Methods and apparatus for implementing a recovery mode procedure for a computing device are disclosed. An example method includes determining, by a computing device, that a recovery mode procedure is to be executed on the computing device. The example method further includes, determining whether a t
Methods and apparatus for implementing a recovery mode procedure for a computing device are disclosed. An example method includes determining, by a computing device, that a recovery mode procedure is to be executed on the computing device. The example method further includes, determining whether a trusted recovery image is accessible to the computing device and, in the event the trusted recovery image is accessible to the computing device, executing the recovery mode procedure to repair or replace a current image of the computing device using the trusted recovery image. In the event the trusted recovery image is not accessible to the computing device, the example method includes, providing instructions for obtaining the trusted recovery image, determining the obtained trusted recovery image is accessible to the computing device and executing the recovery mode procedure to repair or replace the current image of the computing device using the obtained trusted recovery image.
대표청구항▼
1. A computing device comprising: a processor;a first memory device including a first instance of a kernel partition and a second instance of a kernel partition that is a redundant instance of the first instance of the kernel partition, the first instance of the kernel partition and the second insta
1. A computing device comprising: a processor;a first memory device including a first instance of a kernel partition and a second instance of a kernel partition that is a redundant instance of the first instance of the kernel partition, the first instance of the kernel partition and the second instance of the kernel partition being stored in the first memory device prior to initiation of a boot sequence; anda second memory device including a boot stub, the second memory device being operationally coupled to the processor and including instructions stored thereon that, when executed by the processor, cause the boot stub to initiate the boot sequence as a single boot of the computing device comprising: determining, by the boot stub, that the first instance of the kernel partition is corrupted; andin response to determining that the first instance of the kernel partition is corrupted, operating the computing device using the second instance of the kernel partition. 2. The computing device of claim 1, wherein the second memory device has instructions stored thereon that, when executed by the processor, further cause the boot stub to determine that the second instance of the kernel partition is not corrupted and, in response to determining that the second instance of the kernel partition is not corrupted, further cause the computing device to operate using the second instance of the kernel partition. 3. The computing device of claim 1, wherein operating using the second instance of the kernel partition includes booting the computing device using the second instance of the kernel partition. 4. The computing device of claim 1, wherein the first memory device further includes a first instance of a root filesystem and a second instance of a root filesystem that is a redundant instance of the first instance of the root filesystem, the first instance of the root filesystem and the second instance of the root filesystem being stored in the first memory device prior to initiation of the boot sequence; andwherein initiating the boot sequence as a single boot of the computing device further comprises: determining, by the boot stub, that the first instance of the root filesystem is corrupted; andin response to determining that the first instance of the root filesystem is corrupted, operating the computing device using the second instance of the root filesystem. 5. The computing device of claim 4, wherein the first instance of the root filesystem includes a first instance of an operating system and the second instance of the root filesystem includes a second instance of the operating system that is a redundant instance of the first instance of the operating system. 6. The computing device of claim 4, wherein operating using the second instance of the root filesystem includes booting the computing device using the second instance of the root filesystem. 7. The computing device of claim 1, wherein the boot stub is included in a write-protected area of the second memory device. 8. A computer-implemented method comprising: storing, in a computing device and prior to initiation of a boot sequence, a first instance of a kernel partition and a second instance of a kernel partition that is a redundant instance of the first instance of the kernel partition; andinitiating, by a boot stub included in the computing device, the boot sequence as a single boot of the computing device comprising: determining, by the boot stub, that the first instance of the kernel partition is corrupted; andin response to determining that the first instance of the kernel partition is corrupted, operating the computing device using the second instance of the kernel partition. 9. The computer-implemented method of claim 8, further comprising: determining, by the boot stub, that the second instance of the kernel partition is not corrupted; andin response to determining that the second instance of the kernel partition is not corrupted, operating the computing device using the second instance of the kernel partition. 10. The computer-implemented method of claim 8, wherein operating the computing device using the second instance of the kernel partition includes booting the computing device using the second instance of the kernel partition. 11. The computer-implemented method of claim 8, further comprising: storing, in the computing device and prior to initiation of the boot sequence, a first instance of a root filesystem and a second instance of a root filesystem that is a redundant instance of the first instance of the root filesystem; andwherein initiating the boot sequence as a single boot of the computing device further comprises: determining, by the boot stub, that the first instance of the root filesystem is corrupted; andin response to determining that the first instance of the root filesystem is corrupted, operating the computing device using the second instance of the root filesystem. 12. The computer-implemented method of claim 11, wherein the first instance of the root filesystem includes a first instance of an operating system and the second instance of the root filesystem includes a second instance of the operating system that is a redundant instance of the first instance of the operating system. 13. The computer-implemented method of claim 11, wherein operating the computing device using the second instance of the root filesystem includes booting the computing device using the second instance of the root filesystem. 14. The computer-implemented method of claim 8, wherein the boot stub is included in a write-protected area of a memory device included in the computing device. 15. A non-transitory recordable storage medium having recorded and stored thereon instructions that, when executed by a computing device, cause the computing device to perform the actions of: storing, in the computing device and prior to initiation of a boot sequence, a first instance of a kernel partition and a second instance of a kernel partition that is a redundant instance of the first instance of the kernel partition; andinitiating, by a boot stub included in the computing device, the boot sequence as a single boot of the computing device comprising: determining, by the boot stub, that the first instance of the kernel partition is corrupted; andin response to determining that the first instance of the kernel partition is corrupted, operating using the second instance of the kernel partition. 16. The non-transitory recordable storage medium of claim 15, wherein the instructions, when executed by the computing device, further cause the computing device to perform the actions of: determining, by the boot stub, that the second instance of the kernel partition is not corrupted; andin response to determining that the second instance of the kernel partition is not corrupted, operating using the second instance of the kernel partition. 17. The non-transitory recordable storage medium of claim 15, wherein the action, performed by the computing device, of operating using the second instance of the kernel partition includes booting the computing device using the second instance of the kernel partition. 18. The non-transitory recordable storage medium of claim 15, wherein the instructions, when executed by the computing device, further cause the computing device to perform the actions of: storing, in the computing device and prior to initiation of the boot sequence, a first instance of a root filesystem and a second instance of a root filesystem that is a redundant instance of the first instance of the root filesystem; andwherein initiating the boot sequence as a single boot of the computing device further comprises: determining, by the boot stub, that the first instance of the root filesystem is corrupted; andin response to determining that the first instance of the root filesystem is corrupted, operating using the second instance of the root filesystem. 19. The non-transitory recordable storage medium of claim 18, wherein the first instance of the root filesystem includes a first instance of an operating system and the second instance of the root filesystem includes a second instance of the operating system that is a redundant instance of the first instance of the operating system. 20. The non-transitory recordable storage medium of claim 18, wherein the action, performed by the computing device, of operating the computing device using the second instance of the root filesystem includes booting the computing device using the second instance of the root filesystem. 21. The non-transitory recordable storage medium of claim 15, wherein the boot stub is included in a write-protected area of a memory device included in the computing device.
Bealkowski Richard (Delray Beach FL) Blackledge ; Jr. John W. (Boca Raton FL) Cronk Doyle S. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Kinnear Scott G. (Boca Raton FL) Kovach George D. (Boca R, Initial BIOS load for a personal computer system.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.