WO2016122677A1 - Configurations for in-factory and post-factory use - Google Patents

Configurations for in-factory and post-factory use Download PDF

Info

Publication number
WO2016122677A1
WO2016122677A1 PCT/US2015/014010 US2015014010W WO2016122677A1 WO 2016122677 A1 WO2016122677 A1 WO 2016122677A1 US 2015014010 W US2015014010 W US 2015014010W WO 2016122677 A1 WO2016122677 A1 WO 2016122677A1
Authority
WO
WIPO (PCT)
Prior art keywords
configuration
memory
enabled
functions
testing
Prior art date
Application number
PCT/US2015/014010
Other languages
French (fr)
Inventor
Bradley G. Cutler
Charles Christian
Original Assignee
Hewlett Packard Enterprise Development Lp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development Lp filed Critical Hewlett Packard Enterprise Development Lp
Priority to PCT/US2015/014010 priority Critical patent/WO2016122677A1/en
Publication of WO2016122677A1 publication Critical patent/WO2016122677A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2273Test methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Definitions

  • Products with embedded firmware can require significant testing and/or handling when in the factory being assembled. Such testing and handling may require individuals to access various aspects of components of the products.
  • an end customer or field engineer often needs to restore the configuration to its initial fresh out of box conditions often called Factory Defaults. However, in the factory, the Factory Defaults are not sufficient and require manual or programmatic changes in the Factory Default configuration.
  • Figure 1 illustrates an example computing device
  • Figure 2 illustrates an example flow diagram for an example process for configuring an example computing device.
  • Example systems and methods described herein provide an in- factory configuration that may be programmed in firmware, thereby eliminating any manual or programmatic steps to create the configuration needed to handle or test a product in the factory, for example. When testing has been completed, the example systems and methods disable the in-factory
  • Passwords in the factory are typically a single well known password so as to reduce cost.
  • Example systems and methods described herein remove the per-unit cost of manually or programmatically modifying each unit to have a configuration for testing, and replace it with a one-time cost of defining the in-factory configuration for firmware developers to include this in- factory configuration inside the code. Also, firmware controls are added to apply this configuration at the beginning of life of the firmware and to apply the customer configuration (the post-factory configuration) and disable the in-factory configuration (e.g., as the last manufacturing step) after factory testing is complete. A factory system or field engineer can revert back to the in-factory configuration by completely reprogramming the entire portion of memory where the in-factory configuration is stored.
  • Figure 1 illustrates an example computing device 100 that may utilize an example configuration controller 130 to selectively control usage of separate default configurations for in-factory testing and for post-factory use.
  • the configuration controller 130 may be implemented in software, firmware and/or hardware.
  • the example computing device 100 may include embedded firmware and hardware components in order to provide for multiple configurations including, a first configuration for in-factory testing and a second configuration for post-factory use (e.g., end customer use).
  • the example computing device 100 may be any type of computing device such as a portable computer or communication device, a standalone server computer, a blade server, etc.
  • the example computing device 100 may include a CPU (central processing unit) 110, at least one memory device 120, and a power supply 140.
  • the power supply 140 is coupled to an electrical interface 145 that is coupled to an external power supply such as an AC power supply 150.
  • the computing device 100 may include an operating system component 155 including, for example, an operating system driver component and a pre-boot BIOS (Basic Input/Output System) component stored in ROM (read only memory), and coupled to the CPU 110.
  • the CPU 110 may have a non-transitory memory device 120.
  • the memory device 120 may have one or more of ROM, programmable flash memory or erasable programmable ROM (EPROM).
  • the memory device 120 may be integrally formed with the CPU 120 or may be an external memory device.
  • the memory device 120 may include program code that may be executed by the CPU 120. For example, one or more processes may be performed to execute a user control interface 175 and/or software applications 180.
  • the memory device 120 also stores data 122 indicative of the in-factory configuration and data 124 indicative of the post factory configuration.
  • the memory device 120 also provides a portion of memory 126 designated for the active configuration which may be either the in- factory configuration 122 or the post -factory configuration 124, as described below.
  • the computing device 100 may be tested using the in- factory configuration 122 and delivered to the end customer using the post- factory configuration 124 without any specialized manual or programmatic steps.
  • the in-factory configuration 122 is designed to enable access to any or all function that the computing device 100 is capable of performing such that each function may be tested.
  • the post-factory configuration 124 may be designed to enable access to a first portion of the functions and not enable access to a second portion of the functions. This may be done such that units with different capabilities may be designed for different customers (e.g., one customer may desire a high-end device, one customer may desire a medium capability device and another customer may desire a low-end device.
