversion unit configured to perform conversion between a first protocol to be used by the first interface and a second protocol to be used by the second interface.03-03-2011
20110055541METHOD AND APPARATUS FOR BOOTING HIBERNATION IN A PORTABLE TERMINAL - A method and apparatus for hibernation booting in a mobile terminal supporting two processors are provided. In the hibernation booting method, when power is turned on, a master processor performs hibernation booting. A slave processor performs normal booting under control of the master processor. The master processor and the slave processor determine data needing synchronizing, and perform synchronization depending on whether the data needing synchronizing have been changed.03-03-2011
20110055540Pre-Boot Loader for Reducing System Boot Time - A pre-boot loader reduces the boot time of an operating system (OS). An OS is typically loaded by its own OS loader. A pre-boot loader is typically a software module in the system firmware or the pre-boot environment that loads the OS loader, which in turn loads the OS. In one embodiment, the pre-boot loader bypasses part or all of the steps performed by the OS loader, which shortens the loading time of the OS loader and the OS. In another embodiment, bypassing the steps of the OS loader reduces dependency on the system firmware functions. The system firmware takes advantage of this to further reduce boot time, by executing the pre-boot loader earlier instead of waiting until the full completion of system initialization by the system firmware.03-03-2011
20110055539INFORMATION PROCESSING APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM HAVING STARTUP/SHUTDOWN CONTROL PROGRAM STORED THEREIN - An information processing apparatus includes a nonvolatile memory, a volatile memory, and a process control section. A startup program to be required when starting up the information processing apparatus has previously been stored in the nonvolatile memory. When a command to start up the apparatus is received, it is determined whether or not the startup program is present in the volatile memory. When the startup program is absent, the startup program is loaded from the nonvolatile memory into the volatile memory. Thereafter, when a command to turn off the power of the information processing apparatus is received, supply of power to other components of the information processing apparatus than the volatile memory is stopped while maintaining supply of power to the volatile memory, thereby to shutdown the power of the information processing apparatus.03-03-2011
20110055538METHOD AND APPARATUS FOR CONTROLLING OPERATION OF BOOTING VIDEO IMAGE REPRODUCING APPARATUS - A method of controlling an operation of booting an image reproducing apparatus is provided. The method includes: receiving an input signal for powering off the image reproducing apparatus; receiving from a main processor a memory address where an operation status of the image reproducing apparatus is stored, according to the received input signal; storing the received memory address; and converting a system of the image reproducing apparatus into a sleep by the sub-processor.03-03-2011
20080256352Methods and systems of booting of an intelligent non-volatile memory microcontroller from various sources - Methods and systems of booting an intelligent non-volatile memory (NVM) microcontroller from various sources are described. According to one aspect of the present invention, a NVM microcontroller comprises multiple memory interfaces. Each of the memory interfaces may connect to one of the various sources for booting. The sources may include random access memory (RAM), read-only memory (ROM), Electrically Erasable Programmable ROM (EEPROM) (e.g., NOR flash memory, NAND flash memory). RAM may include static RAM (SRAM), dynamic RAM (DRAM), and synchronous dynamic RAM (SDRAM). Other sources include Secure Digital (SD) card and intelligent non-volatile memory devices. The NAND flash memory may include single-level cell (SLC) flash or multi-level cell (MLC) flash. SLC flash uses a single level per cell or two states per cell, while MLC flash stores four, eight or more states per cell.10-16-2008
20110055537ELECTRONIC DEVICE AND BOOTING METHOD THEREFOR - An electronic device of multiple operating systems includes a mode selecting module, an operating system selecting module, and a boot loader module. The mode selecting module is capable of selecting a desired booting mode. The operating system selecting module is capable of selecting one of the operating systems according to the selected booting mode. The boot loader module is capable of loading the selected operating system. A booting method for the electronic device is also disclosed.03-03-2011
20110055536FILE SYSTEM FOR DUAL OPERATING SYSTEMS - Methods, systems, apparatuses and program products are disclosed for managing, activating and controlling file systems sharing among two or more O/S (Operating Systems) and/or the like within a computing apparatus or within a single computer operational session or context.03-03-2011
20110055535Method of Converting Personal Computers Into Thin Client Computers - A system repurposes a personal computer operating with a conventional personal computer operating system, such as Windows® operating system, into a thin client computer system without requiring that the hard drive of the personal computer be re-formatted to remove the previous operating system. The personal computer has its boot loader configuration file edited to include a call to a thin client boot loader file to execute the thin client operating system stored on the personal computer hard drive instead of the previous operating system of the personal computer. The repurposed personal computer can be returned to the previous operating system by electing to bypass the thin client operating system. As a thin client computer, the repurposed personal computer is managed from a central server and can access applications and data on remote servers instead of using the application programs on the hard drive or the capability of storing data on the personal computer hard drive.03-03-2011
20110055534Management Method for Security of Computer Device - A management method is adapted for a computer device. The management method comprises: firstly turning on a power source of the computer device; then performing a power-on verification procedure by a BIOS of the computer device; determining whether passing through a power-on verification according to a result of performing the power-on verification procedure; starting an OS of the computer device if passing through the power-on verification; and crashing the computer device if not passing through the power-on verification.03-03-2011
20080209196Method to Enable Firmware to Boot a System from an ISCSI Device - A method and system that enable system firmware to efficiently boot an operating system (OS) and/or client program from a network-connected Internet Small Computer Systems Interface (iSCSI) device. The method generally comprises: (1) defining the firmware representation of the iSCSI device within the hierarchical data structure that represents the system hardware; and (2) extending the network support package to accommodate additional boot arguments that allow system firmware to acquire the information required for booting from the network-connected iSCSI device, while utilizing one of the existing discovery protocols.08-28-2008
20120173858METHOD AND APPARATUS TO CREATE SINGLE FIRMWARE IMAGE FOR MULTIPLE SERVER PLATFORMS - According to one aspect, a computer-implemented method for managing a computer system is disclosed. In one embodiment, the computer system includes a processor that is programmed to cause the computer system to perform specific functions. The functions include: initializing a management controller operating on a management platform; detecting preloaded identification data containing a predetermined manufacturer-specific platform identifier; if no preloaded identification data is detected, determining the platform identifier based on GPIO settings, firmware data, EEPROM data, and/or sensor detection; detecting preloaded hardware data containing operating parameters for hardware components operating on the management platform and operatively coupled to the management controller; if no preloaded hardware data is detected, determining the operating parameters according to the platform identifier; causing the management controller to initialize the hardware components according to the platform identifier and operating parameters; and, flashing initialization data containing the platform identifier and operating parameters to a system memory.07-05-2012
20100325410SYSTEM AND METHOD FOR MANAGEMENT AND INSTALLATION OF OPERATING SYSTEM IMAGES FOR COMPUTERS - Shown is a method and system for provisioning a target computer with an operating system, which calls for booting the target computer in a pre-operating system environment, collecting configuration information for the target computer, and transmitting the configuration information to a predetermined server. The approach shown also provides for searching a database in the server for a pre-existing operating system image corresponding to the configuration information from the target computer. If a corresponding operating system image is found, then the present approach involves transferring the pre-existing operating system image to the target computer and installing the pre-existing operating system image on the target computer.12-23-2010
20100325409DISPLAY DEVICE TO PROVIDE INFORMATION TO USERS DURING BOOTING PROCEDURE - A display device is provided that may include a memory to store a boot screen data to be provided when booting the display device, an interface unit to receive the stored boot screen data and another boot screen data, and a processor to change the stored boot screen data into the other boot screen data that is received in the interface unit, and to control to outputting the boot screen data when booting according to a boot code that includes a command for outputting the boot screen data. A display unit may output the boot screen data according to control of the processor.12-23-2010
20080209200Method for protecting data in a hard disk - The present invention discloses a method for protecting data in a hard disk, which is applied to the hard disk, such that if a computer executes boot codes of the hard disk and a hard disk identification code recorded by the hard disk is determined to be identical to a computer identification code stored in a computer, the hard disk can be read, which subsequently allows an operating system to be initialized, or else the content in a partition table area will be cleared and the hard disk cannot be read, thus the initialization of the operating system cannot be completed.08-28-2008
20110258427NAVIGATION DEVICE FOR VEHICLE - A navigation device for a vehicle includes: a memory device including a NAND type flash memory for storing a predetermined program and a boot program and a controller for searching a failure block in the flash memory and managing a corresponding relation between a logic block and a physical block with eliminating failure blocks; a back-up power source; a power source switch for coupling the memory device with the back-up power source; a power source for generating a predetermined voltage with using the back-up power source; a control device energized from the power source with the predetermined voltage so as to be activated; and a power source control device. The control device determines whether activation is performed for the first time. The control device executes a stand-by process, and then, executes a boot process when the activation is performed for the first time. The control device executes the boot process without executing the stand-by process when the activation is after the first time. The power source control device controls the power source to function when the power source control device receives an activation signal from the power source switch. When the power source switch stops the activation signal, the power source control device stops the operation state of the power source.10-20-2011
20080201573OPERATING SYSTEM REBOOTING METHOD AND APPARATUS FOR CONTINUING TO EXECUTE A NON-STOP MODULE EVEN DURING REBOOTING - A method of rebooting an operating system including a plurality of load modules in a single computer. One load module which is to be operated during rebooting of the operating system is held in a memory, while establishing a state capable of accepting interrupt to be processed by the one load module. All the other load modules are loaded in a memory of the computer. Processing of the interrupt can be executed by the one load module even during the rebooting of the operating system.08-21-2008
20080201571SYSTEM AND METHOD FOR MANAGING BOOT IMAGES IN A RETAIL STORE ENVIRONMENT - The present invention is a system for managing boot images in a retail store environment. The system includes a server. The system further includes a plurality of client devices communicatively coupled with the server. A first client device included in the plurality of client devices is configured for downloading a first portion of a boot image from the server via a first connection. The first client device is further configured for downloading a second portion of the boot image from a second client device included in the plurality of client devices via a second connection.08-21-2008
20110022832MULTI-OPERATING SYSTEM (OS) BOOTING APPARATUS, MULTI-OS BOOTING PROGRAM, RECORDING MEDIUM, AND MULTI-OS BOOTING METHOD - In a multi-OS booting apparatus, when loading the second OS, contents of the second OS is prevented from being referred to by other programs. The first OS 01-27-2011
20110167251INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An information processing apparatus including an apparatus body and a system control apparatus. The apparatus body includes a first processing unit that executes an arithmetic operation; a first storage unit that stores configuration information of the first processing unit; and a first control unit that controls a readout of the configuration information. The system control apparatus includes a second storage unit that stores a program for controlling the system control apparatus and diagnosis procedures of the information processing apparatus; a second processing unit that reads the program and executes the program; and a second control unit that detects the first processing unit by reading the configuration information via the first control unit on the basis of the diagnosis procedures stored in the second storage unit simultaneously with the execution of the program by the second processing unit.07-07-2011
20110179264Clearing Secure System Resources In A Computing Device - Systems and methods of clearing system resources are disclosed. One example method includes the step of detecting a failure to clear a secure portion of a system resource in a device. The method also includes the step of powering off the system resource for a period of power-off time that is sufficient to clear data from the system resource, where the power off is responsive to the failure detection. The method also includes the step of unlocking the secure portion of the system resource, where the unlock is responsive to the period of power-off time having elapsed.07-21-2011
20110179262APPARATUS AND METHOD FOR BOOTING IN COMPUTER DEVICE WITH BUILT-IN COMMUNICATION MODULE - An apparatus and method control booting in a mobile device with a built-in communication module to prevent a service user from using the mobile device for other purposes and to prevent the service user from subscribing to another service provider. A method includes determining, during a booting operation, whether the communication module is mounted with a USIM. A forced booting termination message is displayed if the communication module is not mounted with the USIM. And power supply is interrupted after a predetermined time from displaying the forced booting termination message.07-21-2011
20110179263STORAGE SYSTEM FOR A STORAGE POOL AND VIRTUAL VOLUMES - This invention provides a storage system to store data used by computers. A storage system coupled to a computer and a management apparatus, includes storage devices accessed by the computer and a control unit that controls the storage devices, in which the control unit performs the following operations: setting, in the storage devices, a first virtual device including a first logical device; setting a second virtual device which including a second logical device, which is a virtual volume accessed by the computer; allocating an address of the first logical device to the second logical device; and changing the allocation to change storage areas of the virtual volume.07-21-2011
20110179260METHOD FOR INTEGRATING OPERATING SYSTEM INTO BIOS CHIP AND METHOD FOR BOOTING OPERATING SYSTEM FROM SERVER - A method for integrating an operating system (OS) into a basic input output system (BIOS) chip and to boot a computer system using an image file stored in a server. A bootable image file of the OS is integrated with a virtual disk program and other BIOS instructions and stored into the BIOS chip. When the computer system is powered up, the OS stored in the BIOS can be booted to allow the another OS stored in the server to be downloaded into the harddisk and executed. The BIOS OS can also allow an OS stored on the local drive to be executed.07-21-2011
20110264903ELECTRONIC DEVICE AND METHOD FOR LOADING CONFIGURATION FILES USING THE SAME - A method for loading a configuration file from a remote server to an electronic device includes obtaining a default configuration file from the remote server, and executing the default configuration file to boot the electronic device, identifying a corresponding MAC list in the remote server according to hardware configurations of the electronic device, and obtaining a specific MAC value corresponding to an unused status flag from the MAC list. The method further includes obtaining a default MAC value of a network card of the electronic device, replacing the default MAC value of the network card with the specific MAC value, obtaining a specific configuration file from the remote server according to the specific MAC value, and rebooting the electronic device according to the specific configuration file.10-27-2011
20110264901MODULAR INTEGRATED CIRCUIT WITH COMMON SOFTWARE - A modular integrated circuit includes a hub module that is coupled to a plurality of spoke modules via a plurality of hub interfaces. The spoke modules include a plurality of interface circuits each having a hardware address. A memory module stores the hub software and hub data and configuration data. The hub software includes a plurality of driver modules corresponding to the plurality of interface circuits. The processing module executes boot firmware to configure the plurality of driver modules based on the hardware address of each of the plurality of interface circuits.10-27-2011
20110060899POWER ON CERTIFICATION METHOD FOR PERSONAL COMPUTER AND POWER ON CERTIFICATION SYSTEM THEREOF - A power on certification method for a personal computer (PC) and a power on certification system thereof are described. The power on method includes the following steps. At least one booting certification device is connected to a PC. The PC is booted, and a basic input output system (BIOS) is run. The BIOS is made to retrieve recognition information of the booting certification device through a verification procedure, so as to judge whether the recognition information is consistent with verification information stored in the PC. After the booting certification device passes through the verification procedure, the PC completes other procedures in the BIOS, and enters an operating system.03-10-2011
20110078431Information processing apparatus, method of controlling information processing apparatus, and semiconductor device - In an information processing apparatus that includes a first and second semiconductor devices that are connected to each other and also includes a system control device that is connected to the first and second semiconductor devices, the timers that are mounted on the semiconductor devices are all synchronized by successively performing a timer correction process between a semiconductor device in which the timer is synchronized and a semiconductor device, adjacent to the semiconductor device, in which the timer is not synchronized, and, when an error occurs in the information processing device, the value in the synchronized timer and the error information are stored in a predetermined register.03-31-2011
20100293365METHOD AND APPARATUS FOR SYSTEM AND SOFTWARE QUICK LAUNCH - A method includes launching a software application having a standard start-up mode, determining whether or not a set of application launch settings have been saved for the software application, running the software application in an alternative start-up mode if the set of application launch settings have been saved, and displaying images that are generated by a main portion of the software application. Another method includes begin performing a booting-up of a processor based system, determining whether or not a set of system launch settings have been saved, reading the set of system launch settings to determine an identity of a software application that should be automatically launched if the set of system launch settings have been saved, and automatically initiating a launching of the software application. A system and one or more computer programs are adapted to cause a processor based system to execute the above steps.11-18-2010
20110119477MEMORY SYSTEM AND MEMORY MANAGEMENT METHOD INCLUDING THE SAME - A multi-processor system includes a first processor, a second processor communicable with the first processor, a first non-volatile memory for storing first codes and second codes to respectively boot the first and second processors, the first memory communicable with the first processor, a second volatile memory designated for the first processor, a third volatile memory designated for the second processor, and a fourth volatile memory shared by the first and second processors.05-19-2011
20120278601POWER-ON/OFF MANAGEMENT SYSTEM AND METHOD OF COMMUNICATION DEVICE - In a power-on/off management method of a communication device, a display screen of the communication device is powered off, and a signal transmitting function of the communication device is suspended, when a power key of the communication device is pressed upon the condition that the communication device is in a power-on state. A duration time of how long the display screen is powered off is determined, and the communication device is activated according to the duration time when the power key is pressed upon the condition that the display screen is powered off.11-01-2012
20120151202MANAGEMENT OF MULTIPLE SOFTWARE IMAGES WITH SHARED MEMORY BLOCKS - A data processing entity that includes a mass memory with a plurality of memory locations for storing memory blocks. Each of a plurality of software images includes a plurality of memory blocks with corresponding image addresses within the software image. The memory blocks of software images stored in boot locations of a current software image are relocated. The boot blocks of the current software image are stored into the corresponding boot locations. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations, thereby loading the access function. Each request to access a selected memory block of the current software image is served by the access function, with the access function accessing the selected memory block in the associated memory location provided by the control structure.06-14-2012
20120151199Secure Encrypted Boot With Simplified Firmware Update - An approach is provided in which a security module, such as a TPM, identifies a change to a boot configuration used in a secure boot operation. This identification results in a non-release of a secret value that is stored in a memory controlled by the security module. The non-release of the secret value is detected by a boot process when the boot process is initiating a session of the information handling system. In response to the detection by the boot process, the boot process retrieves an update encryption key and then decrypts an update copy of a disk encryption key stored on a nonvolatile storage area of the information handling system using the retrieved update encryption key. The nonvolatile storage area also includes a primary copy of the disk encryption key that has been encrypted with the secret value.06-14-2012
20110138160STORAGE APPARATUS AND ITS PROGRAM PROCESSING METHOD AND STORAGE CONTROLLER - Even if each processor core uses the same logical address, a processing-target program corresponding to each processor core can be selected. A logical address of multiple address mapping tables is set to a same logical address in correspondence with an embedded OS program or a RAID management program, and a physical address is set to a different physical address in correspondence with the actual storage destination of an embedded OS program or a RAID management program. Each processor core, on start-up, uses a self address mapping table to execute address mapping processing with each processor core based on the same logical address, selects an embedded OS program or a RAID management program according to the physical address obtained in the address mapping processing, and executes processing according to the selected program.06-09-2011
20110125991FAST RESTART ON A VIRTUAL MACHINE - Media, methods, and computer systems are provided for performing a quick restart of applications in a virtual machine of the computer system. The virtual machine is configured with a critical object array that identifies the critical applications. In response to a quick restart request, the garbage collector operates in a quick restart mode to remove all objects for each application that is not in critical object array.05-26-2011
20120311315Method and Apparatus to Reset Platform Configuration Register in Mobile Trusted Module - In accordance with the exemplary embodiments of the invention there is at least a method, apparatus, and executable program of computer instructions to perform the operations of establishing and initializing a set of platform configuration registers, where a first subset of platform configuration registers is defined as being non-resettable, and a second subset of platform configuration registers is defined as being resettable, storing initial boot-up system state information in one or more non-resettable platform configuration registers, dynamically resetting (12-06-2012
20120311314PROCESSOR SECURITY - A device comprises a processor arranged to automatically execute boot code upon start-up or reset. The boot code comprises a code authentication procedure to verify whether additional code is authenticated for execution on the processor. A separate security unit comprises a private unlock key and cryptography logic configured to use the private unlock key to sign a portion of data, thereby generating a signed unlock file for supply to a storage location. The processor is arranged to access the unlock file from the storage location, making it available without requiring connection to the security unit. The boot code further comprises an unlocking authentication procedure configured to check for the unlock file in the storage location, and if available to verify whether the unlock file is authenticated for use on the processor based on its signature, so as to de-restrict the boot authentication procedure on condition of verifying the unlock file.12-06-2012
20120311313TICKET-BASED PERSONALIZATION - Securely installing and booting software of a device to run OS authorized according to a ticket that is validated by a nonce generated by application processor (AP) in booted OS stage prior to entering a restore mode is described. AP in booted OS stage generates a pre-flight nonce that is stored in a trusted location (effaceable storage). AP in booted OS stage performs one-way hash of pre-flight nonce and sends the hashed pre-flight nonce to ticket authorization server. AP enters restore mode. AP in first stage bootloader receives a ticket from the ticket authorization server including a signed copy of the hashed pre-flight nonce. AP in first stage bootloader validates the signed ticket by comparing one-way hash of the pre-flight nonce stored in the trusted location and the hashed nonce in the signed ticket. Pre-flight nonce expires after timeout period and upon reboot of AP. Other embodiments are also described.12-06-2012
20120311312Fast Boot Via State Recreation - Methods, systems, and computer program products are provided to improve performance in power-saving modes. In particular, improvements are detailed to initialization times after chip restart from a power down mode. These improved initialization times benefit many consumer electronics that rely on batteries and other onboard power supplies, while at the same time having to meet strict usability demands for system response times.12-06-2012
20100185841DETERMINING ADDRESSES OF ELECTRICAL COMPONENTS ARRANGED IN A DAISY CHAIN - In one aspect, a system includes electrical components arranged in a daisy chain that include a first electrical component disposed at a first end of the daisy chain and a second electrical component disposed at an opposite end of the daisy chain than the first end. Each of the first and second electrical components includes an input port, an output port and a common port. The input port of the first electrical component is coupled to one of a supply voltage port or ground and the common ports of the first and second electrical components are coupled to the other one of the supply voltage or the ground. An address of the second electrical component is determined before addresses of the other of the electrical components are determined, and the addresses of the electrical components determine a position of an electrical component with respect to the other of the electrical components in the daisy chain.07-22-2010
20100153699SUPPRESSING POWER SUPPLY NOISE USING DATA SCRAMBLING IN DOUBLE DATA RATE MEMORY SYSTEMS - Embodiments are generally directed to systems, methods, and apparatuses for suppressing power supply noise using data scrambling in double data rate memory systems. In some embodiments, an integrated circuit includes a transmit data path to transmit data to one or more memory devices. The transmit data path may include scrambling logic to generate, in parallel, N pseudo random outputs that are uncorrelated with each other. The output data and the pseudo random outputs are input to XOR logic. The transmit data path transmits the output the of XOR logic which has a substantially white frequency spectrum. Other embodiments are described and claimed.06-17-2010
20110138163DUAL-BOOT CONTROL METHOD AND DUAL-BOOT COMPUTER - There is provided a dual-boot control method for a personal computer capable of being connected with the Internet by way of a router in an information processor connected with a dedicated network. In this method, when the personal computer is booted, an MBR program and an OS program are read, prior to a HDD, from an attachable and detachable storage medium mounted in a storage medium mounting unit, and when the HDD is utilized, route setting is applied to the information processor, as part of an information transmission line; when the storage medium is utilized, route setting is implemented in such a way that the connection with the Internet is broken. Accordingly, there can be maintained the high security in which virus infection and hacking are eliminated.06-09-2011
20100122075METHOD FOR CONTROLLING BOOT SEQUENCE OF SERVER - A method for controlling a boot sequence of a server includes the following steps. A boot image is created, and a first proxy server program is placed into the boot image. The first proxy server program communicates with a management server. The boot image is restored on a rewritable removable storage device, so as to enable the rewritable removable storage device to boot a managed target server. A second proxy server program is installed and executed in the management server. A basic input/output system (BIOS) of the target server is set to enable the rewritable removable storage device to act as a first boot device. Boot files in the rewritable removable storage device are modified through the first proxy server program or the second proxy server program according to a boot instruction received from the management server, thereby controlling a boot sequence of the target server.05-13-2010
20110060900METHOD, SYSTEM, CORRESPONDING DEVICE, AND COMMUNICATION TERMINAL FOR PROVIDING MBMS SERVICE - A method, a system, a security device, a service control device, and a communication terminal for providing a Multimedia Broadcast/Multicast Service (MBMS) service are provided. The method includes the following steps: A service control module in an IP Multimedia Subsystem (IMS) system carries out service authorization according to a service authorization request, and obtains an authorization-passed result. The service control module sends the authorization-passed result to a security module. The security module obtains the authorization-passed result and then sends a service decryption code of the MBMS service to UEs. In the present invention, a controlling capacity of an IMS and a bearer capacity of an MBMS are multiplexed based on an IMS system and an MBMS system to achieve IPTV services, so as to achieve the uniform authorization and uniform network management. The binding of the IPTV service with other services based on the IMS can be achieved by using the IMS, and personalized services can be provided to UEs.03-10-2011
20110083006Network Boot System - In a network boot system, a client terminal is caused to detect a revision of a virtual disk so as to decide operations of a read cache driver. The client terminal has a physical storage device. An operating system operating on the client terminal has a read cache mechanism that read-caches data that has been read out from a boot server. The read cache mechanism includes a filter driver for converting an access to a local bus of the client terminal into an access to the network, and a read cache driver for driving a storage device. The data in the virtual disk is compared with the revision of the read cache data. The operations of the read cache driver are decided based on the comparison result.04-07-2011
20110093692METHOD OF UPDATING IDENTIFICATION DATA OF A COMPUTER SYSTEM AND RELATED COMPUTER SYSTEM - A method of updating an identification datum of a computer system includes starting BIOS when the computer system is powered on, starting a power on self test (POST) program in BIOS, the POST program detecting whether a memory unit stores an identification datum not being input yet, determining whether to input the identification datum into the computer system according to a result of detecting whether the memory unit stores the identification datum by the POST program.04-21-2011
20110093689System and Method for Bios and Controller Communication - A system and method for BIOS and controller communication. An information handling system comprises a central processing unit coupled to a memory. The memory further comprises a BIOS. The information handling system further comprises a controller coupled to a nonvolatile memory, and a register coupled to the central processing unit and the controller. The controller is operable to initialize communication with the BIOS, and service commands from the BIOS. The central processing unit is operable to initialize communication with the controller, and send commands to the controller.04-21-2011
20110093691MULTI-ENVIRONMENT OPERATING SYSTEM - A device with multiple, co-existing, and independent environments interacting with a common kernel, and related methods of operation, are disclosed herein. Operation is altered or dependent on the device being or entering a docked mode.04-21-2011
20110093690System and Method for a Managed Bios - In accordance with the present disclosure, a system and method for a managed BIOS is disclosed. A software for a BIOS in an information handling system is provided on a computer readable medium. A first code, for execution on a central processing unit (CPU), is operable to initiate a connection to a management controller through a controller, send a message to the management controller through the controller, and receive a message from the management controller through the controller in response to a system management interrupt. The first code is also operable to stall a power-on procedure if it is able to determine a plurality of bootable devices before the connection to the management controller is ready. The first code is further operable to stall the power-on procedure before releasing control to an operating system if the management controller is active.04-21-2011
