Methods and apparatus for implementing a recovery mode procedure for a computing device are disclosed. An example method includes determining, by a computing device, that a recovery mode procedure is to be executed on the computing device. The example method further includes, determining whether a t
Methods and apparatus for implementing a recovery mode procedure for a computing device are disclosed. An example method includes determining, by a computing device, that a recovery mode procedure is to be executed on the computing device. The example method further includes, determining whether a trusted recovery image is accessible to the computing device and, in the event the trusted recovery image is accessible to the computing device, executing the recovery mode procedure to repair or replace a current image of the computing device using the trusted recovery image. In the event the trusted recovery image is not accessible to the computing device, the example method includes, providing instructions for obtaining the trusted recovery image, determining the obtained trusted recovery image is accessible to the computing device and executing the recovery mode procedure to repair or replace the current image of the computing device using the obtained trusted recovery image.
대표청구항▼
1. A computing device comprising: a processor;a first memory device including first portions of a current image of the computing device; anda second memory device including firmware, the firmware including a write-protected region and a writeable region, the write-protected region including a boot s
1. A computing device comprising: a processor;a first memory device including first portions of a current image of the computing device; anda second memory device including firmware, the firmware including a write-protected region and a writeable region, the write-protected region including a boot stub, the writeable region including second portions of the current image of the computing device, the second memory device operationally coupled to the processor, wherein the second memory device has instructions stored thereon that, when executed by the processor, cause the computing device to,based on determining that at least one portion of the current image is in an unexpected state, access a redundant instance of the at least one portion of the current image, wherein the determination is based on information stored in the boot stub, the at least one portion of the current image being a firmware portion included in the writeable region of the firmware, and the redundant instance of the at least one portion of the current image being a redundant instance of the firmware portion, the redundant instance of the firmware portion being included in the writeable region of the firmware. 2. The computing device of claim 1, wherein the information stored in the boot stub includes a cryptographic key. 3. The computing device of claim 2, wherein each portion of the current image includes a digital signature, and wherein the cryptographic key is used to verify the digital signature. 4. The computing device of claim 1, wherein the write-protected region of the second memory further includes recovery firmware, andwherein accessing a redundant instance of the at least one portion of the current image comprises initiating, by the recovery firmware, a recovery mode procedure. 5. The computing device of claim 1, wherein determining that at least one portion of the current image is in an unexpected state comprises detecting that the at least one portion of the current image is corrupted based on using a parity check or an error correction code. 6. The computing device of claim 1, wherein the first memory device comprises a system memory of the computing device. 7. A computing device comprising: a processor;a first memory device including first portions of a current image of the computing device; anda second memory device including firmware, the firmware including a write-protected region and a writeable region, the write-protected region including a boot stub, the writeable region including second portions of the current image of the computing device, the second memory device being operationally coupled to the processor, wherein the second memory device has instructions stored thereon that, when executed by the processor, cause the computing device to, based on determining that at least one portion of the current image is in an unexpected state, access a redundant instance of the at least one portion of the current image, wherein the determination is based on information stored in the boot stub, the at least one portion of the current image being a kernel partition or a root filesystem, the kernel partition, a redundant instance of the kernel partition, the root filesystem, and a redundant instance of the root filesystem being included in the first memory. 8. A computer-implemented method comprising: storing, in a first memory device, first portions of a current image of a computing device;storing, in a second memory device, firmware including a write-protected region and a writeable region, the write-protected region including a boot stub, the writeable region including second portions of the current image of the computing device;determining, using information stored in the boot stub, whether any of the first portions of the current image of the computing device or any of the second portions of the current image of the computing device are in an unexpected state; andbased on determining that at least one portion of the current image is in an unexpected state, accessing a redundant instance of the at least one portion of the current image, the at least one portion of the current image being a firmware portion included in the writeable region, and the redundant instance of the at least one portion of the current image being a redundant instance of the firmware portion, the redundant instance of the firmware portion being included in the writeable region. 9. The method of claim 8, wherein the information stored in the boot stub includes a cryptographic key,wherein each portion of the current image includes a digital signature, andwherein the method further comprises verifying the digital signature using the cryptographic key. 10. The method of claim 8, wherein the write-protected region of the second memory further includes recovery firmware, andwherein accessing a redundant instance of the at least one portion of the current image comprises initiating, by the recovery firmware, a recovery mode procedure. 11. The method of claim 8, wherein determining whether any of the first portions of the current image of the computing device or any of the second portions of the current image of the computing device are in an unexpected state comprises detecting that at least one portion of the current image of the computing device is corrupted based on using one of a parity check and an error correction code. 12. A computer-implemented method comprising: storing, in a first memory device, first portions of a current image of a computing device;storing, in a second memory device, firmware including a write-protected region and a writeable region, the write-protected region including a boot stub, the writeable region including second portions of the current image of the computing device;determining, using information stored in the boot stub, whether any of the first portions of the current image of the computing device or any of the second portions of the current image of the computing device are in an unexpected state; andbased on determining that at least one portion of the current image is in an unexpected state, accessing a redundant instance of the at least one portion of the current image,the at least one portion of the current image being a kernel partition or a root filesystem,the kernel partition, a redundant instance of the kernel partition, the root filesystem, and a redundant instance of the root filesystem being included in the first memory. 13. A non-transitory recordable storage medium having recorded and stored thereon instructions that, when executed by a computing device, cause the computing device to perform the actions of: storing, in a first memory device, first portions of a current image of a computing device;storing, in a second memory device, firmware including a write-protected region and a writeable region, the write-protected region including a boot stub, the writeable region including second portions of the current image of the computing device;determining, using information stored in the boot stub, whether any of the first portions of the current image of the computing device or any of the second portions of the current image of the computing device are in an unexpected state; andbased on determining that at least one portion of the current image is in an unexpected state, accessing a redundant instance of the at least one portion of the current image, the at least one portion of the current image being a firmware portion included in the writeable region, and the redundant instance of the at least one portion of the current image being a redundant instance of the firmware portion, the redundant instance of the firmware portion being included in the writeable region. 14. The medium of claim 13, wherein the information stored in the boot stub includes a cryptographic key,wherein each portion of the current image includes a digital signature, andwherein the instructions further cause the computing device to perform the actions of verifying the digital signature using the cryptographic key. 15. A non-transitory recordable storage medium having recorded and stored thereon instructions that, when executed by a computing device, cause the computing device to perform the actions of: storing, in a first memory device, first portions of a current image of a computing device;storing, in a second memory device, firmware including a write-protected region and a writeable region, the write-protected region including a boot stub, the writeable region including second portions of the current image of the computing device;determining, using information stored in the boot stub, whether any of the first portions of the current image of the computing device or any of the second portions of the current image of the computing device are in an unexpected state; andbased on determining that at least one portion of the current image is in an unexpected state, accessing a redundant instance of the at least one portion of the current image,the at least one portion of the current image being a kernel partition or a root filesystem, andthe kernel partition, a redundant instance of the kernel partition, the root filesystem and a redundant instance of the root filesystem being included in the first memory. 16. The medium of claim 13, wherein determining whether any of the first portions of the current image of the computing device or any of the second portions of the current image of the computing device are in an unexpected state comprises detecting that at least one portion of the current image of the computing device is corrupted based on using one of a parity check and an error correction code.
Bealkowski Richard (Delray Beach FL) Blackledge ; Jr. John W. (Boca Raton FL) Cronk Doyle S. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Kinnear Scott G. (Boca Raton FL) Kovach George D. (Boca R, Initial BIOS load for a personal computer system.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.