  • the memory 120 provides a disabling component that may be used to disable the use of the in-factory configuration 122 and prevent an end-user from reverting back to the in-factory configuration 122.
  • the disabling component is a flag that is preset to a first value enabling use of the in-factory configuration 122 on first power-up of the memory.
  • the configuration controller 130 may disable the use of the in-factory configuration 122 by setting the flag to a second value that prevents the configuration controller 130 from reverting to the in-factory configuration 122.
  • the disabling component can be reset electronically, in the factory or in the field, and new versions of the in- factory configuration 122 and/or the post-factory configuration 124 may be stored into the reprogrammable memory subsequent to resetting the disabling component.
  • the in-factory configuration 122 may have low-level security settings.
  • the settings may include no password or a commonly shared password used factory- wide. Having no password or a commonly shared password may speed up the testing process.
  • the memory 120 provides a protected portion of memory, separate from the in-factory configuration 122 or the post-factory configuration 124, which is reserved for a unique password (sometimes referred to as an administrator password) that is in no other similar computing device or system. Installation of this unique password into the protected portion of the memory 120 may act as a triggering event telling the configuration controller 130 that the factory testing work is done and the computing device 100 is ready for the customer.
  • the configuration controller 130 may then copy the post- factory configuration 124 into the active configuration memory portion 126.
  • the configuration controller 130 may store a flag in non-erasable, nonprogrammable, non-customer-accessible memory to prevent reversal of this transition.
  • the computing device 100 may also include a display 160, a network interface 165 and other hardware 170 known to those skilled in the art.
  • the network interface 165 may be coupled to a network such as an intranet, a local area network (LAN), a wireless local area network (WLAN), the Internet, etc., where the other underlying components are a part of the network or at least coupled to the network.
  • LAN local area network
  • WLAN wireless local area network
  • the display 160 may be used to display test results during the testing of the computing device 100.
  • the network interface 165 may be used to receive test signals from testing equipment during the testing of the computing device 100.
  • the network interface may also be used to communicate test results or feedback to the testing equipment.
  • Figure 2 illustrates an example flow diagram for an example process 200 for testing a device, such as the computing device 100 of Figure 1, which utilizes separate default
  • the in-factory configuration data 122 and the post-factory configuration data 124 may be stored into the memory 120 (block 210).
  • the in- factory configuration data 122 and the post- factory configuration data 124 may be stored by an original equipment manufacturer responsible for constructing the CPU 110 or another standalone component of the computing device 100.
  • one or both of the in- factory configuration data 122 and the post- factory configuration data 124 may be stored into reprogrammable memory (e.g., using flashing techniques or other techniques) after electronically resetting the disabling component (e.g., the flag) in the factory or in the field.
  • the configuration controller 130 enables use of the in- factory configuration 122 for testing.
  • the configuration controller 130 enables the in- factory configuration 122 by copying the in-factory configuration 122 into the active configuration portion 126 of the memory 120.
  • the testing may involve the use of all functions enabled by the in-factory configuration 122 (which may be all functions that the computing device 100 is capable of) including the functions not enabled by the post-factory configuration 124.
  • the configuration controller 130 disables use of the in-factory configuration 122 subsequent to the testing using a disabling component in the memory 120 to prevent use of the in-factory configuration 122 and any functions not enabled by the post- factory configuration 124.
  • the disabling component may a flag preset to a first value enabling use of the in-factory configuration 122 on first power-up of the memory.
  • the configuration controller 130 disables the use of the in-factory configuration 122 by setting the flag to a second value that prevents the configuration controller 130 from reverting to the in-factory configuration.
  • the configuration controller 130 enables use of the post-factory configuration 124 for performing functions enabled by the post-factory configuration 124.
  • the functions enabled by the post- factory configuration 124 may not be all of the functions that the computing device is capable of, as described above.
  • the configuration controller 130 enables the post-factory configuration 124 by copying the post-factory
  • a unique password for using the post-factory configuration 124 may be stored into a protected portion of the memory 120. As described above, the storing this unique password into the protected portion of the memory 120 may act as a triggering event resulting in the configuration controller 130 performing the enabling of the post-factory configuration 124 at block 240.