20100180108Electronic device and method for secure operating system update in embedded system - An electronic device and method for secure embedded operating system update within embedded system. The embedded system includes a random-access memory, a non-volatile storage unit and a processing unit. The non-volatile storage unit defines a boot sector, a first sector and a second sector and contains a boot loader in the boot sector, an initialization variable in the boot sector and an embedded operating system in the first sector. The second sector is provided for storing another embedded operating system. The processing unit is coupled to the random-access memory and the non-volatile storage unit and is capable of executing the boot loader in order to copy one of the embedded operating systems from either the first sector or the second sector of the non-volatile storage unit into the random-access memory according to the current value of the initialization variable and then executing the loaded embedded operating system.07-15-2010
20100082966METHOD FOR COMPUTER STARTUP PROTECTION AND SYSTEM THEREOF - A method for computer startup protection, wherein the method includes steps that a computer powers up, and loads and executes a dynamic password computer startup protection program; the dynamic password computer startup protection program receives a password entered by a user; the password is obtained by the user via sending a dynamic password generating command to a dynamic password device; then the dynamic password computer startup protection program determines whether the password is valid, if so, the dynamic password computer startup protection program loads a computer startup program of the computer; otherwise the dynamic password computer startup protection program does not load the computer startup program of the computer. A system includes a computer and a dynamic password generating device.04-01-2010
20100082964METHOD OF CONFIGURING COMPUTERS WITH EXPANSION CARDS - A method of configuring a computer with an expansion card to process a basic input output system (BIOS) program thereof, includes performing an expansion card detecting program to detect and identify the expansion card by reading signals from an identifying finger of the expansion card, and loading a configuration program associated with the detected expansion card of the BIOS program.04-01-2010
20100082962Flash memory device for booting a computing device including embedded general purpose operating system - Methods and apparatus involve booting a computing device from a flash device. The flash device has memory partitions, including a read-only and a read/write partition. The read-only includes an operating system for use by the computing device and defines an initial system state. The read/write is configured to store a delta from the initial system state. Upon booting the computing device subsequent to an initial boot, the delta and the initial system state together define the whole system state. In other features, a write engine from the read-only partition tracks changes to the initial system state and writes some, but not all of the changes back to the read/write partition thereby minimizing a number of writes to the flash memory. In this manner, the speed of the flash memory can be used to quickly boot/reboot a computing device, while avoiding the wear limits associated with writing to flash devices.04-01-2010
20120151203INFORMATION PROCESSING APPARATUS AND STORAGE DEVICE CONTROL METHOD - An information processing apparatus includes: a processor configured to run an operating system; a plurality of storage devices connected to the processor; a detection module configured to detect a boot process for installing the operating system; a determination module configured to acquire device information from each of the storage devices and determine priority rank of the storage devices based on the device information when the detection module detects the boot process being originated from a device other than the storage devices; and a control module configured to install the operating system in a target storage device that is selected from among the storage devices, the target storage device having the highest priority rank determined by the determination module.06-14-2012
20120151200REMOTE MANAGEMENT OF ENDPOINT COMPUTING DEVICE WITH FULL DISK ENCRYPTION - Methods and apparatus involve protecting data encrypted by a first key on an endpoint computing asset including a drive with full disk encryption. The endpoint has both a main operating system for applications, and the like, and another operating system during a pre-boot phase of operation. During use, the pre-boot operating system prevents a user of the endpoint from accessing the encrypted data and the key. In one embodiment, an information exchange partition on the endpoint is accessible from a remote location and includes data encrypted using a second key accessible to both the pre-boot operating system and the main operating system. Another embodiment allows for the provision of a network connection to the endpoint during the pre-boot phase of operation in accordance with a security policy.06-14-2012
20120151198System and Method for Instantiation of Distributed Applications from Disk Snapshots - A framework instantiates an application from its disk snapshots taken from a different network environment and migrated to a virtualized environment. Modifications to operating systems and hypervisors are avoided, and no special network isolation support is required. The framework is extensible and plug-in based, allowing product experts to provide knowledge about discovering, updating, starting and stopping of software components. This knowledge base is compiled into a plan that executes various interleaved configuration discovery, updates and start tasks such that a required configuration model can be discovered with minimal start and update task execution. The plan generation automatically stitches together knowledge for the various products, thus significantly simplifying the knowledge specification. Once discovery is complete, the framework utilizes the discovered model to update stale network configurations across software stack and customize configurations beyond network settings.06-14-2012
20110138166Extensible Pre-Boot Authentication - In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a non-volatile storage that is configured with full disk encryption (FDE), and storing the PBA image in a memory. Then a callback protocol can be performed between a loader executing on an engine of a chipset and an integrity checker of a third party that provided the PBA image to confirm integrity of the PBA image, the PBA image is executed if the integrity is confirmed, and otherwise it is deleted. Other embodiments are described and claimed.06-09-2011
20110138165SYSTEM AND METHOD FOR PHYSICAL TO VIRTUAL DISK RE-LAYOUT - A method and device may, in a computing system executing a operating system and having a mass storage device, rewrite the boot sector of the operating system on the storage device to execute a hypervisor operating system in a boot process, copy a file including the hypervisor kernel to a first sub-area on the storage device, copy software components of the hypervisor to a second sub-area on the storage device, boot to execute the hypervisor as an operating system, execute the operating system, retrieve information indicative of absolute mapping of sectors used by the operating system on the storage device, allocate for the sectors on a third sub-area of the mass storage device, perform a second boot to run the hypervisor as a host operating system, and execute the operating system as guest operating system.06-09-2011
20110138162RECONFIGURABLE LOAD-REDUCED MEMORY BUFFER - A memory module can include a data buffer having a data bus interface and a dynamic random access memory (DRAM) coupled to the data buffer. The memory module may also include a switch connected in parallel with the data buffer, wherein the switch can selectively bypass the data buffer. In one example, the memory module also includes a registered buffer having an address bus interface, where the switch may selectively bypass the data buffer based on a program signal obtained from an address bus via the address bus interface.06-09-2011
20110138161INPUT/OUTPUT DEVICE INCLUDING A HOST INTERFACE FOR PROCESSING FUNCTION LEVEL RESET REQUESTS IN A SPECIFIED TIME - An I/O device includes a host interface configured to process function level reset (FLR) requests in a specified amount of time. The host interface includes a control unit and groups of configuration space registers, each group corresponding to a function. The host interface also includes application availability registers, each associated with a respective function, and which may indicate whether application hardware within the respective function is available for access by a corresponding application device driver. The I/O device also includes application hardware resources associated with a respective function. In response to receiving an FLR request of a particular function, the control unit may cause the associated application availability register to indicate that the application hardware within the particular function is not available to the driver. The control unit may reset the corresponding configuration space registers within a predetermined amount of time and reset the associated application hardware resources.06-09-2011
20110138164DIGITAL BROADCAST RECEIVER AND BOOTING METHOD OF DIGITAL BROADCAST RECEIVER - A digital broadcast receiver and a booting method of the digital broadcast receiver are disclosed herein. A method of secure booting of a system in a digital broadcast receiver comprises aligning a plurality of interleaved portions to generate a digital signature, respectively, with an entire firmware image, generating a digital signature of each interleaved portion, selecting a specific interleaved portion, generating a first message digest to read a region of the selected interleaved portion in the entire firmware image and a second message digest from the digital signature of the selected interleaved portion and verifying the firmware image based on the first and second message digest and booting the system in the digital broadcast receiver.06-09-2011
20090300343METHOD AND APPARATUS FOR CHANGING BIOS PARAMETERS VIA A HOT KEY - An apparatus for changing BIOS parameters via a hot key, including a control unit, a microprocessor, a first memory, a second memory, a third memory and a keyboard. The first memory saves BIOS code while the third memory saves N parameter banks of BIOS. When the apparatus performs a keyboard-scanning process during power-on, the apparatus determines whether at least one hot key is triggered. If the hot key is triggered, the apparatus selects one of the N parameter banks. Then the BIOS performs a corresponding operation based on the selected parameter bank. The invention provides a method for changing BIOS parameters via a hot key through the apparatus.12-03-2009
20090292912STORAGE MEDIUM STORING MASTER BOOT RECORD, COMPUTER SYSTEM HAVING THE SAME AND BOOTING METHOD OF THE COMPUTER SYSTEM - A storage medium storing a master boot record, a computer system having the same, and a booting method of the computer system, the storage medium including: a first sector to store a first master boot record including an execution code for grasping command information and implementing a preset control according to the command information; a first data storage region to store a first data file for booting; a second sector to store a second master boot record to implement booting based on the first data file; a second data storage region to store a second data file for booting; and a third sector to store a third master boot record to implement booting based on the second data file.11-26-2009
20090292911Boot test system and method thereof - A boot test system applied to test a cold boot in a target computer is provided. The boot test system includes a host computer and an autorun module. The host computer is used to test the target computer to turn power on/off and output a power-on signal and a power-off signal to the target computer based on a feedback signal. The autorun module installed in the target computer is used to output the feedback signal to the host computer during the boot of the target computer. Whereby, the present invention retains a fail result of the boot of the target computer for debugging by a worker.11-26-2009
20090292910SYSTEM AND METHOD OF ACCESSING BIOS CHANGE SUMMARY INFORMATION WITHIN A BIOS OPERATING ENVIRONMENT - A system and method of accessing basic input output system (BIOS) change summary information within a BIOS operating environment is disclosed. According to an aspect, a basic input output system (BIOS) set-up interface is disclosed. The BIOS set-up interface includes a navigation routine accessible via a BIOS set-up menu and operable to initiate displaying a secondary user display interface. The BIOS set-up interface further includes a BIOS change summary interface accessible using the secondary display user interface and configured to display BIOS set-up changes made using the BIOS set-up menu.11-26-2009
20100031013INJECTION MOLDING SYSTEM AND PARAMETER SETTING METHOD THEREOF - An injection molding machine system for setting system parameters provides an interface unit displaying a boot interface, a common module interface, a new module setting interface, and a main operating interface. If not all the system parameter values need be modified, the system parameters are loaded on the boot interface and the main operating interface are started. If some of the system parameter values need be modified, the system parameter values are loaded, modified, and saved on the common module interface and the main operating interface are started. If all the system parameter values need be set, the system parameter values are saved on the new module setting interface and the main operating interface are started. If the system parameter values modified need be fine-tuned, the system parameter values are fine-tuned on the main operating interface.02-04-2010
20100023740DIAGNOSTIC UTILITY AND METHOD FOR A DATA STORAGE DEVICE - The disclosure is related to systems and methods of a diagnostic utility for a data storage device. Further, the present disclosure is also related to monitoring host activity and storing information related to the host activity in a nonvolatile cache of a data storage device. In a particular embodiment, a method includes monitoring a host computer for an occurrence of data storage device related activity and storing information based on the data storage device related activity in a nonvolatile memory of a removable data storage device.01-28-2010
20100023745MEMORANDUM-PRESENTING METHOD AND COMPUTER SYSTEM USING THE SAME - A memorandum-information presenting method and a computer system using the method are provided. The computer system allows the memorandum-information to be presented and/or edited during a booting procedure, for example, while executing BIOS codes, initializing various components, checking hardware, allocating resources, or assisting to load an operating system. Accordingly, a user may read or edit the information without waiting for the computer system to successfully enter an operating system.01-28-2010
20100023744Interface Monitoring Device, Computer System, and Method for Monitoring a Differential Interface Port - An interface monitoring device can be used with at least one differential interface port with a positive and a negative data line for connecting a peripheral device. The interface monitoring device has a monitoring circuit and a deactivation circuit. The monitoring circuit is designed to monitor at least one signal level dependent on the signal level of the positive and/or the negative data line and the deactivation circuit is designed to stop data traffic via the positive and/or the negative data line of the at least one interface port.01-28-2010
20100023743METHODS AND APPARATUS FOR INTEGRITY MEASUREMENT OF VIRTUAL MACHINE MONITOR AND OPERATING SYSTEM VIA SECURE LAUNCH - Methods and apparatus to measure the integrity of a virtual machine monitor and an operating system via secure launch are disclosed. In one example, a method measures a first characteristic of a virtual machine monitor, stores the first measured characteristic in a first hardware protected location, measures a second characteristic of an operating system with the virtual machine monitor, wherein the measuring of the second characteristic is initiated by the operating system, and stores the second measured characteristic in a second hardware protected location.01-28-2010
20100023742BIOS SHARING SYSTEM IN A HIGH DENSITY SERVER AND METHOD THEREOF - A BIOS sharing system in a high density servers includes a plurality of servers, a BIOS (Basic Input Out System), a switch and a micro controller. Each server has a motherboard hardware and a BMC (Baseboard Management Controller), wherein each BMC is operable to output a status order in response to a control information of each motherboard hardware. The BIOS is operable to initialize each motherboard hardware before the motherboard hardware being operating. The switch is interconnected between the BIOS and each server for selectively switching to one of the servers such that the BIOS is loaded to the one of the servers for initializing. The micro controller is interconnected between the switch and each BMC, wherein the micro controller is operable to order the switch for selectively switching to one of the servers in response to the status order.01-28-2010
20100023741METHOD FOR SETTING BIOS AND RECREATING CHECKSUM VALUE - A method is used for setting a basic input output system (BIOS) and recreating a checksum value in a computer. The BIOS is stored in a complementary metal-oxide semiconductor (CMOS). The method includes modifying an original BIOS value to a new BIOS value, writing a preset value into a setting storage unit of the CMOS, checking a value in the setting storage unit against the preset value, recreating a new checksum value based on the new BIOS value, overwriting an original checksum value with the new checksum value, and clearing the setting storage unit. The checking and the recreating steps are executed before a BIOS checksum validation of the computer during a computer initialization process when the computer is restarted.01-28-2010
20100023739METHOD AND APPARATUS FOR BOOTING A PROCESSING SYSTEM - Machine-readable media, methods, apparatus and system for booting a processing system are described. In an embodiment, whether an encrypted version of a closed operating system is authentic may be determined. The encrypted version of the closed operating system may be decrypted with a key retrieved from a processor register to provide the closed operating system, based at least in part on a determination that the encrypted version of the closed operating system is authentic. Then, whether the closed operating system is authentic may be determined and a virtual machine may be created so that the closed operating system may be launched in the virtual machine, if the closed operating system is authentic.01-28-2010
20100017591METHOD FOR BOOTING AN OPERATING SYSTEM - A method for accelerating an operating system boot process is disclosed. In one exemplary embodiment, during a first operating system boot, information regarding the physical locations of disk access performed by the operating system to complete the boot are recorded and stored in a control data file. The control data file is used during a second operating system boot to predict which data will be required during the second operating system, and to populate a cache with that data. The cache can then be used to improve the second operating system boot to improve the boot tine. In one embodiment, the information is independent of a file system of the operating system. In another embodiment, the cache can be populated by copying data from a mass storage device to a cache, and when the data is used, it can be moved from the cache to another cache.01-21-2010
20100017592Grid processing control apparatus - According to an aspect of the embodiment, a grid processing control apparatus includes a grid OS being an OS dedicated to grid computing, a general-purpose OS being an OS other than the grid OS, and an OS boot up unit selectively allowing the grid OS or the general-purpose OS to operate. The OS boot up unit allows only the grid OS to operate during grid use term when the grid OS is operated, and allows only the general-purpose OS to operate during general-purpose OS use term when the general-purpose OS is operated.01-21-2010
20100017589Provision of Remote System Recovery Services - In an illustrative embodiment, a computer implemented method for providing remote system recovery services is provided. The computer implemented method generates bootable system recovery images to form a set of bootable system recovery images, creates a list of authorized users from a set of subscribers, and receives a request for a bootable system recovery image, including a subscriber identifier, to form a received request. The computer implemented method further authenticates the subscriber identifier in the received request and sends the bootable system recovery image to the subscriber. Responsive to a determination that the user selected additional services, the computer implemented method performs the selected services.01-21-2010
20100017588SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING AN EXTENDED CAPABILITY TO A SYSTEM - A system, method, and computer program product are included for providing an extended capability to a system. In operation, a request to boot a system is identified. Additionally, in response to the request, extended capability code is returned. Furthermore, the extended capability code is capable of being executed to provide an extended capability.01-21-2010
20110219224COMPUTER SYSTEM AND ITS HW ABSTRACTION METHOD - A computer system includes an ACPI (Advanced Configuration and Power Interface) that abstracts HWs (hardwares) as objects arranged on an ACPI tree which is a virtual space, an OS (Operating System) that recognizes a configuration of the HW through the ACPI, a virtual HW provided between the ACPI and HW and includes a memory area in which locations storing information for each HW are arranged in the same arrangement as the objects on the ACPI tree, and a BIOS (Basic Input/Output System) that previously refers to the HW and stores information for each HW in the memory area of the virtual HW at a location corresponding to the HW. The ACPI refers not directly to the HW but to the memory area of the virtual HW to obtain information for each HW, thereby allowing the OS to recognize the HW configuration from the information for each HW.09-08-2011
20110219223Power control system, power control method, and computer system thereof - A power control system, a power control method, and a computer system thereof are disclosed. The power control system comprises a control module for receiving a control signal. A power management module is used for receiving a power signal and outputting an auxiliary power. A first switch module receives the control signal and controls the power management module to output the auxiliary power to the control module by the control signal. A second switch module controls the first switch module. After receiving the control signal, the control module determines whether the control signal is continuously received until a predetermined time. If yes, the control module controls the first switch module to transmit the auxiliary power continuously with the second switch module and receives the power signal to execute a boot procedure.09-08-2011
20120042159APPLICATION METHOD FOR INTEGRATING HETEROGENEOUS OPERATING SYSTEMS BASED ON THE SAME SYSTEM KERNEL - An application method for integrating heterogeneous operating systems based on the same system kernel is disclosed. The application method includes opening a master virtual console corresponding to a master operating system, opening a slave virtual console corresponding to a slave operating system in the master virtual console, and establishing a share information area for the master operating system and the slave operating system and switching to slave virtual console to operate on the slave operating system.02-16-2012
20120042156METHOD OF MULTIPLE BOOT MANAGER - The present invention provides a method of multiple boot manager in a computer equipped with BIOS and a storing medium. The storing medium is defined with a partition for multiple boot manager, a first partition and a second partition, wherein the partition for multiple boot manager contained with a multiple boot manager and address flags. Firstly, starting up a computer is executed for loading a first operating system located on the first partition. Then altering operating system is executed which includes: executing an application program and creating a conversational option interface for choice by the user; altering the address flag to direct the second partition. Finally, rebooting a computer is executed which includes: unloading the first OS; loading the partition for multiple boot manager; directing to the second partition according to the address flag of the partition for multiple boot manager and multiple boot manager loading the second partition; loading the second OS located on the second partition.02-16-2012
20120042158APPARATUS AND METHOD FOR IMPROVING CAPABILITY OF WI-FI IN WIRELESS COMMUNICATION SYSTEM - An apparatus and a method for configuring security for connection between a portable terminal supporting a Wireless-Fidelity (Wi-Fi) function and an Access Point (AP) are provided. More particularly, an apparatus and a method are provided for preventing access failure caused by an access request of a portable terminal while an AP of an un-configured mode, which is completing security setup using a Wi-Fi Protected Setup (WPS) function, is rebooted. The apparatus includes an AP for providing a terminal with a time taken to reboot after configuring security information based on a WPS function in an un-configured mode, wherein the terminal sends a request to access the AP after the rebooting has completed by determining the time taken to reboot received from the AP of the un-configured mode.02-16-2012
20120042157RAM Based Security Element for Embedded Applications - An integrated circuit includes a demodulator for receiving an encrypted message and a hardware unit coupled to the demodulator and configured to enable the demodulator to decrypt the received message. The hardware unit includes a processing unit, a read-only access memory (ROM) having a boot code causing the integrated circuit to fetch data from an external memory, a random access memory (RAM) for storing the fetched data, multiple non-volatile memory registers or fuses, and an interface unit configured to write the data stored in the RAM to an external storage in response to a backup event. The data may be encrypted using an encryption key prior to being written to the external storage. The interface unit may include a direct memory access controller. The external memory and the external storage can be a same non-volatile memory, namely a Flash device.02-16-2012
20080288766INFORMATION PROCESSING APPARATUS AND METHOD FOR ABORTTING LEGACY EMULATION PROCESS - An information processing apparatus includes: a non-volatile memory that stores a BIOS program that performs legacy emulation process for enabling a device not supported by an operating system to be accessed from the operating system; a controller that controls the device; a boot process unit that performs a boot sequence for booting the operating system stored in the device by controlling the controller through the legacy emulation process of the BIOS program; and a legacy emulation process control unit that performs a stop control process including: monitoring write access by software to a predetermined register, in which a value for designating an operation environment for controlling the device to the controller is set; and aborting execution of the legacy emulation process by the BIOS program when the write access is detected.11-20-2008
20090144535Method for automatically restoring system configuration with a single key - A method for automatically restoring a system configuration with a single key in a computer having a power button is provided. The method includes detecting a press mode of the power button; determining a relevant restoring item according to the press mode; performing a process for restoring the system configuration corresponding to the restoring item, which aims at updating/recovering the system configuration, or clearing the system configuration setting stored in a CMOS memory; and performing a normal boot process.06-04-2009
20110307690SYSTEM AND METHOD FOR RAPID BOOT OF SECONDARY OPERATING SYSTEM - The primary operating system of a computer such as a notebook computer is stored on disk in a hard disk drive and a smaller, secondary operating system such as an email operating system, wireless phone operating system, DVD player operating system, etc. is stored on disk and is transferred to flash memory within the HDD upon power-down of the primary operating system. In this way, should the user subsequently elect to power up the computer only for a limited secondary purpose, the user can elect to boot the associated secondary operating system from flash memory of the HDD without having to spin up the disks, saving energy and reducing boot time.12-15-2011
20090089571MOTHERBOARD AND START-UP METHOD THEREOF - A motherboard comprises a first unit which includes most components that are common in a group of motherboards which have a same chip set, a second unit which includes components that are different in the group of motherboards, and a BIOS Bin file which is loaded in the first unit. The BIOS Bin file comprises a share module, a loading module unit which includes a plurality of loading modules each corresponding to one type of motherboard, and a startup module which identifies the type of the motherboard according to a voltage of pre-selected GPIO Pins, and reads one of the loading modules corresponding to that type of motherboard to identify and initiate the second unit, and reads the share module to identify and initiate the first unit.04-02-2009
20120151201MANAGEMENT OF MULTIPLE SOFTWARE IMAGES WITH RELOCATION OF BOOT BLOCKS - A method, system and computer program product for managing multiple software images in a data processing entity. At least part of the memory blocks of each of the software images is stored into a corresponding image portion of a mass memory. A current software image stored in a current image is selected. The memory blocks stored in boot locations of the current software image are relocated to a relocation portion of the mass memory. The boot blocks of the current software image are copied into the corresponding boot location. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations and each request to access a selected memory block of the current software image by the access function is served.06-14-2012
20090172383BOOTING AN INTEGRATED CIRCUIT - An integrated circuit comprising: a processor; a plurality of external pins operatively coupled to the processor; and a permanently written memory operatively coupled to the processor, the memory having a plurality of regions each storing one or more respective boot properties for booting the processor. The processor is programmed to select one of the regions in dependence on an indication received via one or more of the external pins, to retrieve the one or more respective boot properties from the selected region, and to boot using the one or more retrieved boot properties.07-02-2009
20090172380BOOTING AN INTEGRATED CIRCUIT - An integrated circuit comprising: a processor; a plurality of external pins operatively coupled to the processor; and a permanently written memory operatively coupled to the processor, the memory having a plurality of regions each storing one or more respective boot properties for booting the processor. The processor is programmed to select one of the regions in dependence on an indication received via one or more of the external pins, to retrieve the one or more respective boot properties from the selected region, and to boot using the one or more retrieved boot properties.07-02-2009
20090172382Multi-function computer system - A multi-function computer system includes a host apparatus, a display and a boot mode switching unit. The display is electrically connected to the host apparatus. The boot mode switching unit electrically connected to the host apparatus may be switched between a first mode and a second mode. In the first mode, the boot mode switching unit controls the host apparatus to boot into a first operation environment. In the second mode, the boot mode switching unit controls the host apparatus to boot into a second operation environment different from the first operation environment.07-02-2009
20090172381ENHANCED NETWORK AND LOCAL BOOT OF UNIFIED EXTENSIBLE FIRMWARE INTERFACE IMAGES - Techniques and architectures to provide high assurance image invocation in a pre-boot environment. These techniques may augment implementations of the Unified Extensible Firmware Interface (UEFI) to invoke UEFI images using Trusted Execution Technology (TXT). This can operate to combine pre-boot secure flows, such as UEFI image invocation, with the secure launch instruction set extensions of TXT. This may entail combination of the UEFI StartImage instruction with the SMX leaf SENTER instruction. This may operate to allow original equipment manufacturer (OEM) firmware as a guard and that uses UEFI and TXT access control logic at the same instance to pass control to the operating system (OS).07-02-2009
20090172379SYSTEM AND METHOD TO ENABLE PARALLELIZATION OF EARLY PLATFORM INITIALIZATION - In some embodiments, the invention involves reducing the time required for a platform to boot to its target application/operating-system using parallelization of firmware image content decompression and loading. An embodiment dispatches alternate processing agents as a means to intelligently assist in off-loading some of the initialization tasks so that the main processor may share the burden of boot tasks. In at least one embodiment, it is intended to build firmware images that facilitate parallelization, utilizing co-processing agents that can split these transactions across various processing agents. Other embodiments are described and claimed.07-02-2009
20090172376METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A SECURE PREDEFINED BOOT SEQUENCE - An apparatus for providing a secure predefined boot sequence may include a processor. The processor may be configured to verify a predefined boot sequence certificate that defines a boot sequence for a device, verify one or more software elements referenced by the predefined boot sequence certificate, and execute one or more software elements that have been verified in the sequence defined by the predefined boot sequence certificate. Corresponding methods, systems, and computer program products are also provided.07-02-2009
20090172377METHOD AND APPARATUS FOR BOOTING A PROCESSING SYSTEM - Machine-readable media, methods, apparatus and system for booting a processing system are described. In an embodiment, whether to launch an open operating system or a closed operating system to boot a processing system may be determined. A key may be retrieved from a processor register of the processing system and used to decrypt an encrypted version of the closed operating system based at least in part on a determination of booting the processing system with the closed operating system. In another embodiment, the processor register stored with the key may be flushed based at least in part on a determination of booting the processing system with the open operating system.07-02-2009
20090158025DUAL BIOS CIRCUIT - A dual BIOS circuit includes a first BIOS chip, a second BIOS chip, a power supply, and a switch. The first BIOS chip is connected to a Southbridge chip of a motherboard via a bus. The second BIOS chip is connected to the Southbridge chip of a motherboard via another bus. The power supply is connected to signal pin of the Southbridge chip. The switch includes a handle. The first terminal of the switch is connected to the a detecting pin of the Southbridge chip. The second terminal of the switch is connected to the power supply. The third terminal of the switch is grounded. The first or second BIOS chip is selected to operate according to the voltage level at the detecting pin of the Southbridge chip.06-18-2009