Abstract

An example method includes enabling use of a first configuration for testing a computing device, data indicative of the first configuration being stored in a memory, the memory further storing data indicative of a second configuration, the first configuration enabling at least one function not enabled by the second configuration, the testing including use of functions enabled by the first configuration including the functions not enabled by the second configuration, disabling use of the first configuration subsequent to the testing to prevent use of the functions not enabled by the second configuration; and enabling use of the second configuration for performing functions enabled by the second configuration.

Description

CONFIGURATIONS FOR IN-FACTORY AND POST-FACTORY USE BACKGROUND
[0001] Products with embedded firmware can require significant testing and/or handling when in the factory being assembled. Such testing and handling may require individuals to access various aspects of components of the products. When products are in the market, an end customer or field engineer often needs to restore the configuration to its initial fresh out of box conditions often called Factory Defaults. However, in the factory, the Factory Defaults are not sufficient and require manual or programmatic changes in the Factory Default configuration.
BRIEF DESCRIPTION OF THE DRAWINGS
[0001] For a more complete understanding of various examples, reference is now made to the following description taken in connection with the accompanying drawings in which:
[0002] Figure 1 illustrates an example computing device; and
[0003] Figure 2 illustrates an example flow diagram for an example process for configuring an example computing device.
DETAILED DESCRIPTION
[0004] Example systems and methods described herein provide an in- factory configuration that may be programmed in firmware, thereby eliminating any manual or programmatic steps to create the configuration needed to handle or test a product in the factory, for example. When testing has been completed, the example systems and methods disable the in-factory
configuration and enable a post- factory configuration for the end-user. This saves the factory cost and time for every single assembled unit. For example, factory workers are not required to remember and enter a password for each component or function.
[0005] Some of the differences in configuration requirements within the factory compared to at the customer site include, for example:
• Internet connection (Ipv4 vs ipv6, DHCP vs Static IP, etc.)
• Passwords in the factory are typically a single well known password so as to reduce cost.
However, shipping a product with a well-known password is forbidden by security requirements. [0006] Example systems and methods described herein remove the per-unit cost of manually or programmatically modifying each unit to have a configuration for testing, and replace it with a one-time cost of defining the in-factory configuration for firmware developers to include this in- factory configuration inside the code. Also, firmware controls are added to apply this configuration at the beginning of life of the firmware and to apply the customer configuration (the post-factory configuration) and disable the in-factory configuration (e.g., as the last manufacturing step) after factory testing is complete. A factory system or field engineer can revert back to the in-factory configuration by completely reprogramming the entire portion of memory where the in-factory configuration is stored.
[0007] Referring now to the figures, Figure 1 illustrates an example computing device 100 that may utilize an example configuration controller 130 to selectively control usage of separate default configurations for in-factory testing and for post-factory use. The configuration controller 130 may be implemented in software, firmware and/or hardware. The example computing device 100 may include embedded firmware and hardware components in order to provide for multiple configurations including, a first configuration for in-factory testing and a second configuration for post-factory use (e.g., end customer use). The example computing device 100 may be any type of computing device such as a portable computer or communication device, a standalone server computer, a blade server, etc. The example computing device 100 may include a CPU (central processing unit) 110, at least one memory device 120, and a power supply 140. The power supply 140 is coupled to an electrical interface 145 that is coupled to an external power supply such as an AC power supply 150.