20120079259METHOD TO ENSURE PLATFORM SILICON CONFIGURATION INTEGRITY - Some aspects include beginning a power on self test (POST) by a BIOS for a computer system; enumerating the computer system by the BIOS; providing, based on the enumeration of the computer system by the BIOS, at least one configuration setting of the computer system to a management engine (ME) of the computer system; and applying a lock to the at least one configuration setting by the ME to manage a change to the at least one configuration setting, all prior to an ending of the POST.03-29-2012
20120047358METHOD AND SYSTEM FOR ACCELERATING BOOTING PROCESS - A method and a system for accelerating booting process are provided. The method is adapted to an electronic device having a processor, an embedded controller, and a system memory, in which program codes of a basic input/output system (BIOS) and the embedded controller of the electronic apparatus are commonly stored in the system memory. In the method, when receiving a booting triggering signal of the electronic apparatus, the processor controls the embedded controller to cease accessing the system memory, so as to load the BIOS program code from the system memory to a cache memory and execute power-on self test (POST) procedure. After the program code is loaded, the processor controls the embedded controller to return to a normal mode so as to access the system memory and execute monitoring functions.02-23-2012
20120047357METHODS AND SYSTEMS FOR ENABLING CONTROL TO A HYPERVISOR IN A CLOUD COMPUTING ENVIRONMENT - A method for enabling control in a cloud computing environment includes initializing a portion of computing resources identified for enabling service to a user system in a cloud computing environment. The method may also include enabling service to the user system. Further, the method may include initializing another portion of the computing resources. After the service in the cloud computing environment has been enabled, cloud computing services may be provided by the host system to one or more user systems.02-23-2012
20120047356Isolation of Device Namespace to Allow Duplicate/Common Names in Root Volume Group Workload Partitions - A mechanism is provided for isolation of device namespace to allow duplicate or common names in root volume group workload partitions. The mechanism creates a scratch file system that contains enough information to create an execution environment for a workload partition and information about which physical volumes to use for the root volume group file systems. The mechanism then populates the root file systems on a disk in the global space. The mechanism boots the workload partition from the scratch file system and configures the devices to be exported to the workload partition based information in the scratch file system. The mechanism then renames the logical volume names to the traditional names. The mechanism then temporarily mounts the root volume group file system onto the scratch file system.02-23-2012
20120005471BOOTING AN INTEGRATED CIRCUIT - An integrated circuit is disclosed herein. In one embodiment, the integrated circuit includes: a processor; a plurality of external pins operatively coupled to the processor; and a permanently written memory operatively coupled to the processor, the memory having a plurality of regions each storing one or more respective boot properties for booting the processor. The processor is programmed to select one of the regions in dependence on an indication received via one or more of the external pins, to retrieve the one or more respective boot properties from the selected region, and to boot using the one or more retrieved boot properties.01-05-2012
20120005472MANAGEMENT SERVER, BOOT SERVER, NETWORK BOOT SYSTEM, AND NETWORK BOOT METHOD - The management server saves boot images corresponding to boot nodes that are connected to itself through a network. When condition information is received from the boot server provided in each network, the management server transmits a boot image specified by the condition information to the boot server. The boot server provides the boot image received from the management server to the boot node to make the boot node perform a network boot.01-05-2012
20120005467Streaming Virtual Machine Boot Services Over a Network - Embodiments of the invention are directed to streaming virtual machine boot services over a network. An aspect of the invention includes booting a first virtual machine and recording data and metadata from a virtual machine boot image into a virtual machine boot file. The data and metadata are accessed in the process of booting the first virtual machine. The virtual machine boot image has setup information of the virtual machine type of the first virtual machine. The virtual machine boot file is configured for the virtual machine type of the first virtual machine. A descriptor is added to metadata of the virtual machine boot image, which references a location of the virtual machine boot file for the virtual machine type of the first virtual machine. When subsequently booting a second virtual machine of the same type of virtual machine as the first virtual machine, data are streamed from the virtual machine boot file to a virtual machine monitor of a second virtual machine without the need to stream data from the virtual machine boot image.01-05-2012
20120005469ELECTRONIC DEVICE CAPABLE OF STARTING UP IN LOW-TEMPERATURE ENVIRONMENT AND STARTUP METHOD THEREOF - An electronic device capable of starting up in a low-temperature environment and a startup method for starting up the electronic device in the low-temperature environment and provide a stable operation temperature. The electronic device includes a temperature detection unit, a plurality of electronic elements, a storage unit, and a control unit. The electronic elements connects to the temperature detection unit. The storage unit stores a temperature monitoring process and an operating system. The control unit electrically connects to the temperature detection unit, the electronic elements, and the storage unit. The control unit acquires an operation temperature of the electronic elements through the temperature detection unit. The control unit executes the temperature monitoring process for driving the electronic elements, and increases the operation temperature of the electronic elements, so that the operating system is executed when a working temperature of the electronic device is higher than a first rated temperature.01-05-2012
20120005468STORAGE DEVICE WITH MULTIPLE STORAGE UNITS AND CONTROL METHOD THEREOF - A storage device with multiple storage units, which is applicable to a system end. The storage device is a hard disk drive (HDD) or solid state disk (SSD) with a standard size. The storage device includes a first storage unit and at least one memory storage unit. The memory storage unit and the first storage unit serve to back up and update each other. The storage device further includes a multiplex control unit and a power control unit connected to the multiplex control unit. According to the decision of the multiplex control unit, the power control unit controls turning on/off of the first storage unit and the memory storage unit.01-05-2012
20120005466DATA PROCESSING DEVICE AND METHOD FOR OPERATING SUCH DATA PROCESSING DEVICE - In order to provide a data processing device (01-05-2012
20120005470QUICK START-UP IMAGE FORMING APPARATUS, IMAGE FORMING METHOD, AND IMAGE FORMING SYSTEM - An image forming apparatus includes a code storage device and a code execution device to perform booting based on a boot code from the code storage device. The code execution device includes a first communication unit and a first high-speed communication unit each communicable with the code storage device. The code storage device includes: a second communication unit and a second high-speed communication unit each communicable with the code execution device; a code storage unit to store a high-speed communication standby code required of the code execution device to use the first high-speed communication unit and a high-speed code transmitted to the code execution device via the second high-speed communication unit; and a code transmission unit to transmit the high-speed communication standby code to the code execution device via the second communication unit and to transmit the high-speed code to the code execution device via the second high-speed communication unit.01-05-2012
20110167252Separate power island for high performance processor that reboots to second boot sector - Separate power island for high performance processor. A multi-processor design is presented in which each of the processors is implemented in separately powered portions of a circuitry (e.g., an integrated circuit). One of the processors can be a main application processor, and another of the processors can be a baseband processor. In addition, the each of the processors can be implemented using different types of circuitry (e.g., one of the processors [such as the main application processor] is implemented using higher performance/higher leakage circuitry that another of the processors [such as the baseband processor]). One of the processors (e.g., main application processor) can be powered down when not needed thereby providing energy/power conservation which can be vital is handheld communication device applications such as wireless handheld communication devices.07-07-2011
20110167250METHODS FOR REMOTE PROVISIONING OF ELETRONIC DEVICES - There is provided a method and system to automatically provide software and/or firmware updates to the electronic devices, particularly mobile devices used by consumers such as portable health-care data interchange devices. There is also provided a method and system of updating software in electronic devices without requiring a wired data interface to affect changes. There is also provided a method and system for tracking the configuration of electronic devices that are sold to and configured by particular consumers, especially consumers/patients using electronic devices related to health care. Further, there are also provided a methods and systems for integrating the purchase, and ordering, and software configuration of electronic devices.07-07-2011
20110167249COMPUTER SYSTEM AND METHOD CAPABLE OF REMOTELY RESTORING OPERATING SYSTEM - A computer system and a method for remotely restoring, upgrading, or booting an operating system (O.S). A communication unit communicates with an external device in which a restoring image of the operating system is stored. A user's input request for initialization, causes a controller to perform an initialization according to a power-on input, including checking whether or not a request for restoring the O.S. has been received from a user prior to starting a boot of the operating system. If a request for restoring the operating system is received, the restoring image stored in the external device is accessed through the communication unit to restore the operating system installed in the computer system.07-07-2011
20120017072MODIFYING A VIDEO RESOLUTION OF VIDEO DATA IN A PRE-OPERATING SYSTEM ENVIRONMENT01-19-2012
20120017073CONFIGURATION OF A BASIC INPUT/OUTPUT SYSTEM (BIOS) OF A COMPUTING DEVICE - Example embodiments disclosed herein relate to configuring a Basic Input/Output System (BIOS) of a computing device. An embodiment of a method may present, by the computing device, a first request relating to a first functionality of the computing device controlled by one or more settings of the BIOS, and may receive a first user response corresponding to the first request. The method may also present a second request relating to a second functionality of the computing device controlled by one or more settings of the BIOS, with the second request being selected based on the first user response. The method may then receive a second user response corresponding to the second request. In addition, the method may configure at least one setting of the BIOS based on the first and second user responses. Embodiments of a related computing device and computer-readable storage medium are also disclosed.01-19-2012
20120017071Apparatus and Method Thereof for Reliable Booting from NAND Flash Memory - An apparatus for enabling booting from a NAND flash memory comprises a NAND flash controller connected to the NAND flash memory, wherein the NAND flasher memory is configured to include at least a starter section for storing boot code, the starter section includes a predefined number of blocks to store copies of the boot code duplicated in a configurable number of blocks; and a fetch emulator for fetching a valid and complete starter block that includes the boot code.01-19-2012
20120023321COMPUTER SYSTEM - A computer system including a first memory unit, a second memory unit, a switch and a microcontroller is provided. The first memory unit stores a first basic input/output system (BIOS). The microcontroller is coupled to the first memory unit, the second memory unit and the switch. Prior to a starting of the computer system, the microcontroller reads the first BIOS in the first memory unit and stores the first BIOS to the second memory unit when the microcontroller detects that the switch is conducted.01-26-2012
20120023322BIOS IMAGE MANAGER - A machine and method to manage BIOS images.01-26-2012
20120023320BIOS CHIP RECOVERY SYSTEM AND COMPUTER THEREOF - A computer having a BIOS recovery function includes a baseboard management controller (BMC) circuit, a main control circuit, a switching module and a BIOS chip. The switching module is connected to the BMC circuit and the main control circuit. The BIOS chip stores BIOS programs for the computer and is selectively connected to the BMC circuit and main control circuit by the switching module. When the BIOS programs are corrupted, the switching module selects the BMC circuit to communicate with the BIOS chip. New BIOS programs can be sent to the BIOS chip to update the corrupted BIOS programs.01-26-2012
20120023318PROVIDING PLATFORM INDEPENDENT MEMORY LOGIC - In one embodiment, the present invention includes semiconductor integrated code (SIC) corresponding to platform independent code of a processor manufacturer. This code may include embedded memory code (EMC) to initialize a memory via initialization of a memory controller, and a mapping of memory signals using an on-die termination (ODT) data structure accessible via the EMC, where the ODT data structure is provided by an original equipment manufacturer (OEM) and corresponds to a parameterized rule set for a platform dependent memory configuration of the memory. Other embodiments are described and claimed.01-26-2012
20120023319PERSISTING DATA ACROSS WARM BOOTS - Techniques for persisting data stored in volatile memory across a warm boot. One or more portions (referred to as “warm memory”) of volatile memory of the system can be reserved and configured such that the data stored by these portions is not affected by a warm boot thereby resulting in the data stored being persisted across a warm boot.01-26-2012
20120060023METHODS FOR BOOTING AN OPERATING SYSTEM USING NON-VOLATILE MEMORY - A method of booting an operating system can be provided by determining file information that is associated with files accessed during booting of an operating system by a processor. Files associated with the file information can be written into a non-volatile memory. The files can be transferred from the non-volatile memory to a volatile memory during a power on self-test of the processor.03-08-2012
20120060021Method and Device For Modular Configuration Deployment At Run Time - A device includes a data interface and a memory. The memory includes a first memory area and a second memory area. The first memory area stores a base module including an operating system and boot logic operative to load a further module. The second memory area stores a module comprising a software application. The first memory area and the second memory area do not reside within a file system.03-08-2012
20120117365FIRMWARE UPDATE METHOD AND SYSTEM FOR MICRO-CONTROLLER UNIT IN POWER SUPPLY UNIT - Disclosed is a firmware update system for a micro-controller unit in a power supply unit. The micro-controller unit includes a central processing unit and a flash memory connected to the central processing unit. The flash memory includes a boot program sector, a main program sector, and a temporary data sector, where the boot program sector contains a boot program and the main program sector contains a main program to be executed by the central processing unit under a normal operating mode, and the temporary data sector is set to contain a downloaded firmware code to be copied to the main program sector to replace the main program, thereby updating the flash memory. The downloaded firmware code contains a sector checksum value and a firmware signature for allowing the boot program to validate if the downloaded firmware code is valid and authentic, and the boot program sector and the main program sector are accessed by a virtual address.05-10-2012
20080288767Computer system - The invention provides a computer system, which includes a motherboard, a nonvolatile memory and a chipset provided on the motherboard. The nonvolatile memory stores a first BIOS and a second BIOS. The chipset has an external flag having a first state and a second state corresponding to the first BIOS and second BIOS, respectively. When the external flag is in the first state, the motherboard is booted by the first BIOS. When the external flag is in the second state, the motherboard is booted by the second BIOS. When one BIOS is booted according to the state of the external flag, if the BIOS is damaged, the other complete BIOS is booted and is used to update the damaged BIOS program.11-20-2008
20090094449Method and Apparatus to Prevent Vulnerability to Virus and Worm Attacks Through Instruction Remapping - A method, apparatus, and computer instructions for processing instructions by a processing unit. An instruction set is dynamically set for the processing unit using a selected instruction map. The selected instruction map is selected as one being different from a normal instruction map for the processing unit. The instructions are processed at the processor using the instruction set. A set of authorized instructions are encoded using the selected instruction map.04-09-2009
20120159140PROACTIVE TOKEN RENEWAL AND MANAGEMENT IN SECURE CONVERSATIONS - The present invention relates to methods and systems for method of implementing proactive token renewal and management in secure conversations. The method includes transmitting an secure conversation token (SCT) bootstrap request, receiving a first SCT in response to the SCT bootstrap request, and determining a round trip time (RTT) of the SCT bootstrap request. The method further includes determining the expiration time of the first SCT, based on the combination of the RTT and the expiration of the first SCT, scheduling an SCT renew request, and initiating the SCT renew request. Further, the method includes receiving a second SCT in response to the SCT renew request, receiving an indication that the first SCT has expired, and in response to the indicating, utilizing the second SCT.06-21-2012
20120159141INFORMATION PROCESSING APPARATUS AND START-UP CONTROL METHOD - According to one embodiment, if start-up of an application is abnormal after starting up the application, the information processing apparatus reports the fact to the basic input/output system (BIOS), and the BIOS locks a system.06-21-2012
20120159138Mechanism for Virtual Machine Boot Speed-Up by Clock Acceleration - A mechanism for virtual machine (VM) boot speed-up by clock acceleration is disclosed. A method of the invention includes detecting that a VM managed by a hypervisor of a host machine is starting a boot up process, modifying a rate of a clock of the VM to speed up the boot up process, determining that the boot up process of the VM is complete, and returning the rate of the VM clock to a normal operational rate that is slower than the rate of the VM clock during the boot up process.06-21-2012
20120159139MOBILE TERMINAL AND METHOD OF CONTROLLING A MODE SWITCHING THEREIN - A mobile terminal including a communication unit configured to communicate with at least one external terminal; a memory configure to store at least first and second operating systems including at least first and second modes, respectively; and a controller configured to execute the first operating system and to activate the first mode corresponding to the first operating system, to display a first information screen on a display unit corresponding to the activated first mode, to receive a switching signal indicating the first mode is to be switched to the second mode, to activate the second mode and deactivate the first mode, and to display a second information screen on the display unit corresponding to the second mode and that is different than the first information screen.06-21-2012
20120159137SECURE LOCAL BOOT USING THIRD PARTY DATA STORE (3PDS) BASED ISO IMAGE - In some embodiments, the invention involves a method and apparatus for secure/authenticated local boot of a host operating system on a computing platform using active management technology (AMT) with a third party data store (3PDS)-based ISO firmware image. A portion of non-volatile memory is hardware secured against access by the host processor and OS, and accessible only to the AMT. The AMT comprises an AT/ATAPI protocol emulator to access an ISO boot image from secured memory, while appearing to the host processor as a communication with an AT/ATAPI device. Other embodiments are described and claimed.06-21-2012
20120159136COMPUTER SYSTEM BOOT ENHANCEMENTS WITH USER OVERRIDE - Methods, systems and computer program products are disclosed for enhanced system boot processing that is faster to launch the OS because it does not interrogate I/O devices for possible interruption, but that also may be modified to interrogate such devices based on a user selection mechanism. The user selection mechanism may be, for at least one embodiment, a software mechanism such as a control panel module. For other embodiments, the user selection mechanism may be a hardware mechanism, such as a power button or other hardware button or switch. Other embodiments are described and claimed.06-21-2012
20120210116METHOD AND APPARATUS FOR BOOTING FROM A FLASH MEMORY - Techniques for booting a computing device with a flash memory without knowledge of parametric information of the flash memory are described herein. In one embodiment of the invention, the computing device receives input requesting the computing device to begin operation and executes a set of one or more instructions stored in a non-volatile memory. The execution of the set of instructions configures a first read routine for accessing the flash memory based on a common denominator format of candidate flash memories, and the first read routine is not configured based on information located in a flash memory identification table. The computing device reads a bootstrapping code image based on the first read routine into a volatile memory and executes that first bootstrapping code image. Other methods and apparatuses are also described.08-16-2012
20120210115Secure Boot Method and Method for Generating a Secure Boot Image - In a secure boot method, an initial boot loader verifies a first digital signature included in a first boot loader using a public key. The first boot loader is executed if the first digital signature is valid. The first boot loader verifies a first message authentication code included in a second boot loader using a unique key. The second boot loader is executed if the first message authentication code is valid.08-16-2012
20120210113MANAGING BOOTING OF SECURE DEVICES WITH UNTRUSTED SOFTWARE - Normally, at the time of manufacturing, security may be provided to a device being manufactured through the loading of an operating system that has been cryptographically signed. The present application discloses a “factory mode” for the device. The “factory mode” allows the device to execute untrusted operating system code, such as unsigned operating system code and operating system code that has been signed, but the certificate authority is not trusted. To support execution of untrusted operating system code in a secure manner, the device may be adapted to prevent data of predetermined type from being loaded on the device while the device is in the “factory mode”. In contrast to the “factory mode”, the secure mode of the device is referred to herein as a “product mode”. There develops a need to manage, in a secure manner, transitions between the “product mode” and the “factory mode”.08-16-2012
20120210112MAC Filtering on Ethernet PHY for Wake-On-LAN - To improve Wake-on-LAN (WOL) functionality of a device, a Media Access Control (MAC) address filtering function may be implemented in the device's Ethernet physical layer (ePHY) block. When the ePHY detects a WOL frame, the MAC filtering function in the ePHY may perform address comparison between the MAC address associated with the device, and the MAC address contained in the WOL frame. Performing the MAC address comparison within the ePHY allows the main system components, such as the main SOC and other components to remain in standby mode (or sleep mode) until a MAC address match has been determined. Therefore, the main system components do not need to be rebooted every time the device receives a WOL frame, only when there is a match between the MAC address of the system and the MAC address contained in the detected WOL packet.08-16-2012
20080313452One wire boot loader - A power tool system component has a microprocessor, a one wire communication terminal connecting the microprocessor to an external device, and a flash memory storing: (a) an application program governing operation of an application mode during which the power tool system component is operated; and (b) a boot loader program governing operation of a boot loader mode during which at least part of the application program can be updated. The microprocessor accesses the flash memory and implements the boot loader program and the application program by setting up and observing a temporal window during which one or more predetermined conditions must be met for the boot loader mode to be entered. The predetermined conditions include successful completion of a calibration process that includes sending a calibration byte to the external device according to a format predetermined to allow the external device to adjust its baud rate for sending and receiving information. Upon successful completion of the conditions within the temporal window, the microprocessor sends a confirmation to the device that the conditions have been satisfied and enters the boot loader mode.12-18-2008
20120072712SEMICONDUCTOR INTEGRATED CIRCUIT AND TELEVISION - The present invention provides a low-cost semiconductor integrated circuit on which two CPUs are mounted. The semiconductor integrated circuit integrated in a single chip includes a standby microcomputer, a main microcomputer, and a block circuit which blocks a signal between both microcomputers. The standby microcomputer includes a first Read Only Memory (ROM) which stores a first boot program and a first processing unit which executes the first boot program. The main microcomputer includes a second ROM which stores a second boot program and a second processing unit which executes the second boot program. The first processing unit executes the first boot program when the first power source is switched ON, while the second processing unit executes the second boot program when the second power source is switched ON.03-22-2012
20080201572Method and system for uniformizing product data embedded in a computer platform - A method uniformizes product data embedded in a computer platform equipped with a first-type control unit stored with first product data, and a second-type control unit stored with second product data. The method includes recording a first time value when the first product data are modified; recording a second time value when the second product data are modified; reading the first and second time values when either one of a power-on procedure and a resetting procedure is performed on the computer platform; comparing the first time value with the second time value and determining whether the first time value is identical to the second time value; and updating one of the first product data and the second product data having an earlier one of the first and second time values with the other if the first time value is determined to be not equal to the second time value.08-21-2008
20110078433SYSTEMS AND METHODS FOR INSTALLING A BOOTABLE VIRTUAL STORAGE APPLIANCE ON A VIRTUALIZED SERVER PLATFORM - One embodiment is a method for installing a virtual storage appliance on a host server platform. One such method comprises: providing an installation package to a host server platform, the installation package comprising an installation script for installing an I/O virtual machine (IOVM), an IOVM boot console, and an IOVM management module; running the installation script to create a hidden boot partition on a boot disk and copy the IOVM boot console and the IOVM management module to the hidden boot partition; rebooting the host server platform; loading the IOVM boot console and the IOVM management module from the hidden boot partition; configuring a disk array via the IOVM management module; for each disk in the array, creating a hidden boot partition and replicating the IOVM boot console and the IOVM management module; and installing a virtual storage environment using the IOVM boot console as a storage driver.03-31-2011
20110107075NETWORK DEVICE AND NETWORK CONTROL DEVICE IN WIRELESS BODY AREA NETWORK, AND SECURE WAKE-UP METHOD AND WAKE-UP AUTHENTICATION CODE GENERATION METHOD OF NETWORK DEVICE AND NETWORK CONTROL DEVICE - A network device and a network control device in a Wireless Body Area Network (WBAN), and a secure wake-up method and a wake-up authentication code (WAC) generation method of the network device and the network control device are provided. The network device includes a wake-up circuit to receive a wake-up radio signal from a network control device using a Radio-Frequency Identification (RFID) receiver, to compare a WAC contained in the received wake-up radio signal with a WAC stored in advance, and to determine whether to wake up a main circuit unit, the network control device being contained in the WBAN; and the main circuit unit to be woken up in response to an interrupt signal from the wake-up circuit.05-05-2011
20110107073BOOTING A COMPUTER DEVICE - A method of booting a computing device includes, responsive to said computing device powering on, loading a first lightweight operating system on said computing device and executing an instant-on application through said lightweight operating system. The method further includes, during execution of said instant-on application, loading a hypervisor on said computing device and migrating said instant-on application to a first virtual machine executing a second lightweight operating system implemented by said hypervisor. The method further includes loading a full-feature operating system on a second virtual machine implemented by said hypervisor.05-05-2011
20110107076SYSTEM COMPRISING ELECTRONIC DEVICE AND EXTERNAL DEVICE STORING BOOT CODE FOR BOOTING SYSTEM - An electronic information system comprises an external storage device and an application processor. The external storage device stores boot code and the application processor is adapted to receive the boot code from the external storage device and to perform a system booting operation during a power-up operation by executing the boot code.05-05-2011
20100095106BOOT ALGORITHM - A method, chip and computer program product for booting from a secondary boot source. In one embodiment, the method includes: (1) retrieving primary boot code from an on-chip primary boot source on the same chip as a processor, the primary boot code comprising at least a boot discovery algorithm for determining the location of an external secondary boot source external to said chip, (2) executing the primary boot code on the processor, including the boot discovery algorithm, thus operating the processor to check each of a plurality of locations to determine the location of the external secondary boot source, (3) retrieving the secondary boot code from the determined location and (4) continuing the booting of the processor by executing the secondary boot code on the processor.04-15-2010
20100095104Administering Computer Processor Execution Of Basic Input/Output Services Code - Administering computer processor execution of BIOS code that includes a primary BIOS code and a recovery BIOS code stored in ROM, the ROM operatively coupled to a control module and the processor, where administering processor execution of the BIOS code includes determining, by the control module, a size of the ROM; generating, by the control module in dependence upon the size of the ROM, an address for the primary BIOS code and an address for the recovery BIOS code; starting, by the control module, operation of the processor for execution of the primary BIOS code including providing, to the processor, the address for the primary BIOS code; and if executing the primary BIOS code fails, restarting, by the control module, operation of the processor for execution of the recovery BIOS code including providing, to the processor, the address for the recovery BIOS code to the processor.04-15-2010
20110099362INFORMATION PROCESSING DEVICE, ENCRYPTION KEY MANAGEMENT METHOD, COMPUTER PROGRAM AND INTEGRATED CIRCUIT - For the keys in a key tree group composed of root keys for each of multiple stakeholders, a shared key is generated between the multiple stakeholders, and access restrictions with respect to the generated shared key are flexibly set. A shared key control unit and a tamper-resistant module are provided for each of the multiple stakeholders. The shared key is set based on stakeholder dependency relationships. After the shared key is set, access to the shared key is controlled so that access is not possible by malicious stakeholders, so as to maintain the security level.04-28-2011
20110099361Validation And/Or Authentication Of A Device For Communication With Network - A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored therein based on the verification by the trusted third party. The trusted component may include a root of trust that may provide secure code and data storage and secure application execution. The root of trust may also be configured to verify an integrity of the trusted component via a secure boot and to prevent access to the certain information in the device if the integrity of the trusted component may not be verified.04-28-2011
20110099360Addressing Node Failure During A Hyperswap Operation - A method, system, and article are provided to enable a Hyperswap operation in a clustered computer system. Each node in the system is configured with flash memory, with a hierarchical list of boot volumes therein. Following a Hyperswap operation, the current boot volume is communicated to each node in the cluster and each node joining the cluster. All previously inactive nodes that were booted from the improper boot volume are re-booted from the correct and the flash memory is amended to reflect the correct boot volume.04-28-2011
20110099359Controlling A Device's Boot Path With Disk Locking - The computing system whose boot path is controlled by data locking comprised of: a processing device capable of executing instructions, including BIOS instructions for determining the booting priority of at least an application memory storage device and a services memory storage device, wherein the applications memory storage device and the services memory storage device are electrically coupled to the processing device, wherein the BIOS instructions set the booting priority of the services memory storage device higher than the priority of the application memory storage device and wherein the services memory storage device is capable of being locked and unlocked.04-28-2011
20090158022SNOOP FILTER OPTIMIZATION - A snoop filter optimization system includes one or more subsystems to operate a snoop filter, determine information that that affects operation of the snoop filter, and adjust operation of the snoop filter relative to the information that affects operation of the snoop filter.06-18-2009
20120124355SINGLE VOLUME IMAGE FILE EXTRACTION - Disclosed is a method of booting a virtual machine. A file, accessible by a privileged domain that includes an index file image and a plurality of other file images is stored. The index file image is of a predetermined, fixed size and includes a file name and a file size for each of the other images in the file. The privileged domain provides the file to one or more non-privileged virtual machines as a single disk image of the fixed size mounted on the non-privileged virtual machine. The other file images are extracted by the virtual machines based on the file names and file sizes stored in the index file image.05-17-2012