[0008] The computing device 100 may include an operating system component 155 including, for example, an operating system driver component and a pre-boot BIOS (Basic Input/Output System) component stored in ROM (read only memory), and coupled to the CPU 110. In various examples, the CPU 110 may have a non-transitory memory device 120. In various examples, the memory device 120 may have one or more of ROM, programmable flash memory or erasable programmable ROM (EPROM). In various examples, the memory device 120 may be integrally formed with the CPU 120 or may be an external memory device. The memory device 120 may include program code that may be executed by the CPU 120. For example, one or more processes may be performed to execute a user control interface 175 and/or software applications 180. [0009] The memory device 120 also stores data 122 indicative of the in-factory configuration and data 124 indicative of the post factory configuration. The memory device 120 also provides a portion of memory 126 designated for the active configuration which may be either the in- factory configuration 122 or the post -factory configuration 124, as described below.
[0010] By separating the configuration data into two separate sets of parameters in non- transitory memory, and defining rules governing how and when each set of parameters is copied into the active configuration portion 126, the computing device 100 may be tested using the in- factory configuration 122 and delivered to the end customer using the post- factory configuration 124 without any specialized manual or programmatic steps. In various examples, the in-factory configuration 122 is designed to enable access to any or all function that the computing device 100 is capable of performing such that each function may be tested. In contrast, the post-factory configuration 124 may be designed to enable access to a first portion of the functions and not enable access to a second portion of the functions. This may be done such that units with different capabilities may be designed for different customers (e.g., one customer may desire a high-end device, one customer may desire a medium capability device and another customer may desire a low-end device.
[0011] The memory 120 provides a disabling component that may be used to disable the use of the in-factory configuration 122 and prevent an end-user from reverting back to the in-factory configuration 122. In various examples, the disabling component is a flag that is preset to a first value enabling use of the in-factory configuration 122 on first power-up of the memory. After testing has been completed, the configuration controller 130 may disable the use of the in-factory configuration 122 by setting the flag to a second value that prevents the configuration controller 130 from reverting to the in-factory configuration 122.
[0012] In various examples, the in-factory configuration 122 and the post-factory
configuration 124 are stored in reprogrammable memory. In these examples, the disabling component can be reset electronically, in the factory or in the field, and new versions of the in- factory configuration 122 and/or the post-factory configuration 124 may be stored into the reprogrammable memory subsequent to resetting the disabling component.
[0013] In various examples, the in-factory configuration 122 may have low-level security settings. For examples, the settings may include no password or a commonly shared password used factory- wide. Having no password or a commonly shared password may speed up the testing process. In various examples, the memory 120 provides a protected portion of memory, separate from the in-factory configuration 122 or the post-factory configuration 124, which is reserved for a unique password (sometimes referred to as an administrator password) that is in no other similar computing device or system. Installation of this unique password into the protected portion of the memory 120 may act as a triggering event telling the configuration controller 130 that the factory testing work is done and the computing device 100 is ready for the customer. Upon permanent storage of this unique password, the configuration controller 130 may then copy the post- factory configuration 124 into the active configuration memory portion 126. In various examples, as described above, the configuration controller 130 may store a flag in non-erasable, nonprogrammable, non-customer-accessible memory to prevent reversal of this transition.
[0014] The computing device 100 may also include a display 160, a network interface 165 and other hardware 170 known to those skilled in the art. The network interface 165 may be coupled to a network such as an intranet, a local area network (LAN), a wireless local area network (WLAN), the Internet, etc., where the other underlying components are a part of the network or at least coupled to the network.
[0015] The display 160 may be used to display test results during the testing of the computing device 100. The network interface 165 may be used to receive test signals from testing equipment during the testing of the computing device 100. The network interface may also be used to communicate test results or feedback to the testing equipment.
[0016] Figure 2 illustrates an example flow diagram for an example process 200 for testing a device, such as the computing device 100 of Figure 1, which utilizes separate default