20120124362APPARATUS AND METHOD FOR RECORDING REBOOT REASON OF EQUIPMENT - Embodiments of the present invention provide an apparatus and a method for recording a reboot reason of equipment. Besides a first watchdog provided for triggering a global reset of the equipment, the apparatus provided by the present invention further includes a second watchdog. The second watchdog is used to trigger a logic chip to record a value representing the reboot reason of power-down in a storage array after the equipment is powered on. Thus, reboot reason of the equipment could recorded as power-down reboot.05-17-2012
20120124361PLURALITY OF INTERFACE FILES USABLE FOR ACCESS TO BIOS - A system may comprise a processor (05-17-2012
20120124360Method and Apparatus for Booting a Processing System - Machine-readable media, methods, apparatus and system for booting a processing system are described. In an embodiment, whether to launch an open operating system or a closed operating system to boot a processing system may be determined. A key may be retrieved from a processor register of the processing system and used to decrypt an encrypted version of the closed operating system based at least in part on a determination of booting the processing system with the closed operating system. In another embodiment, the processor register stored with the key may be flushed based at least in part on a determination of booting the processing system with the open operating system.05-17-2012
20120124358CONFIGURATION INFORMATION RECOVERING SYSTEM AND METHOD - A basic input output system (BIOS) microchip of a card and method recovers configuration information of the BIOS microchip of the card. The BIOS microchip of the card invokes a reading function from a BIOS microchip of a motherboard to read predetermined configuration information from the BIOS microchip of the motherboard. The BIOS microchip of the card replaces the configuration information stored in the BIOS microchip of the card by the predetermined configuration information, in response to a determination that the configuration information stored in the BIOS microchip of the card is different from the predetermined configuration information.05-17-2012
20120124357METHOD OF PROVISIONING FIRMWARE IN AN OPERATING SYSTEM (OS) ABSENT SERVICES ENVIRONMENT - Methods and apparatuses for re-instantiating a firmware environment that includes one or more firmware functions available at pre-boot time when transitioning the computing device from a first, higher power consumption state to a second, lower power consumption state. The firmware environment determines whether a cryptographic signature on a firmware volume is verified; whether hardware resources of the computing device requested by a manifest of the firmware volume are available; and whether a firmware module of the firmware volume is compatible with installed firmware of the firmware environment. If so, the firmware environment reserves space in a memory to accommodate resources used by the firmware module, and executes the firmware module with the computing device in the second, lower power consumption state.05-17-2012
20120124356METHODS AND APPARATUSES FOR RECOVERING USAGE OF TRUSTED PLATFORM MODULE - Methods and systems to perform platform security in conjunction with hardware-base root of trust logic are presented. In one embodiment, a method includes determining whether a status from an authenticated code module is indicative of an error or not. The method further includes determining whether the hardware-based root of trust logic is enabled based on content in a non-volatile memory location. If the hardware-based root of trust is enabled and the status is indicative of an error, the method further includes writing to the non-volatile memory location to disable hardware-based root of trust logic during a next boot sequence. In one embodiment, a platform initializes and uses the trusted platform module in conjunction with the hardware-based root of trust logic or with a platform-based root of trust logic.05-17-2012
20120124354DYNAMICALLY SELECT OPERATING SYSTEM (OS) TO BOOT BASED ON HARDWARE STATES - Disclosed is a microprocessor based system with a dynamically selectable Operating System that is capable of providing unique operating systems based upon current hardware states without user intervention. The system will determine the current state of the system and select from a plurality of operating systems the best operating system to load. In normal operating conditions the system will select the most full-featured and robust operating system. If, for example, the system loses alternating-current power, the system will shutdown, reboot, and automatically select an operating system with very limited capabilities and limited power consumption to allow the system to retrieve important data from the cache and store the data to a data storage device.05-17-2012
20090132797Methods, Media and Apparatus for Booting Diskless Systems - The disclosure provides a system, method, and computer readable medium for booting a diskless client in an information handling system (IHS). Cached boot data is stored in a non-volatile memory of the diskless client. The diskless client sends a boot request with an identifier and receives a boot reply containing an image signature associated with the identifier. The diskless client determines whether there is a match between a cached image signature and the received image signature. If there is a match, the diskless client boots with the cached boot data. If there is not a match, the cached boot data is invalidated and new boot data is requested and received from a server. The diskless client stores the new boot data in the non-volatile memory and boots with the new boot data. The cached boot data may be update when network traffic is below a predetermined level and/or an administrator change to boot data affects a plurality of diskless clients. The diskless client request and receives updated boot data stores the updated boot data in the non-volatile memory.05-21-2009
20120124359PROGRAM PROCESSING APPARATUS - A program processing apparatus includes an internal memory An internal memory is arranged to save a first program for activating a target program. A first designator designates the first program in response to a first manipulation in a state that an external memory which saves a second program for updating the internal memory is removed and the first program is saved in the internal memory. A second designator designates the second program in response to a second manipulation in a state that the external memory is attached. An executer executes the program designated by one of the first designator and the second designator.05-17-2012
20120166784SYSTEM AND METHOD FOR RECOVERING DATA OF COMPLEMENTARY METAL-OXIDE SEMICONDUCTOR - Parameters of a complementary metal-oxide semiconductor (CMOS) and an associated system time of a server are stored in a field-replaceable unit (FRU) of a baseboard management controller (BMC) of the server. If an error occurs and the CMOS is selected recovering from the BMC, the system time is selected from the FRU. The BMC reads the parameters from the FRU corresponding to the selected system time and sets the CMOS according to the read parameters.06-28-2012
20120166783RESETTING AN LTE UNIT THAT IS NOT IN A READILY ACCESSIBLE LOCATION - A system may include a device that is in a first location that is not readily accessible. The device may detect a powering up of the device a particular quantity of times during a particular time interval. Powering up of the device may be controlled from a second location that is readily accessible. The device may also be reset, in response to detecting the device being powered up the particular quantity of times during the particular time interval, to original factory settings.06-28-2012
20120221842PROVISIONING OF OPERATING ENVIRONMENTS ON A SERVER IN A NETWORKED ENVIRONMENT - A computer deploys an operating environment onto a provisionable server. The computer assigns an operating environment from an operating environment configuration management database to the provisionable server in response to detecting a provisioning event. The computer stores a record of the assignment in a deployment configuration management database and updates a management server with a designated operating environment identifier of the assignment.08-30-2012
20120131319SECURITY PROTECTION SYSTEM AND METHOD - A server includes a baseboard management controller (BMC). The server receives a first password and a second password input by a user. The BMC stores a first cryptograph corresponding to the first password in a field-replaceable unit (FRU) of the BMC. If a second cryptograph corresponding to the second password is the same as the first cryptograph, the server is started up. If the second cryptograph is not the same as the first cryptograph and a number of times that the second password has been input is greater than a predefined number of times, the server is locked.05-24-2012
20120131318SERVER AND METHOD FOR PERFORMING DATA RECOVERY OF THE SERVER - A method for performing data recovery of a server sends a data recovery request from a basic input output system (BIOS) of the server to a backup microchip of the server if a master operating system (OS) of an original microchip of the server is not available when the server is powered on, obtains a backup initial OS of the server from a storage unit of the backup microchip, and boots the backup initial OS according to a bootstrap of the backup initial OS. The method further obtains a backup master OS of the server from the storage unit of the backup microchip, sends the backup master OS to the original microchip of the server, and restarts the server according to the backup master OS.05-24-2012
20120131323SYSTEM INCLUDING A VIRTUAL DISK - A client configured to be connected and disconnected from a network includes: a memory storing a local mirrored copy of an image stored on a virtual disk server connected to the network; and a driver configured to access both the image stored on the virtual disk server and the local mirrored copy of the image when the client is connected to the network and to access only the local mirrored copy of the image when the client is disconnected from the network without requiring a reboot of the client after connecting or disconnecting from the network.05-24-2012
20120131321Contextual History of Computing Objects - Various features for a computer operating system include mechanisms for operating where a single native application, in the form of a Web browser, exists for an operating system, and all other applications run as Web apps of the browser application. A computer-implemented object tracking method includes instantiating, a first time, an operating system object on a computing device; automatically identifying contextual meta data that defines a state of objects that are open on the computing device, other than the instantiated operating system object, when the operating system object is instantiated; and storing the identifying contextual meta data in correlation with the operating system object, wherein the contextual meta data identifies one or more objects that are active in the operating system when the operating system object is instantiated.05-24-2012
20120166785INFORMATION PROCESSING APPARATUS, RESTORING METHOD OF BIOS SETUP, RESTORING PROGRAM - An information processing apparatus compares a first device model information of the information processing apparatus with second device model information stored in a nonvolatile memory unit being externally connected to the information processing apparatus, and compares first device identification information of the information processing apparatus with second device identification information stored into the nonvolatile memory unit based on detection of a boot-up. When the device model information comparison process is determined to be identical and when the device identification information comparison process is determined to be non-identical, the information processing apparatus reads out second BIOS setup value stored in the nonvolatile memory unit and replaces with the first BIOS setup value stored in the BIOS information memory unit.06-28-2012
20120166787ELECTRONIC DEVICE HAVING AN ALTERABLE CONFIGURATION AND METHODS OF MANUFACTURING AND CONFIGURING THE SAME - An electronic device having an alterable configuration includes a non-volatile memory configurable to include at least a first partition and a second partition, the non-volatile memory storing a boot ROM. The boot ROM is operable when executed by a processor of said electronic device to, in the event that a third partition is available, boot an operating system in the third partition, the operating system operable when booted to cause the third partition to be deleted and the second partition to be expanded to encompass memory freed by the deletion; and otherwise boot an operating system in the first partition.06-28-2012
20120166786INTEGRATED SOFTWARE AND HARDWARE SYSTEM THAT ENABLES AUTOMATED PROVISIONING AND CONFIGURATION OF A BLADE BASED ON ITS PHYSICAL LOCATION - An integrated software and hardware system is described that functions as a communications service broker in a telecommunications (telecom) network environment. The system can be used to perform mediation and orchestration of services in the telecom network. The integrated system provides the ability of fully automated configuration and provisioning of a compute blade module based on its physical location (in a chassis enclosure). In accordance with an embodiment, each blade in the chassis is assigned either a worker or bootstrap role. The worker blades perform the core processing of the service broker functionality and the bootstrap blades are used to provide the bootstrapping and administration of the worker blades.06-28-2012
20120216027Malware Management Through Kernel Detection During a Boot Sequence - A system and method for managing pestware on a protected computer is described. The method in one variation includes monitoring events during a boot sequence of the computer; managing pestware-related events before native applications can run and after a kernel is loaded; managing pestware-related events when native applications can run; and scanning a registry of the computer for pestware when native applications can run. In variations, a pestware management engine is initialized after an operating system of the protected computer is initialized and the pestware management system both receives an event log of the monitored events and compiles the set of behavior rules utilized by kernel-level monitor.08-23-2012
20120216026BOOT DETERMINING METHOD OF ELECTRONIC DEVICE FOR BOOTING AND ELECTRONIC DEVICE THEREOF - A boot determining method of an electronic device is used to determine whether to boot the electronic device having at least one storage. The boot determining method includes: receiving a start signal; detecting an ambient temperature; detecting whether the at least one storage has a heating module; comparing the ambient temperature with a temperature threshold; reading storage information; determining type(s) of the at least one storage according to the storage information; and determining whether to boot the electronic device after receiving the starting signal, according to a determining condition. The determining condition includes the type(s) of the at least one storage; whether the environment temperature is lower than the temperature threshold; and whether each of the at least one-storage has the heating module.08-23-2012
20100205424METHOD FOR BOOTING COMPUTER SYSTEM AUTOMATICALLY - A method for booting a computer system automatically includes steps as follows. A booting time point is set. The computer system is booted at the booting time point. A standby mode is entered immediately after the computer system is booted.08-12-2010
20100205423BIOS, COMPUTER DEVICE AND METHOD FOR RECOVERING BIOS - The invention provides a Basic Input/Output System (BIOS), a computer device and a method for recovering the BIOS. The BIOS includes a first boot block, a second boot block and a main BIOS block. The computer device includes a control chip disposed therein and said BIOS. When the programs in the first boot block and the main BIOS block are damaged, the second boot block can be selected so as for the BIOS to boot from the second boot block. Meanwhile, a recovery module of the second boot block can be utilized to recover the first boot block and/or the main BIOS block.08-12-2010
20100205422METHOD FOR SETTING BASIC INPUT/OUTPUT SYSTEM - A BIOS (Basic Input/Output System) setting method is disclosed, which is applicable to a computer equipped with a MEMORY a CMOS RAM (Complementary Metal Oxide Semiconductor Random Access Memory), and a BIOS-ROM (Basic Input/Output System Read-Only Memory) storing a first setting document. The BIOS setting method includes: providing a setting interface to allow a user to perform settings so as to form a second setting document; storing the second setting document in the BIOS-ROM; and loading the first and second setting documents to the MEMORY during a POST (Power On Self Test) process of the computer; saving the first setting document, or alternatively revising the first setting document and/or combining the first setting document with the second setting document according to the second setting document if loaded, so as to form a third setting document; and loading the third setting document to the CMOS RAM to perform a system initialization according to the third setting document.08-12-2010
20100205421Recovery System Using Selectable and Configurable Snapshots - A recovery system for a computer operating system and applications is described which uses selectable and configurable snapshots. In one example, a start-up sequence of the computer system is initiated, a plurality of snapshots in a hidden section of a mass storage device are identified before loading an operating system for the computer system, each snapshot containing an operating system, applications, and computer system configuration settings. One of the plurality of snapshots is booted including loading the operating system and applications of the one snapshot, and the start-up sequence is completed.08-12-2010
20100205420SYSTEM AND METHOD FOR REALIZING REMOTE TEST ON COMPUTER APPARATUS WITHOUT STORAGE DEVICE - A system and a method for realizing a remote test on a computer apparatus without a storage device are described, in which a client is enabled to select a desired operating system image file from a server and use the operating system image file to provide an initial processing on an operating system of the client. The testing method includes initializing a virtual disk in the client, registering the virtual disk to a basic input and output system (BIOS) of the client, connecting to a server over network according to connection information in the virtual disk, loading boot information into the client from the server, and performing a boot procedure on the client according to the boot information. Therefore, during a booting process of the client, a virtual disk is initialized in the server, so as to be used for booting the client.08-12-2010
20100070751Preloader - This disclosure describes techniques and/or apparatuses for reducing the total time used to boot up a computer and load applications onto the computer.03-18-2010
20100064125PROGRAMMABLE DEVICE AND BOOTING METHOD - A programmable device is provided, comprising a memory for storage of an encrypted boot loader, and a processing unit coupled to the memory. In the processing unit, a boot straper decrypts the encrypted boot loader into a plurality of boot loader instructions when the programmable device is initialized. A core executes boot loader instructions to accordingly load and execute an operation system.03-11-2010
20120137116COMPUTER SYSTEM AND CONTROL METHOD OF THE SAME - A computer system includes a device which transmits data through a predetermined interface and outputs first recognition information in response to a predetermined power on self test (POST) control signal, a device controller which has second recognition information about whether the device is mounted, and a system controller which outputs the POST control signal to the device when powering on, and recognizes the device on the basis of the first recognition information and the second recognition information.05-31-2012
20120137113METHOD OF POWERING ON SERVER - A method of powering on a server is provided, wherein the server includes power consumption modules with the same functions, connectors, and a BIOS (Basic Input/Output System). The power consumption modules are connected to the server via the connectors respectively. This method includes the steps as follows. At first, the BIOS detects a delay power-up setting. When the delay power-up setting is detected, the BIOS staggers initialization times of the connectors, so that the connectors can be initialized respectively. When one of the connectors has been initialized, the connector is electrically connected to the corresponding power consumption module, so that the power consumption module can be delayed to be powered on.05-31-2012
20110185165INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, AND INTEGRATED CIRCUIT - It is possible to update and re-seal sealed data having a usability condition of matching with predetermined terminal environment information during a secure boot without rebooting a terminal when a program using the sealed data is updated. An information processing terminal (07-28-2011
20110185164Information processing apparatus and boot completion notification program - In an information processing apparatus, a stopwatch unit detects boot-up of an information processing apparatus, and measures as a boot time a time elapsed from the detection of the boot-up. A determination unit determines whether the boot time has reached notification timing. An output unit outputs a boot completion notification when the determination unit determines that the boot time has reached the notification timing indicated by boot completion notification timing information as a result of comparison therebetween.07-28-2011
20110185163MULTI-ROOT PCI EXPRESS SWITCH, BOOT METHOD THEREOF, AND MULTI-ROOT PCI MANAGER PROGRAM - Provided is an MRA (multi-root aware) PCI express switch accommodating a plurality of root complexes. The MRA PCI express switch includes: a setting register storing necessary information to set a PCI tree based on a switch connection topology and a physical connection state; and a virtual switch bridge controller storing necessary information to establish a virtual PCI tree, irrespective of a status of the setting register. The root complexes can be booted based on the information in the virtual switch bridge controller.07-28-2011
20110185162METHOD AND SYSTEM TO TRANSMIT CODE TO A SYSTEM ON A CHIP (SOC) - A method and system to transmit code to a System on Chip (SOC) from a host processor using a host-side driver is provided herein. The SOC and host processor are coupled by a bus. The host driver receives an overlay from an application layer and stores the overlay. The host driver receives an IOCTL to be transmitted to the SOC. The host driver determines whether an input/output control (IOCTL) value of the IOCTL to be transmitted to the SOC corresponds to an IOCTL value in one of the stored overlays. The host driver transmits an overlay to the SOC if the IOCTL value of the IOCTL to be transmitted is equal to at least one IOCTL value in the overlay. The host driver then transmits the IOCTL to the SOC.07-28-2011
20100174895RAPID-BOOT COMPUTING DEVICE WITH DUAL OPERATING SYSTEMS - A computing device is booted in a manner that enables a software application to begin execution with minimal delay. When the device is powered up, a first processor begins booting under control of a first operating system, and a second processor begins booting under control of a second operating system. The first operating system is of a type that generally takes longer to complete booting than the second operating system. As soon as the second processor has booted up, it begins controlling execution of a software application. Then, when the first processor has booted up, control over the software application is transferred from the second processor to the first processor.07-08-2010
20120173859TECHNIQUES FOR STOPPING ROLLING REBOOTS - Techniques for detecting rolling reboots and for taking responsive actions to stop rolling reboots.07-05-2012
20120173857OVER THE AIR APPLIANCE FIRMWARE UPDATE - An appliance is placed in a bootload mode and other operations of the appliance are powered down. Data is gathered through an appliance control module which activates the bootloader mode, and then receives the data and overwrites the remainder of the appliance controller memory. In this manner, software for an appliance is updated without having to enter the home.07-05-2012
20120173862System and Method of Delaying Power-Up of an Information Handling System - A system and method of delaying power-up of an information handling system is disclosed. According to an aspect, a method of powering an information handling system can include detecting a delay power-up setting within a basic input output system (BIOS) of a particular information handling system using a management controller. The management controller can be configured to delay power-up of the particular information handling system. The method can further include enabling a power-up of the particular information handling system in response to the delay power-up setting using the management controller.07-05-2012
20120173860COMPUTING DEVICE AND METHOD FOR REGISTERING IDENTIFICATION INFORMATION OF NETWORK INTERFACE CARD IN OPERATING SYSTEM - In a method for registering identification information of network interface cards (NICs) in an operating system of a computing device, each of the NICs is respectively and uniquely labeled with a number. A peripheral component interconnect (PCI) device identification (ID) of each of the NICs is allocated according to the labeled number of each NIC using a basic input output system (BIOS) of the computing device when the BIOS is booted up. Then identification information of each of the NICs is registered in the operating system according to the PCI device ID of each NIC using a NIC driver of the computing device, when the NIC driver is driven by the operating system during the booting up process of the operating system.07-05-2012
20110197053SIMPLIFYING MANAGEMENT OF PHYSICAL AND VIRTUAL DEPLOYMENTS - A deployment system allows an administrator to convert virtual deployments to physical deployments so that an administrator can easily move between the virtual and physical world. The deployment system allows an administrator to directly deploy an operating system image in the form of a VHD file to the hard disks of a physical machine as a directly bootable and natively installed operating system. Thus, the deployment system relieves administrators from separately managing physical and virtual deployment images. Instead, administrators can manage only virtual deployment images and convert virtual images to physical deployments as needed.08-11-2011
20100299514HOST BUILD AND REBUILD SYSTEM AND METHOD - Methods of building a host computer system. The methods may comprise the steps of discovering hardware components present at the host and determining whether the hardware components are certified. The methods may also comprise the step of determining whether a build of the host is requested. According to various embodiments, a profile may also be downloaded to the host. The profile may comprise an indication of an operating system, an indication of an application, and an indication of a configuration parameter. The methods may also comprise the steps of installing the operating system to the host; installing the application to the host; and configuring the host according to the configuration parameter.11-25-2010
20100299512Network Boot System - To minimize network access to a server in a network boot system. A server which stores an OS operating on a client terminal and a client terminal which includes a physical storage device are connected to each other over a network. The client terminal includes a physical memory and a network interface, and the OS includes a network driver for driving the network interface, a filter driver for converting access to a local bus of the client terminal into access to the network, and a read cache driver for driving the storage device. The read cache driver caches data which is read out from the server by the filter driver in the storage device.11-25-2010
20100049962METHOD FOR LOADING AND UPDATING CENTRAL PROCESSING UNIT MICROCODE INTO BASIC INPUT/OUTPUT SYSTEM - The present invention relates to a method for loading a central processing unit microcode into a basic input/output system and a method for updating the central processing unit microcode of the basic input/output system. A system management interrupt instruction is applied to inform the basic input/output system an address and a length of the central processing unit microcode. Then, the basic input/output system performs an interrupt instruction to load the central processing unit microcode to a specific block of the basic input/output system.02-25-2010
20100049961UPDATE METHOD FOR BASIC INPUT/OUTPUT SYSTEM AND UPDATE SYSTEM THEREOF - An update method for a basic input/output system (BIOS) and an update system thereof are provided. Firstly, a program code of a boot block included in a main BIOS block is executed to detect whether the main BIOS block is crashed. A program code of the BIOS is stored in the main BIOS block. A BIOS image file is searched from a storage device when the main BIOS block is crashed, which includes a program code of a graphical user interface (GUI) and a plurality of update files. The program code of the GUI is executed to display graphic updating information of the BIOS. One of the update files is selected by a control command to update the main BIOS block. Therefore, the needed update file can be selected to update the BIOS by graphically display the updating information of the bios, thereby improving the update efficiency and usage convenience.02-25-2010
20120179900METHOD OF STARTING UP A COMPUTING DEVICE IN A NETWORK, SERVER AND NETWORK OF COMPUTING DEVICES FOR THE IMPLEMENTATION THEREOF - This method of starting up a computing device (07-12-2012
20120179899UPGRADEABLE PROCESSOR ENABLING HARDWARE LICENSING - A technique for programming a configurable co-processor in a processing system is disclosed. The configurable co-processor includes field programmable logic and is configured using a pre-generated co-processor image. The technique involves enabling a user application to program the configurable co-processor with certain application-specific hardware based processing functions. One advantage of the present invention is that application-specific hardware design optimizations may be implemented to improve application performance after hardware for the processing system has been manufactured.07-12-2012
20100275004SYSTEM AND METHOD FOR EXPRESS EXECUTION OF NAVIGATION FUNCTION - A method for express execution of navigation function is provided. A computer system is installed with a first operating system in a data storage device therein. The method includes the following steps: the computer system executing the BIOS of the computer system; before loading and executing the first operating system, the computer system detecting and activating a touch-control display device; the touch-control display device displaying an executive item icon representing the navigation function; detecting the executive item icon selection by the user; based on the selection, loading and executing the first operating system; and executing the navigation function corresponding to the selected executive item icon.10-28-2010
20100275003SYSTEM AND METHOD FOR EXPRESS EXECUTION OF INTERNET SERVICE ACCESSING - A method for express execution of internet service accessing with a touch-control interface for a computer system is provided. A computer system is installed with a first operating system in a data storage therein. The method includes the following steps: the computer system executing the BIOS of the computer system; before loading and executing the first operating system, the computer system detecting and activating a touch-control display device; the touch-control display device displaying executive item icons representing internet service accessing programs; detecting the executive item icon selection by the user; based on the selection, loading and executing the first operating system; and executing the internet service accessing program corresponding to the selected executive item icon.10-28-2010
20100275002IMAGING APPARATUS AND START-UP METHOD OF IMAGING APPARATUS - An imaging apparatus includes: an imaging processing unit configured to image a subject and output imaging data; a temporary storage medium configured to temporarily store the imaging data output from the imaging processing unit; an imaging control unit configured to control the imaging processing unit; a storage control unit configured to store, in a storage medium detachably mounted to a device main unit, the imaging data temporarily stored in the temporary storage medium; and a request unit configured to request the device main unit for execution of start-up processing; wherein, upon the start-up processing being requested from the request unit, start-up processing of the imaging control unit and the storage control unit are executed in parallel.10-28-2010
20100274999CONTROL SYSTEM AND METHOD FOR MEMORY - A control system for a number of memories includes a processor, a control chip, and an expansion chip. The processor is connected to a basic input and output system and the control chip. The control chip is also connected to a number of first memory cards and the expansion chip. The expansion chip is also connected to a number of second memory cards.10-28-2010
20100274998METHOD AND SYSTEM FOR PROVIDING A DATA MODULE LOCK TO DEVICE HARDWARE - Systems and methods for confirming that a circuit card is compatible with a computer in which it is installed includes accessing a list of compatible circuit cards stored in the computer's nonvolatile memory, determining if the circuit card is included in the list of compatible circuit cards; and storing operating software on the circuit card only if the circuit card is included in the list of compatible circuit cards. The list of compatible circuit cards can be the Plug-and-Play Identification (PnP ID) list stored in the computer's BIOS data. Power may be removed from the circuit card if the circuit card is not include in the list of compatible circuit cards.10-28-2010
20120233448MANAGING SOFTWARE CHANGES - The claimed subject matter provides a system or method for managing software changes. An exemplary method comprises creating a reset boot loader, a last known good (LKG) boot loader, and a current boot loader, then pointing the reset boot loader, LKG boot loader, and current boot loader to a parent virtual hard disk (VHD) containing a default master image. An operation to perform is determined, and a service partition is booted into. The LKG boot loader or current boot loader is pointed to a child VHD loaded with another desired image based on the operation selected, and the system is rebooted into the parent VHD or child VHD pointed to by the current boot loader.09-13-2012
20100031012CORE INITIALIZATION CODE VALIDATION - Files essential to the boot sequence are validated as they are executed. As core boot files are loaded and executed by a computers a hash of the files is created and extended into configuration registers. Core operating system files are verified by the boot loader using a digital signature, and the public key used to verify the digital signature is recorded in a configuration register. Core operating system files verified by the boot loader include a list of hash values, which is used by the operating system to validate the other files as they are executed. User assurance that the system has booted correctly is achieved by comparing the state of configuration registers to previously stored values reflecting the expected state of the registers. Upon the state of the configuration registers matching what is expected, data previously selected by the user is retrieved and recognized by the user.02-04-2010