configurations for in-factory testing and post-factory use. The process 200 is exemplary only and may be modified. The example process 200 of Figure 2 will now be described with further references to Figure 1.
[0017] Referring now to Figure 2, the in-factory configuration data 122 and the post-factory configuration data 124 may be stored into the memory 120 (block 210). For example, the in- factory configuration data 122 and the post- factory configuration data 124 may be stored by an original equipment manufacturer responsible for constructing the CPU 110 or another standalone component of the computing device 100. In addition, as described above, one or both of the in- factory configuration data 122 and the post- factory configuration data 124 may be stored into reprogrammable memory (e.g., using flashing techniques or other techniques) after electronically resetting the disabling component (e.g., the flag) in the factory or in the field.
[0018] At block 220, the configuration controller 130 enables use of the in- factory configuration 122 for testing. In various examples, the configuration controller 130 enables the in- factory configuration 122 by copying the in-factory configuration 122 into the active configuration portion 126 of the memory 120. The testing may involve the use of all functions enabled by the in-factory configuration 122 (which may be all functions that the computing device 100 is capable of) including the functions not enabled by the post-factory configuration 124.
[0019] At block 230, the configuration controller 130 disables use of the in-factory configuration 122 subsequent to the testing using a disabling component in the memory 120 to prevent use of the in-factory configuration 122 and any functions not enabled by the post- factory configuration 124. In various examples, the disabling component may a flag preset to a first value enabling use of the in-factory configuration 122 on first power-up of the memory. In these examples, the configuration controller 130 disables the use of the in-factory configuration 122 by setting the flag to a second value that prevents the configuration controller 130 from reverting to the in-factory configuration.
[0020] At block 240, the configuration controller 130 enables use of the post-factory configuration 124 for performing functions enabled by the post-factory configuration 124. The functions enabled by the post- factory configuration 124 may not be all of the functions that the computing device is capable of, as described above. In various examples, the configuration controller 130 enables the post-factory configuration 124 by copying the post-factory
configuration 124 into the active configuration portion 126 of the memory 120.
[0021] In various examples, at block 240, a unique password for using the post-factory configuration 124 may be stored into a protected portion of the memory 120. As described above, the storing this unique password into the protected portion of the memory 120 may act as a triggering event resulting in the configuration controller 130 performing the enabling of the post-factory configuration 124 at block 240.
[0022] Various examples described herein are described in the general context of method steps or processes, which may be implemented in one example by a software program product or component, embodied in a machine-readable medium, including executable instructions, such as program code, executed by entities in networked environments. Generally, program modules may include routines, programs, objects, components, data structures, etc. which may be designed to perform particular tasks or implement particular abstract data types. Executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps or processes.
[0023] Software implementations of various examples can be accomplished with standard programming techniques with rule-based logic and other logic to accomplish various database searching steps or processes, correlation steps or processes, comparison steps or processes and decision steps or processes.
[0024] The foregoing description of various examples has been presented for purposes of illustration and description. The foregoing description is not intended to be exhaustive or limiting to the examples disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of various examples. The examples discussed herein were chosen and described in order to explain the principles and the nature of various examples of the present disclosure and its practical application to enable one skilled in the art to utilize the present disclosure in various examples and with various modifications as are suited to the particular use contemplated. The features of the examples described herein may be combined in all possible combinations of methods, apparatus, modules, systems, and computer program products.
[0025] It is also noted herein that while the above describes examples, these descriptions should not be viewed in a limiting sense. Rather, there are several variations and modifications which may be made without departing from the scope as defined in the appended claims.