20120233449METHODS AND SYSTEMS FOR MEASURING TRUSTWORTHINESS OF A SELF-PROTECTING DRIVE - A method for measuring the trustworthiness of a self-protecting drive includes receiving a measurement from an element within a transitive chain of trust, processing the received measurement, storing the measurement as a verification value, comparing the verification value with a reference verification value stored on the self-protecting drive, and unlocking at least a portion of the self-protecting drive when the reference verification value corresponds to the verification value. A self-protecting drive includes a boot partition, a trusted partition, a master boot partition, a primary partition, a secondary partition, and a particular table that has a verification platform configuration register and a reference platform configuration register. The primary partition is inaccessible until the self-protecting drive determines that a value stored in the verification platform configuration register corresponds to a value stored in the reference platform configuration register.09-13-2012
20120233452Reducing Current Draw Of A Plurality Of Solid State Drives At Computer Startup - Reducing current draw of solid state drives from a shared power supply of a computer at computer startup, each SSD including computer memory, a capacitor, a disk controller, and a charge controller, the disk controller configured to enable the charge controller to charge the capacitor upon receiving a charge command, the SSDs organized into startup groups characterized by a position in a predefined startup order. Upon startup of the computer, beginning with a first startup group in the predefined startup order and until the last startup group in the predefined startup order has received a charge command, embodiments include, sending, by a storage device initiator, a charge command to a startup group to initiate charging of the capacitor of each solid state drive in the startup group and waiting a predefined period of time before sending another charge command to a next startup group in the predefined startup order.09-13-2012
20120233450SYSTEM AND METHOD OF BOOTING A COMPUTER SYSTEM USING AN EFI PERSONALITY OF A DIFFERENT COMPUTER SYSTEM - Booting a computer system using an EFI personality of a different computer system. At least some of the illustrative embodiments are methods including: reading, by a first computer system, a plurality of parameters of an EFI personality of a second computer system different than the first computer system; modifying, by the first computer system, a first parameter of the plurality of parameters thereby creating a modified EFI personality; and booting an operating system on the first computer system based on modified EFI personality.09-13-2012
20130173901MULTI-PROCESSOR COMPUTER SYSTEMS AND METHODS - Multi-processor computer systems and methods are provided. A multi-processor computer system can include a plurality of communicatively coupled processors (07-04-2013
20100011203CONTROL PROTOCOL FOR IMAGE ENUMERATION AND TRANSFER - A control protocol is used to deploy and install an operating system image on a client. The data structure of the control protocol includes an operation code corresponding to an operation associated with the deployment and installation of the operating system image on the client. When a server receives a request packet from the client, the server parses the request packet and sends the parsed request packet to a provider. The provider then executes the operation associated with the operation code and generates a return value. The return value is sent to the server. The server then composes a reply packet including the return value and transmits the reply packet to the client.01-14-2010
20100011204Method and System for Image Management in a Computing System - A method and system for migrating data to a build-to-order computing system is provided. The method comprises storing an image at a remote site. The image comprises data stored on a computing system. An order is received to provide a second computing system to a customer. Access to the image is provided to the second computing system such that the second computing system can store the image.01-14-2010
20100011201COMPUTER SYSTEM AND CONTROL METHOD THEREOF - A control method of a computer system, including setting whether to enable a connection with at least one peripheral device in an operating system of the computer system to transmit and receive data; and enabling or disabling the connection with the at least one peripheral device based on the setting when the computer system is booted.01-14-2010
20100011200METHOD AND SYSTEM FOR DEFENDING SECURITY APPLICATION IN A USER'S COMPUTER - Protecting the integrity and the effectiveness of a security agent that is installed in a user's device while the user's device operates online or offline. The security agent may be used for enforcing a security policy required by an organization or network to which the user's computer belongs. One aspect of exemplary embodiments of the present invention is to associate the content of one or more storage devices of the user's computer with the security agent and with a boot-loader program used by the user's computer.01-14-2010
20100011199Method and device of bootloader-to-go - A method comprising two steps is provided for a simplified on-site bootloading process. Step 1: having a computer or similar device preload initialization instructions and executable codes to an intermediate device. Step 2: having that said device transfer such initialization instructions and executable codes to the operating device. The intermediate device named “bootloader-to-go” is provided in this invention. The said bootloader-to-go device provides the uncomplicated transferring of the initialization instructions and executable codes to the operating device without complex configuration steps. The said bootloader-to-go device is handheld, operated by a single operating switch and is equipped with versatile I/O bus connections compatible to operating devices with various I/O types. There is no need of a hosting computer or similar device on site, the bootloading speed is not controlled by a hosting computer, and therefore the bootloading time is predictable and can be repeated.01-14-2010
20120254602Methods, Systems, and Apparatuses for Managing a Hard Drive Security System - Methods, systems, and apparatuses for a self-encrypting drive (SED) management system configured to be loaded in a pre-boot region of an SED-based computer, the SED of the SED-based computer having a nominal space, which may be encrypted when the SED-based computer is shut down, and the pre-boot region. The SED management system comprises a pre-boot operating system (OS); at least one pre-boot library configured to support the pre-boot OS; and an unlocking software program configured to work with the pre-boot OS to transfer control directly to an operating system of the nominal space upon a successful authentication. Other embodiments are described and claimed.10-04-2012
20120317406FLASH STORAGE SYSTEM AND METHOD FOR ACCESSING A BOOT PROGRAM - The subject technology relates to a flash storage system for accessing a boot program for a computing system, the flash storage system comprising a flash storage, a random access memory and a flash controller coupled to the flash storage and the random access memory, the flash controller configured to load the boot program from the flash storage into the random access memory. In certain aspects, the flash control is further configured to generate a ready signal indicating the boot program is accessible from the random access memory. Computing systems and methods are also provided.12-13-2012
20120317405METHOD OF OPERATING A HETEROGENEOUS COMPUTER SYSTEM - A method of operating a heterogeneous computer system for executing tasks of software that has at least one performance processor, a processor supporting logic, and a hypervisor processor. The method either i) boots up the hypervisor processor only; or ii) boots up the at least one performance processor after the hypervisor processor; or iii) boots up the at least one performance processor only; or iv) boots up the hypervisor processor after the at least one performance processor. The hypervisor processor executes tasks that the hypervisor processor has sufficient processing power to handle and puts the at least one performance processor to power-conserving state. The hypervisor processor brings the at least one performance processor out of power-conserving state to execute tasks that the hypervisor processor has insufficient processing power to handle. The at least one performance and hypervisor processors simultaneously execute tasks that require combined processing power of all processors.12-13-2012
20120185686Method, Apparatus and Computer Program for Loading Files During a Boot-Up Process - Embodiments of the invention relate to a method, apparatus and computer program. More particularly, embodiments relate to identifying at least one new file to be loaded in a computing device during a boot-up process of said computing device. Also, determining if loading at least one of the identified new file(s) causes the computing device to crash. Also, updating a list on the computing device in dependence on whether the loading of the identified new file(s) causes the computing device to crash. Also, loading at least one file in the computing device during a boot-up process in dependence on the list, to prevent the computing device crashing during the boot-up process.07-19-2012
20120185683SYSTEM AND METHOD FOR TAMPER-RESISTANT BOOTING - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for booting a computing device having an encrypted storage medium using full disk encryption, referred to as tamper-resistant boot. The system retrieves a kernel cache and a kernel cache digest from an unencrypted storage medium and verifies the authenticity of the kernel cache based on the credentials and the kernel cache digest. Initiation and execution of the operating system is performed if the kernel cache is authentic. In one embodiment, the system verifies the authenticity of a request to disable tamper-resistant booting by utilizing a password verifier and a password proof.07-19-2012
20120084551FAN CONTROL METHOD AND APPARATUS FOR DEVICE AREA IN INFORMATION HANDLING SYSTEM - A fan control method for an information handling system is provided. The information handling system includes a device area and a fan for providing air flow to the device area. A plurality of devices is installed on the device area. The method includes the steps of: collecting thermal data of installed devices in the device area when booting up the information handling system; determining a threshold power of the installed devices and a discreteness level of the installed devices based on the thermal data; adjusting an initial speed of the fan based on the discreteness level; and calibrating the speed of the fan to obtain an optimized speed thereof based on the threshold power and the adjusted initial speed. A fan control apparatus for an information handling system is further provided.04-05-2012
20120084550INFORMATION PROCESSING SYSTEM AND STARTUP CONTROL METHOD - An information processing system including a control apparatus and a housing includes a device that operates under control of the control apparatus, the control apparatus includes a memory that stores operability information including plural pieces of the operability information each indicate whether an device is operable under the control of the control apparatus, and a startup controller that obtains designation information designating a piece of the operability information from the housing and reads a piece of the operability information designated by the obtained designation information, wherein the startup controller requests the housing to start up the device when the read piece of the operability information indicate that the device is operable, and excludes the device from being subject to startup control when the read piece of the operability information indicates that the device is inoperable.04-05-2012
20120084549Attesting a Component of a System During a Boot Process - A method, apparatus and program product for attesting a component of a system during a boot process. The method comprises the steps of: verifying that the system is in a trusted state; in response to verifying that the system is in a trusted state, requesting an enrollment of the system wherein the requesting step further comprises the step of: retrieving enrollment data associated with the system; retrieving current input data associated with the component of the system; comparing the current input data against the enrollment data in order to determine whether the system can retain its trusted state; wherein in response to the comparing step, if the current input data matches the enrollment data, the system retains its trusted state; and accepting the trusted state until receipt of a notification, from the system having a retained trusted state, of an update to the system.04-05-2012
20120084547METHOD AND TERMINAL OF BOOTING A COMPUTING SYSTEM - Provided is a method of booting a computing system which performs boot image transmission and device initialization in parallel. For example, using an Internal RAM and direct memory access (DMA), hardware initialization and loading of boot image from a main storage medium to a main memory are performed in parallel, thereby reducing time spent on booting.04-05-2012
20120084546Termination-log acquiring program, termination-log acquiring device, and termination-log acquiring method - A client terminal receives, in response to a boot command issued by a user to boot the client terminal, a first start command to start monitoring. The client terminal acquires first time information, repeatedly at certain time intervals from a basic software, and stores the first time information in a storage area. The client terminal receives a termination command to terminate the basic software. If the termination command is a command to terminate the basic software by using the basic software, the client terminal stores normal termination information in the storage area. When a second start command is received, and no normal termination information is stored in the storage area, the client terminal acquires second time information from the basic software and creates, depending on a result of comparison between the second time information and the first time information, log information relating to a termination of the basic software.04-05-2012
20120084545METHODS AND SYSTEMS FOR IMPLEMENTING A SECURE BOOT DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS - A secure boot device, method, and system for securely connecting a client computer having a secure boot device to a remote server over a communications network are disclosed. The secure boot device includes a housing having an integrated communication interface, a controller located within the housing and operatively connected to the communication interface, and a memory communicatively connected to the programmable circuit and the communication interface. The memory securely stores program instructions including a boot module, a client terminal process module, an operating system module, and a secure communications interface module. The secure communications interface module includes program instructions for communicating split and encrypted data communicated between a computing system to which the communication interface is connected and a remote computing system.04-05-2012
20120260079FAST BOOTING COMPUTER APPARATUSES AND METHODS THEREOF - A fast booting computer apparatus includes one or more processors and a memory comprising a hard disk drive and a solid state drive coupled to the one or more processors. The one or more processors are configured to execute programmed instructions stored in the memory. The solid state drive is configured to store and provide the programmed instructions for an operating system for execution by the one or more processors when requested.10-11-2012
20120260078APPARATUSES FOR CONFIGURING PROGRAMMABLE LOGIC DEVICES FROM BIOS PROM - An apparatus comprising programmable logic devices including a field programmable gate array (FPGA) is presented. In one embodiment, the apparatus also comprises a programmable read only memory (PROM) to store a firmware which includes at least a system boot code and a configuration code. The apparatus further includes a configuration agent to configure the FPGA by using the configuration code and to release the reset to the CPU after the FPGA is configured. In one embodiment, the configuration agent comprises a SPI-FPGA bridge (serial peripheral interface to FPGA configuration interface). In one embodiment, the configuration agent is operable to determine whether the FPGA is ready for configuration based at least on a status from the FPGA.10-11-2012
20090019277NETWORK TERMINAL OPERATED BY DOWNLOADABLE OPERATING SYSTEM AND OPERATING METHOD THEREOF - A network terminal operated by a downloadable operating system is provided. In the network terminal, a power supply supplies a power to an element of the network terminal, a nonvolatile storage medium stores a basic input/output system (BIOS) that automatically operates upon the supplying of the power, a controller is initialized by the operation of the BIOS in order to enable a connection between the network terminal and a host computer and to enable a download of a terminal operating system (OS) from the host computer to the network terminal, and a volatile storage medium stores the terminal OS downloaded from the host computer.01-15-2009
20090019276NETWORK TERMINAL OPERATED BY DOWNLOADABLE OPERATING SYSTEM AND OPERATING METHOD THEREOF - A network terminal operated by a downloadable operating system is provided. In the network terminal, a power supply supplies a power to an element of the network terminal, a nonvolatile storage medium stores a basic input/output system (BIOS) that automatically operates upon the supplying of the power, a controller is initialized by the operation of the BIOS in order to enable a connection between the network terminal and a host computer and to enable a download of a terminal operating system (OS) from the host computer to the network terminal, and a volatile storage medium stores the terminal OS downloaded from the host computer.01-15-2009
20090019275Secure Boot Method and Semiconductor Memory System Using the Method - A semiconductor memory system includes an external memory, an internal memory, and a one-time programmable (OTP) memory. The external memory includes a kernel, a public key, first boot information used to authenticate the public key and generate a test secret key, and a second boot loader verifying integrity of the kernel. The internal memory includes a first boot loader that verifies integrity of the second boot loader and generates the test secret key. The OTP memory includes second boot information generated using the public key and a secret key. Since the secure boot method and the semiconductor memory system using the method do not need an additional OTP memory to store a secret key unlike conventional technology, the capacity and recording time of the OTP memory can be reduced to about half compared to the conventional technology.01-15-2009
20120233451METHOD FOR FAST RESUMING COMPUTER SYSTEM AND COMPUTER SYSTEM - A method for fast resuming a computer system from a shutdown state is provided. The computer system comprises a basic input output system (BIOS), a system memory and a storage device storing a system memory data of the system memory and a used system memory block address table before the computer system enters the shutdown state. The method comprises receiving a starting signal for power supplying the computer system and starting the storage device. A fast boot built-in program of the BIOS is started and, according to the used system memory block address table, the fast boot built-in program sequentially reads the stored system memory data from the storage device and writes the read system memory data into the system memory with a use of an optimized read-and-write block size as a read-and-write unit. The computer system enters a suspended state and is resumed from the suspended state.09-13-2012
20080301428INFORMATION PROCESSING APPARATUS AND START-UP CONTROL METHOD - According to one embodiment, if start-up of an application is abnormal after starting up the application, the information processing apparatus reports the fact to the basic input/output system (BIOS), and the BIOS locks a system.12-04-2008
20080301427BASIC INPUT/OUTPUT SYSTEM MEMORY SIMULATION MODULE - A basic input/output system (BIOS) memory simulation module includes a first transmission interface unit adapted to receive an updated BIOS data from an external source, a second transmission interface unit adapted to be connected electrically to a computer under test, a memory unit, and a control unit connected electrically to the first transmission interface unit, the second transmission interface unit and the memory unit. The control unit is operable to store the updated BIOS data from the first transmission interface unit into the memory unit, and to output the updated BIOS data stored in the memory unit to the computer under test via the second transmission interface unit.12-04-2008
20080301426ROOTKIT DETECTION - Embodiments of the present invention address deficiencies of the art in respect to rootkit detection and provide a method, system and computer program product for external rootkit detection and remediation. In one embodiment of the invention, an external rootkit detection tool can be provided. The tool can include external static memory with an input/output (I/O) port interface to an external I/O port on a target computing platform. The tool further can include a boot image disposed in the external static memory, and rootkit detection and remediation logic disposed in the external static memory and referenced by the boot image. In one aspect of the embodiment, the external static memory can include a universal serial bus (USB) key and, correspondingly, the I/O port can include an external USB port.12-04-2008
20080301425Method And System To Support ISCSI Boot Through Management Controllers - An information handling system includes a host including a central processing unit, a management controller enabled to communicate with the host, a network interface resource in communication with the host and operable to enable the information handling system to communicate via an external network, and a target system in communication with the host through the network interface resource. The management controller comprises an iSCSI initiator operable to generate a request to the target system for an initial OS image.12-04-2008
20080301424Intelligent Boot Services - An information handling system is provided with an intelligent boot service which addresses and resolves unbootable system scenarios. The intelligent boot service detects and corrects adverse events before booting into the operating system. The intelligent boot service architecture is extensible to add newer events and is extensible to include extensible firmware interface (EFI) technology.12-04-2008
20120265976Secure Network Cloud Architecture - Apparatuses, computer readable media, methods, and systems are described for requesting creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud. Through various communications between a cloud DMZ, cloud provider, and/or company's network, a VM instance may be securely created, initialized, booted, unlocked, and/or monitored through a series of interactions building, in some examples, upon a root of trust.10-18-2012
20110131403VERIFYING FIRMWARE - Systems, methods, and other embodiments associated with updating firmware for a chip are described. One example method may include performing an external verification of updated firmware received and stored external to the chip to determine if the updated firmware is authentic. Upon determining that the updated firmware is authentic, the updated firmware is loaded into the chip. An internal verification of the updated firmware within the chip is performed to determine that the updated firmware is authentic. The internal verification is assured to succeed based on the external verification. Because the internal verification will succeed, the chip avoids reverting to a default firmware.06-02-2011
20110131402METHOD AND APPARATUS FOR SECURE EXECUTION USING A SECURE MEMORY PARTITION - A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor also contains cryptographic logic coupled to the execution unit that encrypts and decrypts secure data and code.06-02-2011
20110131401AUTHENTICATION SYSTEM FOR GAMING MACHINES AND RELATED METHODS - Various embodiments disclosed herein are directed to gaming devices having a secured basic input/output system (BIOS) and methods for determining the validity of the gaming device's BIOS. According to one embodiment, the gaming device includes a secured module for authenticating the BIOS of the gaming device. During the boot-up process, the secured module selects a challenge from a plurality of challenges, and the selected challenge is issued to the BIOS. The BIOS generates a response to the challenge, and the secured module determines whether the BIOS response matches the calculated response of the secured module. If the BIOS response matches the secured module response, the gaming device continues the boot process. Otherwise, the boot process is halted by the gaming device.06-02-2011
20110131400METHOD AND COMPUTER SYSTEM FOR THERMAL THROTTLING PROTECTION - An automatic thermal throttling protection method is described. a computer system executes a main BIOS for initializing an embedded controller when the computer system is power on or boots. And the sub BIOS of the embedded controller is also executed. The sub BIOS of the embedded controller obtains an upper temperature limit and a lower temperature limit set by the main BIOS, and obtains a temperature of the CPU through a thermal sensor. The sub BIOS of the embedded controller compares the temperature of the CPU with the upper temperature limit. When the temperature of the CPU is higher than the upper temperature limit, the sub BIOS sends a system control interrupt event to the main BIOS through the embedded controller. When receiving the SCI event, the main BIOS enables a throttling function to perform a throttling operation on the CPU or shuts down the computer system.06-02-2011
20120239918EXPEDITED COMPUTER BOOT SYSTEM AND METHOD - The present invention discloses an expedited computer boot system and method. The expedited computer boot system includes: ROM, RAM, and a module for selecting a boot mode. The module for selecting a boot mode at least includes: a detecting unit and a fast boot unit. The fast boot unit reads configuration settings stored in the RAM and loads into operating system based on the configuration settings if the detecting unit detects no device changed. Otherwise, the fast boot unit reads ROM and Power-On Self Test (POST) is executed if any device is changed. Therefore, the computer system can quickly boot and the time for booting computer is shortened.09-20-2012
20120239917Secure Boot With Minimum Number of Re-Boots - Systems, methods and products are described that provide secure boot with a minimum number of re-boots. One aspect provides a method including receiving an indication to boot from a power off state at a computing device; responsive to authenticating a user at one or more input devices, releasing a value derived from authenticating the user at the one or more input devices; responsive to releasing the value, unlocking one or more encrypted drives with a previously established alternate credential; and thereafter proceeding to boot from the power off state. By not having to call the non-BIOS software each boot, this minimizes the number of reboots for each boot cycle.09-20-2012
20120239921Data Storewidth Accelerator - Data storage controllers and data storage devices employing lossless or lossy data compression and decompression to provide accelerated data storage and retrieval bandwidth. In one embodiment of the invention, a composite disk controller provides data storage and retrieval acceleration using multiple caches for data pipelining and increased throughput. In another embodiment of the invention, the disk controller with acceleration is embedded in the storage device and utilized for data storage and retrieval acceleration.09-20-2012
20120239919COMPUTER FACILITATING BIOS SETTING - A computer includes a mother board, a standby power source, a BIOS display, and a BIOS user input. The mother board includes a storage unit. The storage unit stores BIOS software and BIOS settings of the computer. The standby power source is configured for providing a standby voltage when the computer is powered but not started up. The controller is configured for reading the BIOS software and the BIOS settings from the storage unit, driving the BIOS display to display a BIOS UI based upon the BIOS software and the BIOS setting, and editing the BIOS settings based upon inputs from the BIOS input unit upon the condition that the controller, the BIOS display, and the BIOS input unit receive the standby voltage.09-20-2012
20080288763Method For Controlling the Operation of a Display Screen In A Computing Device - In a computing device such as a mobile phone which includes a splash-screen displayed while the operating system is booting up, the portion of the operating system which is responsible for the display after booting up is provided with all the information about the state of the splashscreen, so that a smooth transition is provided between the splashscreen and the initial screen under the control of the operating system when control of the screen is passed from the boot-up process to the operating system.11-20-2008
20120324212CACHING BASED OPERATING SYSTEM INSTALLATION - An image of system software is installed by loading an executable image of the system software using a boot loader, where the executable image includes a kernel and a plurality of files used by the kernel. The kernel of the system software is executed to generate the image of the system software that includes a copy of the kernel. Generating the image of the system software involves the steps of generating a plurality of pointers that each point to a different one of the files, retrieving the files using the pointers, and storing a copy of the kernel and the files in a storage device from which the system software is to be booted as the image of the system software.12-20-2012
20120272050ELECTRONIC DEVICE AND BOOTING METHOD THEREOF - An electronic device and a method of booting the electronic device is provided. The electronic device and method include a power supply unit, a volatile memory, a non-volatile memory, and a controller which, in response to power being supplied by the power supply unit, performs booting in a first booting mode that uses a suspend image stored in the volatile memory; and, in response to an error occurring in the first booting mode, performs a next booting in a second booting mode that uses a suspend image stored in the non-volatile memory. In response to power being supplied by the power supply unit, performing booting in a first booting mode that uses a suspend image stored in the volatile memory; and in response to an error occurring in the first booting mode, performing a next booting in a second booting mode using a suspend image stored in the non-volatile memory.10-25-2012
20110231638Preinstalled operating system instances stored on removable storage devices - One or more removable storage devices inserted into a computing device store a number of different preinstalled operating system instances. The computing device has a number of logical partitions. Each logical partition is independently executed on the computing device. Each logical partition is mapped to and uses one of the different preinstalled operating system instances. As such, a given preinstalled operating system instance to which a given logical partition is mapped is used by the given logical partition without ever having to be installed on the given logical partition.09-22-2011
20110238972Secure Bootstrapping for Wireless Communications - A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF generates an authentication challenge and sends it to the MT under a server-authenticated public key mechanism. The MT receives the challenge and determines whether it originates from the BSF based on a bootstrapping server certificate. The MT formulates a response to the authentication challenge based on keys derived from the authentication challenge and a pre-shared secret key. The BSF receives the authentication response and verifies whether it originates from the MT. Once verified, the BSF and MT independently calculate an application security key that the BSF sends to a requesting network application function to establish secure communications with the MT.09-29-2011
20110238971Method of managing a solid state drive, associated systems and implementations - One embodiment of a method includes loading, by a memory controller, a boot image from a solid state drive to an operating memory of a computing system during an initialization operation of the computing system. The initialization operation initializes components of the computing system.09-29-2011
20120278604CONTROL METHOD APPLIED TO COMPUTER SYSTEM IN HYBRID SLEEP MODE - A control method applied to a computer system in a hybrid sleep mode is provided. The control method includes following steps: entering a first sleep mode of the computer after a system parameter is stored in a memory and a hard drive of the computer system; determining whether the computer system is resumed or not in a predetermined first period in the first sleep mode, if true, resuming the computer system by reading the system parameter from the memory; if false, entering a second sleep mode of the computer system; determining whether the computer is resumed or not in the second sleep mode; if true, resuming the computer system by reading the system parameter from the hard drive; and if false, keeping the computer system in the second sleep mode.11-01-2012
20120278603DISPLAY DEVICE, REMOTE CONTROLLER, BOOTING METHOD OF THE DISPLAY DEVICE, AND METHOD FOR TRANSMITTING BOOT CONTROL SIGNAL - A display device, a remote controller, a booting method of the display device, and a method for transmitting a boot control signal are disclosed, in which a communication module receives a first booting mode signal and a second booting mode signal, and a controller controls booting in a first booting mode, upon receipt of the first booting mode signal and controls booting in a second booting mode, upon receipt of the second booting mode signal.11-01-2012
20120278602ELECTRONIC APPARATUS AND METHOD FOR PROVIDING FIRMWARE THEREOF - An electronic apparatus and a method for providing firmware thereof are provided. The electronic apparatus includes a plurality of components which perform a function of the electronic apparatus; a common memory unit which stores respective firmware for each of the plurality of components; a system bus which connects the plurality of components with the common memory unit; and a control unit which transmits from the common memory unit, after an apparatus boot, firmware corresponding to each of the plurality of components, wherein the plurality of components each establish respective connections to the system bus by executing a boot code when the electronic apparatus is booted.11-01-2012
20120278606METHODS AND APPARATUSES FOR SECURELY OPERATING SHARED HOST DEVICES WITH PORTABLE APPARATUSES - The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable apparatus includes a data storage unit which stores an operating system and other software. In one example, a portable apparatus can provide a virtual operating environment on top of a host's operating system for a host device. In another example, a portable apparatus containing its operating system can directly boot a host device with one or more hardware profiles. Furthermore, a device-dependent protection against software piracy, a user-dependent protection against sensitive data leaks, a controllable host operating environment to prevent unwanted information exposure, and a secure restoration procedure to prevent virus infection between the host device users may be incorporated. Moreover, an authorization signature may also be utilized to authorize a connected-state guest operation environment in the host device.11-01-2012
20120278605PORTABLE STORAGE DEVICE COMMUNICATING VIA A USB 3.0 PROTOCOL AND A COMPUTER SYSTEM HAVING THE SAME - The present invention relates to a portable storage device communicating via a USB 3.0 protocol and a computer system having the same. The computer system according to one embodiment of the present invention comprises a portable storage device and a computer. The portable storage device includes an operating system (OS) storage region for storing OS data and boot data which are not sent to the computer through a transmission channel used for data transmission via the USB 3.0 protocol, requested by a receiving channel used for receiving data via the USB 3.0 protocol, and loaded on the computer to drive the computer.11-01-2012
20120278599SYSTEM AND METHOD FOR AUTOMATED NETWORK CONFIGURATION - A method of configuring a data network with a controller, the data network including a plurality of hosts each associated with at least one of a plurality of switches, the method including receiving a request to boot an operating system image on one of the plurality of hosts, the operating system image having network connectivity requirements. Further, the method includes selecting a host out of the plurality of hosts on which to boot the operating system image. The method also includes booting the operating system image on the host, and configuring a switch out of the plurality of switches associated with the host based upon the network connectively requirements of the operating system image. Additionally, the method includes configuring networking attributes of a network interface in the host based upon the network connectivity requirements of the operating system image.11-01-2012
20120089827COMPUTING DEVICE AND METHOD TO REDUCE THE TIME NEEDED FOR THE DEVICE TO START - One example of the invention operates during the device shut-down procedure, to generate a merged command list containing the components from the various individual static command lists. The generated merged command list is then stored in non-volatile memory, and subsequently accessed on the next device start-up to control the launching of required software components. In this way, only one command list, being the merged command list, need be processed on device start-up, and hence device start-up time is reduced.04-12-2012
20120089826METHODS OF OPERATING MEMORY DEVICES AND ELECTRONIC SYSTEMS HAVING MEMORY DEVICES - Methods of operating memory devices and electronic systems having memory devices include initiating a boot mode of operation of the memory device in response to receiving a first command, wherein the first command comprises a pattern of two or more command signals, and terminating the boot mode of operation in response to receiving a second command, wherein the second command comprises a pattern of two or more command signals.04-12-2012
20120089825APPARATUS AND METHOD FOR GENERATING A BOOT IMAGE THAT IS ADJUSTABLE IN SIZE - A technique for reducing a size of a snapshot boot image by adjusting a structure of the snapshot boot image based on an analysis of a computing system. In addition, according to the technique, the overriding portions of a snapshot based boot image may be loaded first in consideration of a time of use of the system, and therefore a boot time can be reduced.04-12-2012
20110276796LOADING A PLURALITY OF APPLIANCES INTO A BLADE - A method for enabling a plurality of software appliances to be dynamically loaded onto a blade is described. During run-time and in response to receiving one or more sets of appliance loading instructions corresponding to one or more appliances, the one or more appliances is downloaded. Each appliance has a capability different from each other. The one or more appliances that are downloaded are stored at a first set of locations on a data store. Each of the first set of locations is different from each other. A first appliance of the one or more appliances that are stored is then installed at a second location on the data store. Then, the first appliance that is installed is booted on the blade.11-10-2011
20110276795INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - A method to allow a value to be written into one PCR domain, only if values from a second PCR domain are valid, thus ensuring the extension of the chain of trust between domains.11-10-2011
20120331281METHOD AND SYSTEM FOR POWER MANAGEMENT FOR A HANDHELD MOBILE ELECTRONIC DEVICE - Methods and systems for trusted boot using an original design manufacturer secure partition using execute-in-place non-volatile memory (XIP NVM) can include forming a secure partition within the XIP NVM and loading an initial program load within the secure partition wherein the initial program load comprises computer instructions which when executed by a processor causes the processor to perform operations comprising a trusted boot. Other embodiments are disclosed.12-27-2012
20120331280ELECTRONIC DEVICE AND METHOD FOR BURNING FIRMWARE TO EMBEDDED DEVICE - In a method of burning a firmware to an embedded device, a booting file is firstly created and saved in the firmware. The booting file includes a boot loader, a first kernel, a second kernel, a first initrd, a second initrd of a firmware, a rootfs, and an application program. The method burns the boot loader, the first kernel, the second kernel, the first initrd, and the second initrd in a flash memory of the embedded device. When the rootfs and the application program are recorded in a storage system of the embedded device, the method downloads the rootfs and the application program from a storage system of the embedded device, and burns the rootfs and the application program to a register of the flash memory.12-27-2012
20110320798Providing Silicon Integrated Code For A System - In one embodiment, a semiconductor integrated code (SIC) may be provided in a binary format by a processor manufacturer. This SIC may include platform independent code of the processor manufacturer. Such code may include embedded processor logic to initialize the processor and at least one link that couples the processor to a memory, and embedded memory logic to initialize the memory. Other embodiments are described and claimed.12-29-2011
20110320797METHOD AND SYSTEM FOR REDUCING AN IMPACT OF MALWARE DURING A BOOTING SEQUENCE - Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions.12-29-2011
20110320801INFORMATION PROCESSING APPARATUS AND START-UP METHOD - An information processing apparatus includes, a processer, a non-volatile memory to store a plurality of programs, a volatile memory to store at least one program executed by the processor and data accessed by the program, an acceptance unit to accept context information when power supplied to the processor is resumed from a state in which power supplied to the processor is interrupted while a power supplied to the volatile memory is maintained, a selection unit to select one program from the plurality of programs stored in the non-volatile memory based on context information accepted by the acceptance unit, and a program determination unit to determine whether the one program selected by the selection unit is stored in the volatile memory. When the processor determines the one program selected by the program determination unit is stored in the volatile memory, the processor starts the one program stored in the volatile memory.12-29-2011
20110320800System And Method For Booting A Computer System Using Preboot Data - Exemplary embodiments of the present invention disclosed herein relate to a method of booting a computer system using preboot data. A method in accordance with an exemplary embodiment of the present invention comprises transmitting a boot request and receiving, in response to the boot request, a boot loader that is adapted to read preboot data. The exemplary method may additionally comprise transmitting a request for boot data corresponding to the preboot data, receiving boot data corresponding to the preboot data, and booting the computer system using the boot data.12-29-2011
20110320799APPARATUS AND METHOD FOR NETWORK DRIVER INJECTION INTO TARGET IMAGE - A method provides network driver injection into a target image to transform the target image to be compatible with one or more source machines, for facilitating operating system streaming over a network. The method may include: facilitating access to a source system registry file of a source machine; facilitating access to a target system registry file of the target image, without copying the target image; determining whether source network interface cards of the source machine are compatible with the target image; and if the source network interface cards are not compatible with the target image, performing network interface driver injection into the target image. The target image may include an operating system. A machine-readable storage medium and apparatus are provided. A method is described for building a program for providing network driver injection into a target image to transform the target image to be compatible with computing machines.12-29-2011
20110320796REDUNDANT POWER SUPPLY CONFIGURATION FOR A DATA CENTER - A redundant power supply configuration for a data center is provided. A method includes receiving instructions to operate power supplies at a high current mode. An individual current for each of the power supplies is calculated to total a high current at the high current mode. The power supplies are operated at the high current mode to provide the high current at the high current mode. In response to operation at the high current mode being complete, the power supplies are operated at a normal mode to provide a normal current at the normal current mode.12-29-2011
20120102313SECURE BOOT METHOD AND SECURE BOOT APPARATUS - A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may be not present, not authorised, or not correctly operating.04-26-2012
20120102314SMART PHONE SYSTEM AND BOOTING METHOD THEREOF - The present invention provides a smart phone system, which includes a memory for storing operating systems. The memory includes: a boot zone for storing a boot load program for initialization and loading a selected bootloader into a RAM when a system hardware is powered up; bootloader zones of at least two operating systems for respectively store the bootloader of the first operating system and the second operating system; binary code zones of the at least two operating systems for respectively store binary codes of the first operating system and the second operating system. An arbitrary operating system can be selected to boot among various operating system when booting the smart phone system. Therefore, adaptability and extendibility of the smart phone can be increased without the costs of adding a hardware.04-26-2012
20120102312DECOUPLED HARDWARE CONFIGURATION MANAGER - The present disclosure relates to a technique or device to allow hardware related drivers to present a centralized configuration program and, more particularly, to a technique or device to allow hardware related drivers to present configuration information to a centralized user interface manager.04-26-2012
20120102311System and Method for Configuring Option ROM - An information handling system includes a processor, a first memory, a device, and a management controller that includes a second memory. The management controller obtains configuration data for the device and stores the configuration data in the first memory while the processor is powered off, and configures the device based upon the configuration data from the first memory in response to booting the information handling system.04-26-2012
20120102310MEMORY SYSTEM AND RESET METHOD THEREOF - Provided is a memory system that includes at least one nonvolatile memory device, a plurality of power lines and a plurality of power domains. The power lines receive a power source voltage. The power domains are respectively connected to the power lines. A reset signal is generated by using voltages which are detected from the power lines. The memory system and a reset method thereof detect the voltages of all power lines to generate a reset signal, and thus enhance reliability of data when a power is shut off.04-26-2012
20120102309PREBOOT EXECUTION ENVIRONMENT TEST DEVICE AND METHOD - A preboot execution environment (PXE) test device includes a microprocessor, one or more indicators, a network interface, a power connector, and a storage device. The network interface connects the PXE test device with a computer. The power connector connects an external power source to supply a voltage to the PXE test device. The storage device stores a boot loader, an embedded operating system, and one or more programs. The microprocessor executes the boot loader and the embedded operating system to start the PXE test device. The one or more indicators indicate a power supply status and a starting status of the PXE test device. The microprocessor further executes the one or more programs to remotely boot the computer for test PXE of a network card in the computer.04-26-2012
20120102308BOOTSTRAP SYSTEM FOR DUAL CENTRAL PROCESSING UNITS - A bootstrap system for dual central processing units includes a south bridge, a first central processing unit, a second central processing unit and a switch control module. The south bridge provides enable signals and reset signals, the first central processing unit provides an identification signal and an operation signal. The second central processing unit receives the enable signals and reset signals. The switch control module receives the identification signal and the operation signal from the first central processing unit to generate a corresponding switch command signal. The south bridge is selectably and electrically connected to the first central processing unit or the second central processing unit under the control of switch command signal.04-26-2012
20120102307METHOD AND APPARATUS INCLUDING ARCHITECTURE FOR PROTECTING SENSITIVE CODE AND DATA - A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure execution environment to run sensitive code, for example, code associated with copy protection schemes established for content consumption. The SAMU architecture allows for hardware-based secure boot and memory protection and provides on-demand code execution for code provided by a host processor. The SAMU may boot from an encrypted and signed kernel code, and execute encrypted, signed code. The hardware-based security configuration facilitates preventing vertical or horizontal privilege violations.04-26-2012
20120290826BOOTING IN SYSTEMS HAVING DEVICES COUPLED IN A CHAINED CONFIGURATION - The present disclosure includes methods, devices, and systems for booting in systems having devices coupled in a chained configuration. One or more embodiments include a host and a number of devices coupled to the host in a chained configuration, wherein at least one of the number of devices is a bootable device and the at least one bootable device is not directly coupled to the host.11-15-2012
20090024843COMPUTER HAVING FLASH MEMORY AND METHOD OF OPERATING FLASH MEMORY - Provided is a method of variably establishing storage areas of a flash memory according to the status of a system in a computer having flash memory in which booting data and execution data are stored. The computer includes: a flash memory including a storage area that is divided into a boot area for storing booting data and a cache area for storing execution data, and supplementing a reading speed of a main storage device; a flash controller designating a location to which the data stored in the flash memory is written; and a main controller calculating an area ratio of the flash memory according to the operating status of a PC, controlling the flash controller, and reestablishing the area ratio between the boot area and the cache area.01-22-2009
20100199081APPARATUS AND METHOD FOR DOWNLOADING CONTENTS USING AN INTERIOR MASS STORAGE IN A PORTABLE TERMINAL - A method and apparatus for downloading content to a large-capacity internal memory in a portable terminal are provided. The method includes performing a booting process of the portable terminal at the occurrence of a booting event, examining whether a Universal Serial Bus (USB) port is enabled during the booting process, if the USB port is enabled, receiving data through the USB port before driver loading, and storing the received data into the large-capacity internal memory and performing the booting process.08-05-2010
20100199079ROUTER DEVICE - The router device is able to use either battery power or a commercial power supply, and when using battery power detects battery voltage and indicates the level of battery voltage with an LED. When the router device is using battery power, writing of the firmware is disabled. Further, writing of settings information write is disabled when battery voltage goes below a second threshold value; and supply of power to the CPU is subsequently interrupted when battery voltage goes below a first threshold value. In this way the router device of the invention avoids problems occurring due to a drop in battery voltage when using battery power.08-05-2010
20130013904MOBILE COMPUTER CONTROL OF DESKTOP INPUT/OUTPUT FEATURES WITH MINIMAL OPERATING SYSTEM REQUIREMENT ON DESKTOP - A mobile device such as a smart phone can be connected to the USB port of a computer such as a laptop to charge the battery of the mobile device and to synchronize data. Also, when a special button is pressed the computer enters a mobile device support mode in which the computer processor does not boot the full service O.S. but only a small O.S., with the mobile device sending demanded images and sounds to the larger display and speakers of the computer and receiving input from the more capable keyboard of the computer so that a user can use the resources of the computer in operating the typically more limited mobile device.01-10-2013
20130013907WIRELESS ROUTER REMOTE FIRMWARE UPGRADE - A wireless router receives a firmware update from a remote server, and destructively overwrites router firmware in flash memory in a chunk-wise manner, and then writes a kernel memory before going live with upgraded firmware. Some routers authenticate the firmware image. In some cases, image chunks are re-ordered into an executable order after receipt and before finishing their final arrangement in the flash memory. In some routers, a maximum firmware image size is at least two chunk sizes smaller than the flash memory storage capacity. Some routers remap ROM to RAM memory. Some decompress data from flash into a RAM. Some save text file configuration settings in flash before rebooting. Some detect a user's inactive billing status and redirect a web browser to a billing activation page.01-10-2013
20130013906SYSTEM AND METHOD FOR VALIDATING COMPONENTS DURING A BOOTING PROCESS - A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting a power up signal and in response to detecting the power up signal, progressively determining whether software components of the computing device are valid. If the software components are determined to be valid, the computing device may be permitted to move to an operational state. If, however, at least some of the software components are determined to be not valid, the computing device may be prevented from moving to the operational state. In one arrangement, if the computing device is prevented from moving to the operational state, corrective action can be taken in an effort to permit the computing device to move to the operational state.01-10-2013
20130013910METHOD AND DEVICE FOR OPTIMIZING LOADING AND BOOTING OF AN OPERATING SYSTEM IN A COMPUTER SYSTEM VIA A COMMUNICATION NETWORK - The subject of the invention is in particular the optimization of the loading and booting of an operating system of a computer system via a communication network to which at least one server is connected. Said server comprises at least one image of a kernel of a minimal operating system and an image of an associated file system. The method comprises steps of loading said image of said kernel (01-10-2013
20130013908PARALLELIZING MULTIPLE BOOT IMAGES WITH VIRTUAL MACHINES - A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances.01-10-2013
20100131747INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing system includes a first information processing apparatus and a second information processing apparatus being compatible therewith. A second semiconductor memory is configured to include a first semiconductor memory, and both of the first semiconductor memory and the second semiconductor memory are able to be detached to and attached from the first information processing apparatus and the second information processing apparatus. Each of the first semiconductor memory and the second semiconductor memory receives an encrypted command from the attached information processing apparatus in a secure mode, and transmits encrypted data according to the decrypted command. Furthermore, an area only provided to the second semiconductor memory is made accessible by the second information processing apparatus.05-27-2010
20130019088METHOD FOR ESTABLISHING A WIRELESS LINK FOR A COMPUTER - Establishing a wireless link for a computer includes executing a basic input output system (BIOS), using a wireless module built in the computer to scan at least one nearby access point when executing the BIOS, and linking the wireless module to an access point of the at least one access point. Because the computer can scan nearby access points with the built in wireless module when executing the BIOS, an access point can be linked by the wireless module before an operating system is initialized.01-17-2013
20110161651DETERMINING ELECTRICAL COMPATIBILITY AND/OR CONFIGURATION OF DEVICES IN A PRE-BOOT ENVIRONMENT - In at least some embodiments, a system comprises a plurality of electrical devices and management logic coupled to the electrical devices. While the electrical devices are each in a pre-boot environment, the management logic obtains information from the electrical devices and uses the information to determine electrical compatibility of, and/or configure, the electrical devices.06-30-2011
20110161647BOOTABLE VOLATILE MEMORY DEVICE, MEMORY MODULE AND PROCESSING SYSTEM COMPRISING BOOTABLE VOLATILE MEMORY DEVICE, AND METHOD OF BOOTING PROCESSING SYSTEM USING BOOTABLE VOLATILE MEMORY DEVICE - A bootable volatile memory device comprises a volatile memory area configured to be written to and read from by a host processor, a boot code area configured to store bootstrap code before a boot procedure is performed by the host processor, a first chip select terminal configured to output a signal used as a chip select signal where the host processor performs the boot procedure by reading the bootstrap code from the boot code area, and a second chip select terminal configured to output a signal used as a chip select signal where the host processor writes and reads data to and from the volatile memory area.06-30-2011
20110161645CONTENT SECURING SYSTEM - In a method for securing content in a system containing a security processor configured to control access to the content by a main processor, in which main processor being configured to send heartbeats to the security processor, a determination as to whether at least one heartbeat was received within a predicted time interval is made and in response to a determination that at least one heartbeat was not received with the predicted time interval, access to the content by the main processor is ceased.06-30-2011
20130024681SYSTEMS AND METHODS FOR ACTIVATION OF APPLICATIONS USING CLIENT-SPECIFIC DATA - Example embodiments relate to activation of an application included on a shared virtual disk using client-specific data. In particular, example embodiments retrieve, from a client-specific location on a virtual disk server, activation credentials generated in response to successful activation of the application during a previous boot Example embodiments then reinstall the application activation credentials to verify activation of the application for the particular client computing device.01-24-2013
20130024680ATOMIC SWITCHING OF IMAGES IN DESKTOP STREAMING OVER WIDE AREA NETWORKS - A method for replacing a current desktop image having a current operating system on storage media for a computing device is described. In the method, an agent process is executed on the computing device for downloading from a server to a staging area on local storage media a replacement desktop disk image having a replacement operating system. The replacement desktop image includes a prefetch set of files and metadata for additional files, the prefetch set of files including a minimal set of files necessary to boot the replacement operating system, the replacement desktop image not including contents of the additional files. The computing device is rebooted to replace the current desktop image with the replacement desktop image. The computing device is then rebooted again to load the replacement operating system using the prefetch set of files.01-24-2013
20130024679INFORMATION RECORDING APPARATUS - An information recording apparatus has a drive unit to record digital information including digital contents; and a host unit to control reading and writing of the digital information for the drive unit. The host unit has a network processing unit to communicate with a server, a shadow determination unit to determine whether a shadow boot program to be executed prior to a boot program is executable, a shadow reading unit to read the shadow program from the drive unit when the shadow determination unit determines to be executable, a shadow execution unit to execute the shadow program, a server authentication unit to perform authentication with the server in accordance with a processing of the shadow program, and a password transmitter to transmit to the drive unit a password used for unlock of the drive unit when the authentication with the server is successful.01-24-2013
20130173898SECURE BOOT OF A DATA BREAKOUT APPLIANCE WITH MULTIPLE SUBSYSTEMS AT THE EDGE OF A MOBILE DATA NETWORK - A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform modules (TPM) to secure multiple subsystems. Further described is utilizing a first TPM to boot a service processor and then utilizing a second TPM to secure boot two additional subsystems. Booting of the final subsystem is accomplished in a two step process which first loads a boot loader and verifies the boot loader, and then second loads an operating system load image and verifies the operating system code.07-04-2013
20130173899Method for Secure Self-Booting of an Electronic Device - The present invention relates to a method for a self-boot of an electronic device, wherein an external component is accessible through an interface of the electronic device (07-04-2013
20080256351BIOS configuration and management - The present invention provides a system and method for a modular and enhanced kernel device manager (KDM). KDM is passed control during POST after Enhanced Device Initialization Manager (eDIM) has performed device initialization. KDM configures and manages all the devices enumerated by the eDIM. KDM groups these devices into Input Device, Output Device and/or Storage Device classifications and links them with proper class specific kernel (Input Kernel, Output Kernel, and Storage Kernel) through an Input Pipe, Output Pipe, and/or Storage Pipe.10-16-2008
20080244257Server active management technology (AMT) assisted secure boot - In some embodiments, the invention involves a system and method relating to secure booting of a platform. In at least one embodiment, the present invention is intended to securely boot a platform using one or more signature keys stored in a secure location on the platform, where access to the signature is by a microcontroller on the platform and the host processor has no direct access to alter the signature key. Other embodiments are described and claimed.10-02-2008
20080244254MULTI-MODE COMPUTER OPERATION - A mobile device, such as a laptop or notebook computer, capable of booting from at least two environments. If a remote environment is present, the mobile device may boot from the remote environment. The mobile device may also boot from the local environment.10-02-2008
20130173900KEY TRANSMISSION METHOD AND DEVICE OF A VIRTUAL MACHINE UNDER FULL DISK ENCRYPTION DURING PRE-BOOT - The disclosure provides a key transmission method and device of a virtual machine under full disk encryption during pre-boot. The method includes: pre-booting the virtual machine, where the virtual machine is in a full disk encryption state; during the pre-boot, establishing, by the virtual machine, a transmission channel with a cloud platform, where the cloud platform is configured to provide a key; requesting, by the virtual machine, the key from the cloud platform through the transmission channel, and receiving the key sent by the cloud platform; and decrypting, by the virtual machine, an operation system by using the key, and booting the operation system. In embodiments of the present disclosure, key transmission may be implemented during a pre-boot phase of the virtual machine, so as to boot the virtual machine.07-04-2013
20110246760ELECTRONIC DEVICE AND ELECTRONIC DEVICE SYSTEM - According to one embodiment, an electronic device system includes a first controller and an electronic device. The first controller includes a command terminal for outputting a command to an electronic device and a plurality of data terminals for transmitting/receiving data. The electronic device coupled to the first controller via the command terminal and the data terminals, the electronic device stores a boot information, wherein when power is turned on, the first controller generates a signal and supplies the signal from one of the data terminals to the electronic device, and receives the boot information read from the electronic device in accordance with the signal.10-06-2011
20110246759METHOD FOR BOOSTING AN ELECTRONIC DEVICE WITH MULTIPLE PROCESSING UNITS, AND ELECTRONIC DEVICE FOR IMPLEMENTING THE SAME - A method for reducing booting time is to be implemented by an electronic device including first and second processing units, a cache memory, and a storage medium. The method includes the steps of: configuring the first processing unit for executing a set of program instructions for initializing hardware equipments of the electronic device; configuring the first processing unit for loading at least one library from the storage medium into the cache memory after initializing the hardware equipments of the electronic device, the at least one library being specified for use by the second processing unit; and configuring the second processing unit for booting a kernel of an operating system associated with the second processing unit after initializing the hardware equipments of the electronic device.10-06-2011
20110246758MEDIA DATA PLAYBACK DEVICE AND REBOOT METHOD THEREOF - A media data playback device comprises first and second nonvolatile memories. The first nonvolatile memory stores a boot loader and a kernel of an operating system in a compressed format. The second nonvolatile memory serves as a main memory of the device. A processor executes the boot loader to load and decompress the kernel from the first nonvolatile memory to the second nonvolatile memory in response to a boot command. When receiving a shutdown command, the processor determines whether to perform a portion of bootstrapping processes of the device in response to the shutdown command before actually shutdown the device.10-06-2011
20110246757UNATTENDED SECURE REMOTE PC CLIENT WAKE, BOOT AND REMOTE LOGIN USING SMART PHONE - Methods and systems to allow an authorized user to remotely awaken, boot, and login to a computer in a secure manner. The user and computer may communicate using a short message service. (SMS). The user may communicate with the computer using a mobile device, such as a smart phone. The user may initially provide a wake-up message to the computer, which may then respond by asking for one or more boot passwords. In an embodiment, these boot passwords may be basic input/output system (BIOS) passwords that are required for the loading and operations of the computer's BIOS. The user may then provide these one or more passwords to the computer. The computer may further request an operating system (OS) login password. The user may then provide this password to the computer. In an embodiment, all passwords may be provided to the computer in encrypted form. Moreover, authentication measures may be used to provide assurance that the user is legitimate.10-06-2011
20110246756PROTOCOL FOR AUTHENTICATING FUNCTIONALITY IN A PERIPHERAL DEVICE - A protocol provides authentication of peripheral devices by a computing device to which the peripheral device connects. Computing devices include a verifier with a public key that authenticates multiple associated private keys. Private keys are embedded on peripheral devices. When the verifier is able to authenticate a connected peripheral, particular functionality is enabled that may not be enabled for peripherals that do not authenticate.10-06-2011
20110246755Method and System for Automated Operating System Image Loading - A method, system, and article for dynamic management of two or more operating system images for at least two client machines operating in a computer system sub-network. Different physical areas of the sub-network support separate image of the operating system images. As the client machines may be individually subject to movement within the sub-network, an appropriate operating system image is dynamically selected and uploaded to one or more of the individual client machines based upon the physical location thereof.10-06-2011
20080222409Memory access system and memory access method thereof - A memory access system for accessing a basic input output system (BIOS) program is provided. The memory access system includes a flash memory, a CPU, a peripheral component interconnect (PCI) slave, an address converter and a flash memory controller. The flash memory stores a number of BIOS data of the BIOS program, and each BIOS data corresponds to a default BIOS address and is allocated in a flash memory type BIOS address. The CPU delivers a BIOS access instruction. The BIOS access instruction corresponds to a default target address of the default BIOS addresses. After the PCI slave interprets the BIOS access instruction, the address converter converts the default target address into a flash memory type target address, which is one of the flash memory type BIOS address. The flash memory controller accesses the BIOS data allocated at the flash memory type target address accordingly.09-11-2008
20080222408CIRCUIT FOR PROTECTING MOTHERBOARD - A circuit for protecting a motherboard includes a power button (09-11-2008
20080222407Monitoring Bootable Busses - A security circuit in a computer monitors data busses that support memory capable of booting the computer during the computer reset/boot cycle. When activity oil one of the data busses indicates the computer is booting from a non-authorized memory location, the security circuit disrupts the computer, for example, by causing a reset. Execution from the non-authorized memory location may occur when an initial jump address at a known location, such as the top of memory, is re-programmed to a memory location having a rogue BIOS program.09-11-2008
20130179669TRUSTED NETWORK BOOTING SYSTEM AND METHOD - A system for trusted network booting of a server. The system may include a booting server that may contain a booting image and a network server that may boot with the booting image from the booting server. The network server may include a trust anchor that measures the booting image. The system may further include a network controller that controls access to a network. The network controller may verify the measurement of the booting image before allowing the network server to access the network.07-11-2013
20130179670BOOTING METHOD OF MULTIMEDIA DEVICE AND MULTIMEDIA DEVICE - A booting method of a multimedia device and the multimedia device are provided. The multimedia device includes a storage media, and the booting method of the multimedia device includes following steps. After the multimedia device is powered on, a boot loader is executed to initialize a plurality of primary components of the multimedia device. A snapshot information is read from the storage media, wherein the snapshot information includes a plurality of state information of an operating system (OS) and a plurality of applications of the multimedia device. The snapshot information is loaded into the multimedia device to allow the multimedia device to run the OS and the applications. Thereby, the number of booting steps of the multimedia device is reduced, and the booting time of the multimedia device is effectively shortened.07-11-2013
20130179671SUPER I/O MODULE AND CONTROL METHOD THEREOF - A super input/output (I/O) module for controlling a universal serial bus (USB) port of a computer system is provided. The super I/O module includes a USB host, a switch and a processor. The switch selectively couples the USB port of the computer system to the USB host or a controller of the computer system according to a switching signal. When a trigger event occurs, the processor provides the switching signal to control the switch, so as to couple the USB port of the computer system to the USB host and to transmit a basic input/output system (BIOS) code to a flash memory of the computer system via the switch and the USB port.07-11-2013
20130179672COMPUTER AND QUICK BOOTING METHOD THEREOF - A computer and a quick booting method thereof are disclosed. The computer includes a central processing unit (CPU), a volatile memory, a basic input/output system (BIOS) and a power module. The volatile memory is coupled to the CPU and stores operation status data when the computer is power on before the computer executes a shutdown process. the BIOS is coupled to the CPU, reads the operation status data from the volatile memory when the computer executes a booting process, and initialize the computer according to the operation status data. The power module is coupled to the volatile memory and provides power to the volatile memory when the computer finishes the shutdown process. Since the operation status data stored in the volatile memory do not disappear after the computer finishes the shutdown process, they can be used to boot up the computer quickly.07-11-2013
20130179673METHODS AND SYSTEMS FOR PROVIDING A MODIFIABLE MACHINE BASE IMAGE WITH A PERSONALIZED DESKTOP ENVIRONMENT IN A COMBINED COMPUTING ENVIRONMENT - A method and system for modifying, in a combined computing environment, a machine base image having a personalized desktop environment includes executing an operating system associated with a base disk; intercepting, by a filter driver, an instruction from at least one of a plurality of resources to modify a setting stored in at least one of a file system and a registry, the plurality of resources executing inside an isolation environment; storing, in a delta disk, a copy of the modified setting; restarting the operating system; replacing the setting stored in the at least one of the file system and the registry with the copy of the modified setting stored on the delta disk; and restarting at least one operating system process incorporating the modified setting.07-11-2013
20120254601DISK DRIVE BOOTING FROM VOLATILE SEMICONDUCTOR MEMORY WHEN EXITING POWER SAVE MODE - A disk drive is disclosed comprising a head actuated over a disk, a first volatile semiconductor memory (VSM), and a second VSM. When the disk drive is powered on, control circuitry first reads VSM initialization code from the disk, first initializes the first VSM using the VSM initialization code, stores the VSM initialization code in the second VSM, and then enters a power save mode. When exiting the power save mode, the control circuitry second initializes the first VSM using the VSM initialization code stored in the second VSM.10-04-2012
20110271089Server Apparatus and Startup Control Method - According to one embodiment, a server apparatus includes a communication processor, a database and a controller. The communication processor starts up based on a startup program recorded in a processing memory, and performs a communication processing based on a service program recorded in the processing memory, after startup. The database stores the startup program in association with a first directory for specifying a first memory area, and stores the service program in association with a second directory for specifying a second memory area different from the first directory, The controller refers to the second directory stored in the database after the startup program starts, and reads the service program from the database based on the referred result, and further, records the read program in second memory area of the processing memory.11-03-2011
20080215871Swapping "Fixed System" Hard Disk - Method for ‘Cool-Swap’, ‘Warm-Swap’ and ‘Hot-Swap’ of ‘Fixed’ ‘System’ hard disk(s) in and out of the computer and for re-cycling the computer between ‘diskly’ state to ‘diskless’ state by combining the following features in one way or the other: separating the power supply of the ‘Fixed’ ‘System’ hard disk(s) from the internal power supply that is supplying power to other components of the computer, in particular the motherboard; taking the operating system, capable of being taken to run as ramdisk-based operating system, in control of the computer to run as ramdisk-based operating system; putting the computer into different power management states; and issuing commands or instructions for logical disconnection and/or re-connection of hard disk(s).09-04-2008
20130138942Method for Preconfiguring an Appliance, and Method for Starting Up the Appliance - A method for preconfiguring an appliance having a configuration memory configured to have information written to it when the appliance is in a deactivated state, wherein the appliance is configured to make contact with at least one further appliance during operation, includes capturing a data record from the appliance, wherein the data record contains at least identification data from the appliance. The method further includes determining a piece of configuration information from the appliance by using the data record and at least one data record from the at least one further appliance, and writing the configuration information to the configuration memory of the appliance in order to preconfigure the appliance.05-30-2013
20130091347AUTOMATED DOUBLE FIRMWARE UPGRADE - A downstream network device is booted into a final provisioned state by retrieving a configuration file a first time from an upstream network device, and checking if a currently booted software load of the downstream device matches a first software load (EE) described by the configuration file. If the currently booted software load of the downstream device does not match the EE, the downstream network device checks if the configuration file includes a description of a second software load (NE), and if so, the downstream network device checks if the currently booted software load matches the NE, and if not, the downstream network device downloads the first software load, boots the first software load, and retrieves the configuration file a second time.04-11-2013
20130091346Code Updates in Processing Systems - A method for updating code images in a system includes booting a first image of a code with a sub-system processor, receiving a second image of the code, performing a security and reliability check of the second image of the code with the sub-system processor, determining whether the security and reliability check of the second image of the code is successful, storing the second image of the code in a first memory device responsive to determining that the security and reliability check of the second image of the code is successful, designating the second image of the code as an active image, and sending the second image of the code to a second memory device, the second memory device communicatively connected with the first memory device and a main processor.04-11-2013
20130091345AUTHENTICATION OF COMPUTER SYSTEM BOOT INSTRUCTIONS - Various systems, processes, and products may be used to authenticate computer system boot instructions. In particular implementations, a system, process, and product for authenticating computer system boot instructions may include the ability to determine, according to pre-boot computer system instructions, whether a public key associated with the boot instructions is authentic using a public key associated with a central processing unit. The system, process, and product may also include the ability to determine, if the public key associated with boot instructions is authentic, whether the boot instructions are authentic using the public key associated with boot instructions. The system, process, and product may further include the ability to launch the boot instructions if the boot instructions are authentic.04-11-2013
20130091344METHOD OF CONFIGURING MOBILE COMPUTING DEVICE - A method of storing configuration data for mobile computing devices can comprise the steps of providing a master configuration file including one or more parameter records and providing a device file including one or more device records. Each parameter record can map a parameter value to a parameter identifier. Each device record can map a parameter identifier to a mobile computing device identifier.04-11-2013
20130097412Performing A Boot Sequence In A Multi-Processor System - Methods, apparatuses, and computer program products for performing a boot sequence in a multi-processor system are provided. Embodiments include: in response to detecting initiation of a boot sequence of the multi-processor system, initializing, by a bootstrap processor (BSP), BSP memory associated with the BSP and initializing, by an application processor, memory associated with the application processor; determining, by the BSP, whether the initialization of the BSP memory is completed; and if the initialization of the BSP memory is completed, loading, by the BSP, an operating system on the BSP memory regardless of whether the application processor has completed initialization of the memory associated with the application processor.04-18-2013
20130097413COMPUTING DEVICE AND METHOD FOR CONTROLLING A STARTUP CURRENT OF A STORAGE SYSTEM - A method for controlling a startup current of a storage system using a computing device, the computing device detects a current of each storage device of the storage system when the storage system is turned on, and calculates the power drawn by each storage device according to the current of each storage device. If a sum of powers drawn by all the storage devices is greater than a predetermined value, the computing device turns off the storage system and determines a startup sequence of the storage devices and a startup time of each storage device. The startup time of each storage device is stored in a storage unit.04-18-2013
20130103937INFORMATION DEVICE, STORAGE MEDIUM AND INITIAL STATE RESTORATION METHOD - An information device has a storage medium storing information items which includes a first program provided on a first partition, a second program and data provided on a second partition to restore the first program on the first partition to a predetermined state, a boot block which causes system activation from one of the first partition and the second partition, and an active-partition switching program which indicates, to the boot block, one of the first and second partitions. An input/output system activates the active-partition switching program when a specific operation is performed. The active-partition switching program indicates to the boot block that system activation is to be executed from the second partition.04-25-2013
20130103936SYSTEM AND METHOD FOR PROVIDING A PARAMETER FOR AN APPLICATION OPERATING ON AN ELECTRONIC DEVICE - A system and method of activating a set up application operating on an electronic device are provided. The method comprises: upon activation of the electronic device, determining a state of initial configuration for the electronic device from configuration data stored in the electronic device; when the state of initial configuration of the electronic device indicates that the set up application had previously been initiated, presenting a GUI screen on the electronic device where an application operating on the electronic device and the set up application are displayed; and upon activation of the set up application, activating the set up application at a point in its operation based on the operation history.04-25-2013
20130103935METHOD AND SYSTEM FOR PROGRAMMABLE POWER STATE CHANGE IN A SYSTEM-ON-A-CHIP DEVICE - A method and system are set forth for enabling software control of a power management unit (PMU) in a System-On-a-Chip (SoC) device to effect changes in power state without having to adjust external board level states. In one embodiment, once the SoC system controller has been booted, it communicates with the PMU over a communication bus and is able to request changes in power states without requiring external trigger events. Complete remote control of power states according to the method and system set forth herein provides flexibility when debugging and testing SoC devices because there is no need to alter external board states. Also, providing programmable changes in reset states as an alternative to full system reset preserves state data so that the system can be restarted efficiently and quickly from known conditions.04-25-2013
20130124845EMBEDDED DEVICE AND CONTROL METHOD THEREOF - An embedded device including a random access memory (RAM) and a processor is provided. The processor includes a processor core and an authentication module. The RAM stores data-to-be-authenticated. The data includes a program code to be executed by the processor core. The authentication module periodically accesses and authenticates the data-to-be-authenticated in the RAM. When the authentication module deems that the program code in the RAM loses its integrity, the authentication module interrupts the processor from further executing the program code.05-16-2013
20130124842IMAGE FORMING APPARATUS AND METHOD OF BOOTING IMAGE FORMING APPARATUS HAVING HIBERNATION FUNCTION - A method of booting an image forming apparatus having a hibernation function. In the method, when booting of the image forming apparatus starts, whether a storage device has a defect is checked based on a flag indicating whether the hibernation function is activated, and a system of the image forming apparatus is booted using a stored boot image.05-16-2013
20130124844Dynamic Boot Image Streaming - The present disclosure describes apparatuses and techniques for dynamic boot image streaming. In some aspects a memory controller that is streaming multiple boot images from a first memory to a second memory is stalled, a descriptor for streaming one of the multiple boot images from the first memory to a non-contiguous memory location is generated while the memory controller is stalled, and the memory controller is resumed effective to cause the memory controller to stream, based on the descriptor generated while the memory controller is stalled, the second boot image to the non-contiguous memory location.05-16-2013
20130124843SECURE BOOT ADMINISTRATION IN A UNIFIED EXTENSIBLE FIRMWARE INTERFACE (UEFI)-COMPLIANT COMPUTING DEVICE - Firmware in a UEFI-compliant computing device is used to administer and alter a Secure Boot process for the computing device while continuing to provide protection from unauthorized third-party code.05-16-2013
20130124841OS Processing Method and System and Computer Readable Storage Medium Applying the Method - An operating system (OS) processing method for a host computer includes the following steps: when the host computer is booting, a boot loader is read from a boot reading device according to a boot priority order of the host computer. A signature detecting program included in the boot loader is executed to detect data stored in a specified address of a master boot record (MBR) of the host computer. When it is determined that the present version signature of the host computer does not match the preset version signature according to the data stored in the specified address, an OS image is read from the boot reading device, an OS is installed on the host computer according to the OS image. The data stored in the specified address of the MBR is amended according to an image version signature of the installed OS.05-16-2013
20130124840SECURE BOOT UP OF A COMPUTER BASED ON A HARDWARE BASED ROOT OF TRUST - A method includes performing a boot up of a computer having a system on-chip having multiple processors and a nonvolatile read-only machine-readable medium. The boot up includes enabling a first processor of the multiple processors, while maintaining others of the multiple processors in a disabled state. The boot up includes retrieving initial stage instructions from the nonvolatile read-only machine-readable medium. The boot up also includes executing the initial stage instructions and validating multiple stages of firmware separately. The boot up includes, in response to validating the multiple stages of firmware, executing the multiple stages of firmware in consecutive stages of the boot up, wherein executing of each stage of the multiple stages of firmware enables a different set of disabled hardware components of the computer. The boot up also includes validating an operating system and, in response to validation, transferring control of the computer to the operating system.05-16-2013
20130124846EXTERNAL BOOT DEVICE, PROGRAM PRODUCT, EXTERNAL BOOT METHOD, AND NETWORK COMMUNICATION SYSTEM - A USB memory (05-16-2013
20130132714APPARATUS AND METHOD TO DRIVE DEVICES - A device driving apparatus includes a storage unit to store a plurality of device driving programs, a plurality of devices to receive the plurality of device driving programs, and a switching unit to transfer the plurality of device driving programs.05-23-2013
20130132713ELECTRONIC EQUIPMENT, METHOD OF CONTROLLING ELECTRONIC EQUIPMENT AND CONTROL PROGRAM FOR ELECTRONIC EQUIPMENT - According to one embodiment, an electronic equipment includes: an application configured to operate an electronic equipment, which serves to instruct OS to start based on settings; an OS starting discriminating module configured to discriminate as to whether or not the OS is started based on instruction of start-up of the application; and a white list object discriminating module configured to discriminate whether or not the application is an object of the white list stored in advance when the OS is started based on instruction of start-up of the application, and configured to instruct refusal of access of the application from the OS when the application is not the object of the white list.05-23-2013
20130145141INFORMATION PROCESSING APPARATUS AND UPDATE PROCESS SUPPORT SYSTEM - An information processing apparatus includes a storage unit that stores reboot necessity information for respective versions of programs that are install targets of an electronic device, the reboot necessity information indicating whether the electronic device needs to be rebooted when a first program of a first version installed in the electronic device is updated to a second program of a second version; an extracting unit that extracts difference information indicating a difference between the first program and the second program in response to a request to acquire the second program, the request specifying the first version of the first program; a determining unit that determines whether the electronic device needs to be rebooted when the second program is installed, based on the difference between the first version and the second version indicated in the difference information and the reboot necessity information; and a responding unit that returns a determination result.06-06-2013
20130145139REGULATING ACCESS USING INFORMATION REGARDING A HOST MACHINE OF A PORTABLE STORAGE DRIVE - Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host machine. In accordance with some of the techniques described herein, when a portable storage drive that stores an operating system securely is to be accessed by a host machine, information regarding the host machine, such as information regarding the hardware of the host machine, may be retrieved and evaluated to determine whether to grant access to the host machine. When the host machine is granted access, the host machine may access secured data stored on the portable storage drive in any suitable manner. In some cases, accessing the secured data may include decrypting the secured data and transferring decrypted data to another storage of the host machine. The decrypted information may include an operating system that is booted by the host machine.06-06-2013
20110213954METHOD AND APPARATUS FOR GENERATING MINIMUM BOOT IMAGE - A boot image generating method including erasing code used to execute an application that is executing in a device at a predetermined time from a volatile memory of the device; storing data used to execute the application in a non-volatile memory; and generating a boot image including at least one selected from the group consisting of a code used to execute an Operating System (OS) of the device and data used to execute the OS at the predetermined time.09-01-2011
20080201570Apparatus, Method and Product for Selecting an iSCSI Target for Automated Initiator Booting - An apparatus, method and product for selecting an iSCSI target for us in automatically booting a remote initiator is disclosed. A policy engine is created for use in a discovery domain of an iSCSI device. A boot attribute setting within the policy engine is set for selecting an iSCSI target to allow the remote initiator to automatically log onto the selected target for booting.08-21-2008
20110225410ELECTRONIC DEVICE AND BOOTING UP METHOD - An electronic device includes a micro control unit (MCU), a non-volatile random access memory (NVRAM), and a watch dog. The electronic device detects a standby instruction and then enters a standby mode according to the standby instruction. A boot loader stored in the NVRAM boots the electronic device when the MCU detects a starting instruction. The electronic device triggers the watch dog to time a preset period when the boot loader boots the electronic device and boots up with a fast mode. The electronic device determines if the watch dog times out, and boots up with a normal mode when the electronic device does not boot up with the fast mode before the watch dog times out.09-15-2011
20110225407System and Method for Recovering From an Interrupted Encryption and Decryption Operation Performed on a Volume - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.09-15-2011
20110225405MANAGING A COMPUTING DEVICE - Methods, computer-readable media, and systems are provided for managing a target computing device. One method for managing the target computing device includes loading a service operating system into non-persistent memory of the target computing device having a persistent memory that is initially devoid of a functional operating system. The service operating system includes an embedded global shell agent. The global shell agent is executed thereby configuring the target computing device for remote management within an interactive command shell function before loading an operating system into persistent memory of the target computing device. The global shell agent is operable to examine and modify filesystems on the target computing device.09-15-2011
20080209198Boot Acceleration For Computer Systems - Boot acceleration for computer systems is disclosed. In an exemplary embodiment, a method of boot acceleration for a computer system may comprise monitoring data requests during a boot procedure. The method may also comprise pre-fetching data from a storage device during a subsequent boot procedure based at least in part on the monitored data requests. The method may also comprise accessing the pre-fetched data from a cache to accelerate the subsequent boot procedure.08-28-2008
20100287363METHOD AND SYSTEM FOR SECURE SOFTWARE PROVISIONING - A method and system for the provisioning of software that enable large scale installation and management of software in computer units in a highly secure manner. The BIOS of the target computer unit is adapted such that upon power up the system attempts to boot from an external media. The BIOS features functions within the code for the implementing a system watchdog for assuring the system remains in a known state, a function for digital signature verification, and loads drivers for a file system. The external media includes the operating system (OS) image and other bootstrap files, each having been digitally signed with an asymmetric private key that corresponds to the public key. A programmable read-only parameter memory on the motherboard is configured to store the public keys and the (failure) state of the system independently of the primary and secondary media enabling reboot from an alternative boot path.11-11-2010
20120278600SYSTEM AND METHOD FOR ACCELERATED BOOT PERFORMANCE - Systems, methods and products are described that provide accelerated boot performance. One aspect includes initiating a booting process of a user operating system of a computer system; identifying a non-critical hardware device set for start up according to the user operating system; excluding the non-critical hardware device; and completing the booting process to provide the user operating system without starting an excluded non-critical hardware device. Other embodiments are described.11-01-2012
20130151830MOUNT-TIME RECONCILIATION OF DATA AVAILABILITY - Systems and methods are disclosed for mount-time reconciliation of data availability. During system boot-up, a non-volatile memory (“NVM”) driver can be enumerated, and an NVM driver mapping can be obtained. The NVM driver mapping can include the actual availability of LBAs in the NVM. A file system can then be mounted, and a file system allocation state can be generated. The file system allocation state can indicate the file system's view of the availability of LBAs. Subsequently, data availability reconciliation can be performed. That is, the file system allocation state and the NVM driver mapping can be overlaid and compared with one another in order to expose any discrepancies.06-13-2013
20130151832FLASH MEMORY STORAGE SYSTEM AND DATA PROTECTION METHOD THEREOF - A flash memory storage system includes a flash memory, a host and a controller is provided. The controller couples to the host and the flash memory, and restricts the host to access the flash memory according to a state of the host. When the host is in a booting state or in a resetting state, the controller allows the host to access the flash memory. After the host completes a booting process or a resetting process, the controller restricts the host to access the flash memory so as to protect a data stored by the flash memory. Besides, a data protection method for which applied to the above-mentioned storage system is also provided in the present invention.06-13-2013
20130151829Multi-Chip Initialization Using a Parallel Firmware Boot Process - Mechanisms, in a multi-chip data processing system, for performing a boot process for booting each of a plurality of processor chips of the multi-chip data processing system are provided. With these mechanisms, a multi-chip agnostic isolated boot phase operation is performed, in parallel, to perform an initial boot of each of the plurality of processor chips as if each of the processor chips were an only processor chip in the multi-chip data processing system. A multi-chip aware isolated boot phase operation of each of the processor chips is performed in parallel, where each of the processor chips has its own separately configured address space. In addition, a unified configuration phase operation is performed to select a master processor chip from the plurality of processor chips and configure other processor chips in the plurality of processor chips to operate as slave processor chips that are controlled by the master processor chip.06-13-2013
20130151828CONSOLIDATED NOTIFICATIONS TO NFS CLIENTS - A computer implemented method, system and apparatus for rebooting a host having a plurality of network interfaces. A server reboots the host by stopping an NFS server process on the host. The server sends at least one consolidated notification to a plurality of clients identified in a consolidated notification table, wherein the consolidated notification comprises at least two addresses of network interfaces of the host. The server determines that an acknowledgement is received from each of the plurality of clients. The server halts resending of consolidated notifications, responsive to determining that an acknowledgement is received from the each of the plurality of clients.06-13-2013
20130151831Virtual Machine Monitor Bridge to Bare-Metal Booting - Mechanisms for executing a bare metal boot operation for bare metal booting a control program are provided. These mechanisms boot a computing device to a hypervisor ownership phase of the bare metal boot operation. During the hypervisor ownership phase of the bare metal boot operation a hypervisor is loaded and controls and manages platform hardware of the computing device. The computing device is then booted from the hypervisor ownership phase to a transition phase in which the hypervisor releases control and management of the platform hardware of the computing device to the control program. The computing device is then booted from the transition phase to a control program ownership phase in which the control program is in full control and manages the platform hardware. The bare metal boot operation is performed without restarting the computing device and without cycling through initialization of firmware.06-13-2013
20130151833BOOTING METHOD FOR LOW TEMPERATURE ENVIRONMENT AND ELECTRONIC APPARATUS THEREFOR - A booting method for low temperature environment and an electronic apparatus therefor are provided. The booting method includes the following steps: reading a booting process record from a memory unit of the electronic apparatus; executing a booting process according to the booting process record, wherein the booting process includes a plurality of booting subroutines; and when executing one of the booting subroutines, updating the booting process record stored in the memory unit of the electronic apparatus corresponding to the booting subroutine, wherein the booting subroutines include providing a power output by controlling a power supply unit of the electronic apparatus, and an output value of the power output gradually increases as executing the booting subroutines sequentially.06-13-2013
20130151834Deployment of a Software Image on Multiple Targets with Streaming Technique - Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver.06-13-2013
20130151835Deployment of a Software Image on Multiple Targets with Streaming Technique - Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver.06-13-2013
20130151836SEMICONDUCTOR DEVICE INCLUDING ENCRYPTION SECTION, SEMICONDUCTOR DEVICE INCLUDING EXTERNAL INTERFACE, AND CONTENT REPRODUCTION METHOD - A secure LSI device 06-13-2013
20100299510BLUETOOTH PRE-BOOT AUTHENTICATION IN BIOS - The disclosed invention includes, among other things, methods and techniques for controlling usage of a computing device in the form of a Bluetooth® capable portable electronic device that provides for authentication of the computing device prior to any operating system being loaded onto the computing device. The portable electronic device operates cooperatively with the computing device to provide authentication information, such as the portable electronic device's Bluetooth device information. Previously developed implementations have shortcomings especially in the degree of security provided that are overcome by the present invention, especially its operation in a pre-boot environment.11-25-2010
20100299513MEMORY APPARATUS AND METHOD THEREFOR - A memory apparatus and an operation of the memory apparatus which allow quick booting are provided. The memory apparatus includes a volatile memory, a non-volatile memory, and a memory control unit to control input/output of data stored in the volatile memory and the non-volatile memory. The memory control unit restores data, according to a control command input from outside of the memory apparatus, from the non-volatile memory to the volatile memory in an on-demand fashion during booting.11-25-2010
20100299511Method of Masking the End-of-Life Transition of an Electronic Device, and a Device Including a Corresponding Control Module - A method of masking the end-of-life transition of a microprocessor electronic device including reprogrammable non-volatile memory containing an end-of-life state variable. On booting, the value of the variable is loaded into RAM. After executing any current command, it is verified whether the value of the variable stored in RAM is FALSE. If the response is negative, the end-of-life transition is executed. Otherwise, initialization or execution of the command is continued. On detecting an intrusive attack, it is instantiated by writing the TRUE value to the end-of-life state variable in RAM only and then deferring writing of the TRUE value to the variable in the non-volatile memory until the next write operation. The invention is applicable to any electronic device, smart card, etc.11-25-2010
20120260080Method and Apparatus for Preprocessing Operations During a Boot Process - Various methods for preprocessing operations during a boot process are provided. One example method may include determining that a priority of operations being implemented by the processor at a particular time during the boot process is less than a threshold priority, and in response to determining that the priority of operations being implemented by the processor is less than the threshold priority, performing at least one operation during the boot process, in advance of a scheduled position within a sequence of operations. Similar and related example methods, example apparatuses, and example computer program products are also provided.10-11-2012
20090006836Information Processing Unit For Automatically Copying System Information - An information processing unit is provided, which includes a first memory, a second memory, and a controller. The first memory stores a BIOS program beforehand that is executed at a startup of the unit so as to allow peripheral devices to operate normally. The first memory also stores initial BIOS data beforehand. The second memory stores BIOS data with which the BIOS program is executed. The controller is configured to: (a) if the initial BIOS data is updated, read the updated BIOS data including updated data from the first memory and writes the updated BIOS data into the second memory; and (b) execute the BIOS program using the updated BIOS data written in the second memory.01-01-2009
20130205128Self-Updating Functionality in a Distributed System - Described is a technology by which a distributed system of computer nodes that provides services is self-updated via a component of the distributed system. Such a self-updating run applies one or more updates to each of the member computer nodes in the distributed system while maintaining the services provided by the distributed system. The updating run may include moving workloads from each computer node to be updated, updating that node, and reinstating workloads after updating. Performing the updating run may include moving update-related responsibility, which may be a workload, from one computer node to another computer node.08-08-2013
20130205129BASEBOARD MANAGEMENT CONTROLLER SYSTEM - A baseboard management controller (BMC) system for an electronic device includes a BMC, a multiplex switch, a manual operation element, a main storage, and a backup storage. Manual operations applied to the manual operation element are capable of selecting electrical connection statuses of the multiplex switch. Both the main storage and the backup storage store boot program of the electronic device. The BMC is selectively electrically connected to either the main storage or the backup storage via the multiplex switch and the manual operation element, and selectively calls the boot program stored in either the main storage or the backup storage to actuate the electronic device.08-08-2013
20130205130OPERATING SPEED OF A COMPONENT - Booting a computing machine including increasing an operating speed of at least one component of the computing machine during a boot process in response to the computing machine including a sufficient amount of thermal credits and decreasing the operating speed of at least one of the components in response to the computing machine completing the boot process08-08-2013
20100318781SECURE BOOT WITH OPTIONAL COMPONENTS METHOD - A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may not be present, not correctly authorized, or not correctly operating.12-16-2010
20100318780HIERARCHICAL SERVICES STARTUP SEQUENCING - Exemplary methods, system, and computer program product embodiments for managing services within a data storage subsystem using a processor in communication with a memory device during a startup sequence are provided. At least one service facilitated by a provider is provided. At least one requirement is linked to the at least one service. The at least one service and the at least one requirement are incorporated into a specification file. A directed acyclic graph, interrelating the at least one service and an additional service based on the at least one requirement, is constructed. The directed acyclic graph is traversed using an initialization process to generate a determination which of an available plurality of services to provide. The determination further includes an analysis of the which of the available plurality of services to provide in view of at least one hardware resource in the data storage subsystem.12-16-2010
20120284500ABSTRACTION OF COMPUTER DISK IMAGE CLONING CAPABILITIES FROM BOOTABLE MEDIA - A computer system and computer program product for implementing a method for configuring an improved computing system containing a first computing device. The method includes: creating a logical layer and a physical layer within the first computing device; installing a software operating system (OS) in the logical layer of the first computing device; configuring a first basic input/output system (BIOS) based on installation in the physical layer of the first computing device; relocating all first hardware device drivers for the first hardware devices from an OS image in the logical layer to a first Electrically Erasable Programmable Read-Only Memory (EEPROM) in the physical layer of the first computing device; installing the first BIOS in the physical layer of the first computing device; and loading the first hardware device drivers from the first EEPROM into the first BIOS during a boot phase for the first computing device.11-08-2012
20120284499METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.11-08-2012
20120284498FLASH DEVICE AND ASSOCIATED BOOTING METHOD - A flash device and a booting method thereof are provided. The booting method includes following steps: executing a basic boot program stored in a read only memory (ROM) of a flash memory micro-controller; reading a specific flash memory configuration parameter and a revision program from a flash memory; loading a main program stored in the flash memory; and executing the revision program and loading the main program stored in the flash memory when the main program fails to be loaded.11-08-2012
20120284497BOOTING METHOD OF MAIN CHIP - A booting method of a main chip includes the following steps. The main chip searches a current block of a NAND Flash for reading a boot table from a current page of the current block and verifying a boot header of the boot table. When the boot header passes the verification, the main chip checks whether ID of the boot table and ID of the NAND Flash are the same. When the IDs of the boot table and the NAND Flash are the same, the main chip reads a next page of the current block and checks whether data stored in the current page and in the next page is the same. When the data stored in the current page and in the next page is the same, the main chip reads configuration information of the boot table to initialize the NAND Flash and boots.11-08-2012
20120284496Memory affinitization in multithreaded environments - Illustrative embodiments include a method, system, and computer program product for estimating boot-time memory requirement of a data processing system. A data processing system identifies, using system configuration information associated with the data processing system, a set of components needed for booting up the data processing system. The data processing system determines a dependency of a component identified in the set of components, the component including a memory estimator program. The data processing system determines an ancestry of the component identified in the set of components. The data processing system receives, using the memory estimator program of the component, a boot-time memory requirement of the component. The data processing system calculates a total boot-time memory requirement. The data processing system determines whether an amount of real memory of the data processing system satisfies the total boot-time memory requirement.11-08-2012
20120284495System and Method for Facilitating Booting Using a Plurality of Boot Methods - Systems and methods for reducing problems and disadvantages associated with multiple boot methods are disclosed. In accordance with an embodiment of the present disclosure, an information handling system comprises a processor and a memory communicatively coupled to the processor. The information handling system also comprises an access controller communicatively coupled to the processor. The access controller is configured to retrieve non-bootable executable instructions and combine the non-bootable executable instructions with a boot loader associated with a boot method to generate a bootable image associated with the boot method. The access controller is further configured to present the bootable image to the information handling system such that the bootable image is configured to be booted by the information handling system using the boot method.11-08-2012
20120284494DYNAMICALLY REDIRECTING BOOT TO ANOTHER OPERATING SYSTEM - Various embodiments provide an ability to automatically boot a computing device with an operating system stored on a portable storage device when the portable storage device is detected to be present. The computing device can be configured to dynamically boot from the portable storage device when the portable storage device is detected, and revert to a programmed boot order in its associated boot module when the portable storage device is not detected. In some embodiments, the operating system is fully encapsulated on the portable storage device, such as the operating system being completely separate from an operating system initially booting the computing device.11-08-2012
20120284493BOOTING FROM A SECONDARY STORAGE DEVICE IN ORDER TO ACCUMULATE DISK DRIVE PERFORMANCE DATA - A computer system is disclosed comprising a disk drive comprising a head stack assembly (HSA), the HSA comprising a spindle motor for rotating at least one disk, and at least one head actuated over the disk. The computer system further comprises a host coupled to the disk drive, wherein the host comprises a microprocessor operable to first boot the host by reading boot data from a secondary storage device. After first booting the host, the microprocessor commands the disk drive to accumulate performance data for the HSA, and after accumulating the performance data, the microprocessor second boots the host by reading boot data from the HSA.11-08-2012
20130159689METHOD AND APPARATUS FOR INITIALIZING EMBEDDED DEVICE - The present invention relates generally to a method and apparatus for initializing an embedded device. When a boot loader is executed and a kernel is loaded, an initialization program is executed, and a booting sequence including information about an operating sequence of a boot process is loaded. Thereafter, initialization functions which are included in a script replacement function module of the embedded device are executed, and then a state of the embedded device is set to a usable state. Accordingly, the method and apparatus can efficiently perform the operations of an initialization program that is used to solve the complexity of the initialization of an OS inevitably appearing on mobile devices and high-performance embedded devices, and an initialization script that is operated to flexibly execute the initialization program on various devices having different characteristics.06-20-2013
20130159690METHOD OF STARTING A COMPUTER USING A BIOMETRIC AUTHENTICATION DEVICE - A computer is made usable in a short time using a fingerprint authentication device. When a fingerprint authentication device performs authentication successfully, the fingerprint authentication device sends a startup signal to a power controller via a line. The power controller controls a DC/DC converter to supply power to devices. The fingerprint authentication device sets whether normal boot or fast boot that is completed in a shorter time than the normal boot is successful, in a register via a line. In the fast boot, initialization of a USB interface of a line and password input by a user are skipped, and a BIOS accesses a system by single sign-on using a password stored in a secure area.06-20-2013
20130185548Multiple System Images for Over-The-Air Updates - In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image.07-18-2013
20130185549ELECTRONIC DEVICE AND BIOS UPDATING DEVICE THEREOF - An electronic device and a basic input/output system (BIOS) updating device thereof are provided. The electronic device includes a central processing unit (CPU), a chipset, a first interface circuit and a second interface circuit. The chipset is coupled to the CPU. The first interface circuit is coupled to a first memory and a second memory. The first memory includes a first BIOS file and the second memory includes a second BIOS file. The second interface circuit is coupled to the first interface circuit and an external storage device. When the external storage device includes a third BIOS file, a target memory is selected from the first memory and second memory according to a first rule and the target memory is updated using the third BIOS file. Thus, BIOS firmware of the electronic device can be safely updated.07-18-2013
20130185550METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM - A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a security sub-system. The memory is a NAND flash memory with a block structure that comprises a guaranteed block and non-guaranteed blocks. The guaranteed block is guaranteed to be useable. A boot code is segmented into boot code segments and the boot code segments are stored separately in the guaranteed and non-guaranteed blocks. The security sub-system is configured to locate the boot code segments stored in the non-guaranteed blocks and validate them independently based on data in the guaranteed block. The security sub-system is further configured to assemble the boot code segments into the boot code and execute the boot code.07-18-2013
20110283097IMAGING PROCESS - A user-friendly system, method, and program product for installing an image on a computer, the method comprising: booting the computer (11-17-2011
20110314268SD SWITCH BOX IN A CELLULAR HANDSET - A cellular handset, including a cellular base band modem, including a UART interface, and an SD host interface, a NAND flash memory, a NAND controller coupled with the NAND flash memory, a host device including a host controller, wherein the electronic host device supports an SD connection, and a convergence controller coupled with the cellular base band modem, the host device and the NAND controller, including a UART port for transferring data to and from the cellular base band modem via the UART interface, an SD port for transferring data to and from the cellular base band modem via the SD host interface, an SD port for transferring data to and from the NAND flash memory via the NAND controller, an SD port for transferring data to and from the host device via the host controller, a first mailbox into which the base band modem writes messages and from which the host device reads messages, and a second mailbox into which the host device writes messages and from which the cellular base band modem reads messages. A method is also described and claimed.12-22-2011
20110314267ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT - According to one embodiment, an electronic device includes a display module, a power button, at least one function button, a hardware controller, and a pre-OS boot processor. The display module displays display data processed by an application on an operating system (OS) or display data based on received broadcast waves. The power button is operated to power on or off the electronic device. The function button is provided separately from a hardware keyboard having a plurality of keys to control a function defined on the OS. The hardware controller is activated in response to power-on operation made on the power button and provide the OS with basic input/output mechanism with respect to hardware including the function button. The pre-OS boot processor performs a process before boot-up of the OS if a predetermined operation is made on the function button within a predetermined time since the power-on operation is made.12-22-2011
20110314266ON-DEMAND DATABASE SERVER STARTUP AND SHUTDOWN - A database startup service is launched at the boot time of a computer that is configured to receive requests to start the execution of a database server. A business application plug-in is then started in a minimal functionality mode of operation. The plug-in determines whether an action has been performed that requires access to a database. If access to the database is needed, the plug-in transmits a request to the database startup service to start the database service. Once the database server has been started, the plug-in transitions to a full functionality mode of operation where all of the functionality provided by the plug-in is enabled. The plug-in might also determine that access to the database is no longer needed. In response thereto, the plug-in may transmit a request to the database startup service to terminate the execution of the database server.12-22-2011
20130191622METHOD FOR BOOTING COMPUTER AND COMPUTER - Provided is a method for temporarily skipping a secure boot function. A computer is configured so that a secure boot function is set as enabled by default. Depression of a power button of the computer in a power-off state generates a startup signal. At the time of startup from S4/S5 state, a switch is turned ON and PP bit indicating physical presence is set at a register. Depression of a specific key on a keyboard causes DE bit to be set at a register. When PP bit and DE bit are found, UEFI firmware stored in a firmware ROM temporarily skips integrity validation of a boot program only for boot this time.07-25-2013
20130191623INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An information processing apparatus capable of booting in a normal boot mode or a special boot mode includes an input unit configured to input a request for booting the information processing apparatus in the special boot mode in booting the information processing apparatus, and a control unit configured to control the information processing apparatus to be booted in the normal boot mode if the input unit has not input the request, and to control the information processing apparatus to be booted in the special boot mode if the input unit has input the request, wherein, in a case where the information processing apparatus is booted with a predetermined condition satisfied, the control unit controls the information processing apparatus to be booted in the normal boot mode even if the input unit has input the request.07-25-2013
20130191624FIRMWARE PROTECTION AND VALIDATION - A system for firmware protection and validation includes: a memory device, including firmware; a chipset, a microprocessor; a secure logic device in electrical communication with the chipset and the memory device; and a power on reset circuit in communication with the secure logic device, wherein, when the secure logic device receives a reset signal from the power on reset circuit, the secure logic device applies a hold signal to the chipset, when the hold signal is applied to the chipset, the power on reset circuit de-asserts the reset signal, when the reset signal is de-asserted, the secure logic device validates the content of the firmware in the memory device, and further wherein, when the content of the firmware is validated by the secure logic device, the secure logic device de-asserts the hold signal applied to the chipset.07-25-2013
20110320802AUTHENTICATION METHOD, KEY DISTRIBUTION METHOD AND AUTHENTICATION AND KEY DISTRIBUTION METHOD - An authentication method, and a key distribution method, and an authentication and key distribution method are provided. The authentication method is adapted for a machine type communication involved with a wireless communication system, and includes the following steps. At least a user equipment (UE) transmits an application request including at least a first security material to a network application function (NAF), where the at least a first security material is not a key directly obtained through a bootstrapping procedure of a generic bootstrapping architecture. The NAF generates a second security material, which is not the key, either. The NAF replies the UE an application answer with the at least a second security material. In addition, the NAF authenticates the UE by the second security material, or the UE authenticates the NAF by the second security material.12-29-2011
20120030458METHOD AND APPARATUS FOR BOOTING HOST - Provided are a method and a device for booting a host embodying a downloadable conditional access system (DCAS), wherein one of a plurality of pre-determined booting modes is decided as a booting mode of the host based on first information indicating whether a host can communicate with a broadcasting service provider and second information indicating whether a software-based security client providing information required for decrypting broadcasting data is installed to a hardware-based security module connected to the host, and the host is booted in the decided booting mode.02-02-2012
20120030457OFFLOADING THE PROCESSING OF A NETWORK PROTOCOL STACK - A computer system is partitioned during a pre-boot phase of the computer system between a first partition and a second partition, wherein the first partition to include a first processing unit and the second partition to include a second processing unit. An Input/Output (I/O) operating system is booted on the first partition. A general purpose operating system is booted on the second partition. Network transactions are issued by the general purpose operating system to be performed by the I/O operating system. The network transactions are performed by the I/O operating system.02-02-2012
20120030456Booting Devices Using Virtual Storage Arrays Over Wide-Area Networks - Virtual storage arrays consolidate data storage at a data center for physical and virtual computer systems at one or more branch network locations. Standalone and virtualized computer systems at a branch network location load, execute, and store their operating systems, applications, and data using virtual storage arrays and do not require any built-in or external non-volatile data storage devices such as hard disk drives or solid-state drives at the branch network location. The virtual disks of the virtual storage array are mapped to physical data storage at the data center and accessed via a WAN using storage block-based protocols. A storage block cache at the branch network location includes storage blocks prefetched based on knowledge about the computer systems at the branch network location and the behavior of their operating systems and applications.02-02-2012
20120030455Information handling system remote input/output connection system - An information handling system (IHS) remote input/output (I/O) connection system includes an enclosure having a power button, a communication bus connection point, and an audio connection point. A cable dongle extends from the enclosure. The cable dongle has a first end and a second end. The cable dongle also includes a connection from the power button on the enclosure on the first end to a communication connection point plug on the second end, which mates with a connection point plug on a remote I/O device card that enables a parallel (ACPI) S5-capable power button from the IHS to exist on the enclosure. The cable dongle further includes a communication cable coupled to the communication bus connection point on the first end and having a communication connection point plug on the second end. In addition, the cable dongle includes an audio cable coupled to the audio connection point on the first end and having an audio connection point plug on the second end.02-02-2012
20120030454SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING PROCESSING SPEEDS IN A WIRELESS MOBILE TELECOMMUNICATIONS DEVICE - There is disclosed a system and method executable in a wireless mobile communication device for dynamically configuring processing speed for a main processor in the device during device initialization. In an embodiment, the method comprises: initiating a boot-rom procedure; determining whether a battery is present in the device, and in response to the presence of the battery, determining whether the battery charge level is above a predetermined threshold; determining whether a USB connection to the device is present, and in response to the presence of a USB connection, enumerating the USB connection; and wherein, in response to the presence of the battery and the battery charge level being above a predetermined threshold, or in response to the USB connection being enumerated at a higher current, the processing speed of the main processor is increased.02-02-2012
20130198505REMOTE MANAGEMENT OF UEFI BIOS SETTINGS AND CONFIGURATION - In an information handling system (IHS), remote management of basic input/output system (BIOS) settings and configuration includes maintaining a BIOS setting/configuration database, providing an application to communicate a BIOS setting/configuration from the database to a BIOS system, determining whether the BIOS setting/configuration communicated from the database to the BIOS system is a special BIOS configuration capsule packet, and validating BIOS setting/configuration.08-01-2013
20130198502Method For Reducing Platform Boot Times By Providing Lazy Input/Output Abstractions - Methods, systems and computer program products are disclosed for enhanced system boot processing that is faster to launch an operating system, as certain devices such as user input hardware devices may not be initialized unless it is determined that a user-interruption to the boot process is likely. That is, although an interface for the devices is exposed, no initialization occurs unless a call to the interface occurs. Other embodiments are described and claimed.08-01-2013
20130198501ELECTRONIC DEVICE AND SPEED-UP BOOTING MODULE AND METHOD THEREOF - A speed-up booting module of an electronic device includes a first heat pipe with two ends connected to a first component and a second component respectively, and the first heat pipe including a first working fluid, wherein when a booting process is performed at a first environmental temperature, the heat from the first component in operation is transferred to the second component so that a temperature of the second component reaches an operating temperature; and a second heat pipe with two ends connected to the first component and a third component respectively, and the second heat pipe including a second working fluid, a boiling point of the second working fluid is higher than the boiling point of the first working fluid; wherein at a second environmental temperature, a temperature of the second component reaches the boiling point, the heat from the first component is transferred to the second component.08-01-2013
20130198503DISPLAY APPARATUS, CONTROL METHOD THEREOF, UPGRADE APPARATUS, AND DISPLAY SYSTEM - A display apparatus including: a display device; an image processor processing an image signal received from an image source according to a preset image processing process to display an image on the display device; a connector to which an upgrade apparatus upgrades the image processing process is connected and to which a server is connected to communicate with; and a controller comparing a first pairing key with a second pairing key stored in the server and selectively allowing or blocking a booting operation according to a comparison result, the first pairing key being generated based on a pre-stored first identification of the display apparatus and a second identification of the upgrade apparatus obtained from the upgrade apparatus when the display apparatus starts booting up.08-01-2013
20130198504METHODS OF CONFIGURING A BIOS IN A COMPUTER SYSTEM AND COMPUTER PROGRAM PRODUCTS - A method of configuring a basic input output system (BIOS) in a computer system including creating first configuration data in the BIOS to configure the BIOS, transferring the first configuration data from the BIOS to a management unit of the computer system, and storing the first configuration data in the management unit, wherein the steps are carried out at each startup of the computer system.08-01-2013
20120297179METHODS, DEVICES, AND SYSTEMS FOR ESTABLISHING, SETTING-UP, AND MAINTAINING A VIRTUAL COMPUTER INFRASTRUCTURE - A system and method of operating an electronic device may include loading an operating system, from a boot key, on the electronic device during turn-on of the electronic device. The operating system may be operated on the electronic device. The boot key may cause the electronic device to automatically communicate with a web-service located on a communications network to enable executable instructions from the web-service to be communicated to the electronic device for execution thereon.11-22-2012
20120066485SYSTEM AND METHOD FOR INSTALLING AND CONFIGURING A TAILORED OPERATING SYSTEM AND USER ENVIRONMENT - The systems and methods disclosed can be used for installing and configuring a tailored operating system and user environment including software products and applications on end-user computers. The systems and methods relate generally to software used to boot a computer with a maintenance operating system and to backup selected data to external storage. The software can initiate an installation of a new operating system and then restores the data that was backed up on external storage.03-15-2012
20120072711Computer Apparatus and Method for Charging Portable Electronic Device Using the Computer Apparatus - A computer apparatus and a method for charging a portable electronic device are provided. The method is implemented in a computer apparatus including a connector. The method includes: (a) detecting whether the portable electronic device is plugged and connected to the connected when the computer apparatus is in a power off state; (b) causing the computer apparatus to execute a boot process if the portable electronic device is plugged and connected to the connector; (c) determining whether the portable electronic device is a predetermined device; (d) sending a charging command to the portable electronic device such that the portable electronic device derives a charging current from the computer apparatus if the portable electronic device is the predetermined device; and (e) causing the computer apparatus to shut down before an operating system is loaded.03-22-2012
20120072710DIRECT SCATTER LOADING OF EXECUTABLE SOFTWARE IMAGE FROM A PRIMARY PROCESSOR TO ONE OR MORE SECONDARY PROCESSOR IN A MULTI-PROCESSOR SYSTEM - In a multi-processor system, an executable software image including an image header and a segmented data image is scatter loaded from a first processor to a second processor. The image header contains the target locations for the data image segments to be scatter loaded into memory of the second processor. Once the image header has been processed, the data segments may be directly loaded into the memory of the second processor without further CPU involvement from the second processor.03-22-2012
20120079263Method and Device for Initiating System on Chip - A method and apparatus for starting a system on chip, this method includes: enumerating all interfaces which are able to start after the system on chip is powered on and an initial boot program is started; and reading measurement data of each starting interface in sequence, and when it is detected that a certain starting interface has connected with a starting device and this starting device is the only, load a subsequent boot program from this starting interface to complete system starting. The method solves the problem that the system on chip is only able to be started in the fixed configuration from the fixed interface or device, and the system on chip is unable to be started once the external starting environment changes existing in the prior art.03-29-2012
20120079262START-UP CONTROL APPARATUS AND METHOD - A start-up control apparatus includes a control chip, an advanced configuration and power management interface (ACPI) controller, and a firmware. The control chip includes an analysis module and a control module. The ACPI controller is used for receiving a trigger signal and sending a start-up signal corresponding to the trigger signal to the control module if a computer system is powered off. The firmware is used for sending a status signal to the analysis module after the firmware finishes initialization. The analysis module is further adapted to send the trigger signal to the ACPI controller after receiving the status signal, and the control module is adapted to send the start-up signal to a power supply to provide power for powering on the computer system.03-29-2012
20120084544METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS BETWEEN A SECURE VIRTUAL TERMINAL AND A REMOTE SYSTEM - Methods and systems for securely connecting a client computer having a secure boot device to a remote server over a communications network are disclosed. One method includes booting a client computer from a trusted set of processing modules stored in the secure boot device, verifying the contents of the trusted set of processing modules prior to execution of these processing modules, and providing authentication information from data stored upon the secure boot device to an authentication server to establish a secure connection to the remote server. The method also includes establishing the secure connection with the remote server using encryption keys stored on the secure boot device, and transferring data between the client computer and the remote server over the secure connection to perform transactions initiated by a user of the client computer. In the disclosed method, the remote server utilizes encryption keys associated with a unique ID from the secure boot device.04-05-2012
20120096256MOBILE DEVICE AND METHOD FOR SUPPORTING HIBERNATION FUNCTION - A method and apparatus for supporting a hibernation function in a mobile device are provided. In the method, the mobile device detects a wakeup event in a hibernation mode and, in response to the wakeup event, loads a snapshot image into a volatile memory from a snapshot image region of a nonvolatile memory. After the loading of the snapshot image, the mobile device determines whether there is a system status has been modified. If the system status has not been modified, the mobile device finishes a system boot. If the system status has been modified, the mobile device performs data synchronization and then finishes the system boot.04-19-2012
20120096255SERVER AND METHOD FOR MANAGING I2C BUS OF THE SERVER - In a method for managing an inter-integrated circuit (I2C) bus of a server, a bus flag is set for the I2C bus using a BMC. When the BMC requires to detect a temperature of a memory of the server, the temperature is detected by accessing a SPD chip of the server through the I2C bus if a value of the bus flag is a first value. The value of the bus flag is changed to a second value when the memory requires to be initialized by a BIOS, and a delay for a predetermined time period occurs. Configuration information of the memory is acquired by the BIOS from the SPD chip through the I2C bus when the predetermined time period is elapsed, and the memory is initialized by the BIOS according to the configuration information. The value is reset to the first value after the memory is initialized.04-19-2012
20120096254SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RETRIEVING DATA AT BOOT TIME - The invention provides a system for retrieving at boot time user data stored on a computer. The computer comprises a processor coupled through a system bus to I/O devices and to a system memory, the computer further having a basic input output system (BIOS) unit operatively coupled to the system bus for loading a computer operating system during a computer boot procedure, wherein the system memory being accessible to the computer operating system via the system bus. The system comprises a boot adapter for connecting the system bus to a boot bus, a boot memory coupled to the boot bus wherein the boot memory comprises storage locations for storing the predefined user data, and program code means coupled to the BIOS unit. The program code means are operative for loading a boot operating system during the computer boot procedure, the boot operating system having instructions for accessing the boot memory during the computer boot procedure.04-19-2012
20120096253METHOD FOR AUTOMATICALLY SETTING UP SYSTEM - A method for automatically optimizing a configuration of a BIOS is suitable for configurating a computer system. During a BIOS power-on self test, a running operating system predetermined index is obtained from a memory. An optimal system setting parameter corresponding to the running operating system predetermined index is obtained. The computer system is automatically set up according to the optimal system setting parameter. A booting process is performed to start an operating system. An operating system index of the operating system is obtained. The operating system index is compared with the running operating system predetermined index. When the operating system index is not equal to the running operating system predetermined index, a system setting warning is issued. The running operating system predetermined index is updated by using the operating system index as the updated running operating system predetermined index in the memory.04-19-2012
20120096252PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A method includes storing, to a volatile memory coupled to a processor executing a first operating system kernel, a planned system configuration, and tagging the planned system configuration. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters.04-19-2012
20120096251MEMORY TAGGING AND PRESERVATION DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory coupled to the processor, and initiating a boot of a second operating system kernel while preserving in the volatile memory contents stored therein. Following the boot of the second operating system kernel, a set of parameters referencing the tagged region is retrieved from the volatile memory, and the tagged region is then used, based on the retrieved set of parameters.04-19-2012
20120096250PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter.04-19-2012
20130212367Security Policy for Device Data - Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the encrypted data from being decrypted by an unauthorized entity, techniques enable a decryption key to be occluded if an attempt to gain unauthorized access to device data is detected. In implementations, a decryption key can be occluded in a variety of ways, such as by deleting the decryption key, overwriting the encryption key in memory, encrypting the encryption key, and so on. Embodiments enable an occluded decryption key to be recovered via a recovery experience. For example, a recovery experience can include an authentication procedure that requests a recovery password. If a correct recovery password is provided, the occluded decryption key can be provided.08-15-2013
20130212369ATTESTING USE OF AN INTERACTIVE COMPONENT DURING A BOOT PROCESS - A method for attesting use of an interactive component during a boot process, comprising the steps of: reading, in response to determining use of the interactive component, associated interactive input; determining whether the input should be trusted; and in response to determining that the input should be trusted, processing the input to create a trusted cryptographic value, further comprising: matching, in response to a subsequent interactive input being read, the subsequent interactive input with one or more of the trusted cryptographic values in order to determine whether the subsequent interactive input is trusted.08-15-2013
20130212370METHOD AND APPARATUS FOR ESTABLISHING SAFE PROCESSOR OPERATING POINTS - A system and method is provided for establishing safe processor operating points. Some embodiments may include a tamper resistant storage element that stores information regarding one or more operating points of an adjustable processor operating parameter. Some embodiments may further include an element to determine what the current processor operating point is of the operating parameter, and an element to compare the current operating point of the operating parameter with the stored information.08-15-2013
20130212368DATA PROTECTING METHOD, MEMORY CONTROLLER AND MEMORY STORAGE DEVICE - A data protecting method for a rewritable non-volatile memory module having a first storage area and a second storage area and a memory controller and a memory storage device using the same are provided. The method includes providing default configuration information in response to a boot command from a host system, wherein the host system cannot recognize the second storage area according to the default configuration information. The method also includes requesting the host system to re-boot when a user identification code and a user password receiving from the host system pass an authentication procedure, and providing first configuration information to the host system after re-booting the host system. The host system can recognize the second storage area according to the first configuration information. Accordingly, the method can effectively protect data stored in the rewritable non-volatile memory module.08-15-2013