Claims

WHAT IS CLAIMED IS:
1. A device, comprising:
a memory storing data indicative of a first configuration for in-factory use and data indicative of a second configuration for post-factory use, the first configuration enabling at least one function not enabled by the second configuration; and
a processor to execute a configuration controller, the configuration controller to:
enable use of the first configuration for testing, the testing including use of functions enabled by the first configuration including the functions not enabled by the second configuration;
disable use of the first configuration subsequent to the testing to prevent use of the functions not enabled by the second configuration; and
enable use of the second configuration for performing functions enabled by the second configuration.
2. The device of claim 1, wherein the first configuration data and the second configuration data are stored in reprogrammable memory.
3. The device of claim 1, wherein the memory includes a disabling component for disabling use of the first configuration, wherein the disabling component comprises a flag preset to a first value enabling use of the first configuration on first power-up of the memory and the
configuration controller disables use of the first configuration by setting the flag to a second value that prevents the configuration controller from reverting to the first configuration.
4. The device of claim 1, wherein the first configuration has a low-level security settings.
5. The device of claim 1, wherein, the configuration controller enables the first configuration and the second configuration by copying the first configuration and the second configuration, respectively, into an active configuration portion of the memory.
6. The device of claim 1, wherein a unique password for using the second configuration is stored into a protected portion of the memory when the configuration controller enables the use of the second configuration.
7. A method, comprising:
enabling use of a first configuration for testing a computing device, data indicative of the first configuration being stored in a memory, the memory further storing data indicative of a second configuration, the first configuration enabling at least one function not enabled by the second configuration, the testing including use of functions enabled by the first configuration including the functions not enabled by the second configuration;
disabling use of the first configuration subsequent to the testing to prevent use of the functions not enabled by the second configuration; and
enabling use of the second configuration for performing functions enabled by the second configuration.
8. The method of claim 7, wherein the first configuration data and the second configuration data are stored in reprogrammable memory, the method further comprising:
storing new versions of at least one of the first configuration data or the second configuration data into the reprogrammable memory.
9. The method of claim 7, wherein the memory includes a disabling component for disabling use of the first configuration, wherein the disabling component comprises a flag preset to a first value enabling use of the first configuration on first power-up of the memory, the method further comprising disabling use of the first configuration by setting the flag to a second value that prevents reverting to the first configuration.
10. The method of claim 7, wherein, enabling the first configuration and the second
configuration comprises copying the first configuration and the second configuration, respectively, into an active configuration portion of the memory.
11. The method of claim 7, further comprising storing a unique password for using the second configuration into a protected portion of the memory when enabling the use of the second configuration.
12. A computer program product, embodied on a non-transitory computer-readable medium, comprising:
computer code to enable use of a first configuration for testing a computing device, data indicative of the first configuration being stored in a memory, the memory also storing data indicative of a second configuration, the first configuration enabling at least one function not enabled by the second configuration, the testing including use of functions enabled by the first configuration including the functions not enabled by the second configuration;
computer code to disable use of the first configuration subsequent to the testing to prevent use of the functions not enabled by the second configuration; and
computer code to enable use of the second configuration for performing functions enabled by the second configuration.
13. The computer program product of claim 12, wherein the first configuration data and the second configuration data are stored in reprogrammable memory, the computer program product further comprising:
computer code to store new versions of at least one of the first configuration data or the second configuration data into the reprogrammable memory.
14. The computer program product of claim 12, wherein the memory includes a disabling component for disabling use of the first configuration, wherein the disabling component comprises a flag preset to a first value enabling use of the first configuration on first power-up of the memory, the computer program product further comprising computer code for disabling use of the first configuration by setting the flag to a second value that prevents reverting to the first configuration.
15. The computer program product of claim 12, wherein, the computer code for enabling the first configuration and the second configuration comprises computer code for copying the first configuration and the second configuration, respectively, into an active configuration portion of the memory.
PCT/US2015/014010 2015-01-31 2015-01-31 Configurations for in-factory and post-factory use WO2016122677A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2015/014010 WO2016122677A1 (en) 2015-01-31 2015-01-31 Configurations for in-factory and post-factory use

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2015/014010 WO2016122677A1 (en) 2015-01-31 2015-01-31 Configurations for in-factory and post-factory use

Publications (1)

Publication Number Publication Date
WO2016122677A1 true WO2016122677A1 (en) 2016-08-04

Family

ID=56544093

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/014010 WO2016122677A1 (en) 2015-01-31 2015-01-31 Configurations for in-factory and post-factory use

Country Status (1)

Country Link
WO (1) WO2016122677A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6353885B1 (en) * 1999-01-26 2002-03-05 Dell Usa, L.P. System and method for providing bios-level user configuration of a computer system
US20060020844A1 (en) * 2004-07-22 2006-01-26 Gibbons Patrick L Recovery of custom BIOS settings
US20060265582A1 (en) * 2005-05-18 2006-11-23 Chao-Tsung Fan Method for updating factory default settings and boot loaders in an embedded system
US20070255934A1 (en) * 2006-04-28 2007-11-01 Dennis Lowell B System and method for maintaining multiple information handling system configuration images
WO2012175495A1 (en) * 2011-06-20 2012-12-27 Thomson Licensing Method for restoring configuration settings of a cpe device to factory default settings, and cpe device using the method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6353885B1 (en) * 1999-01-26 2002-03-05 Dell Usa, L.P. System and method for providing bios-level user configuration of a computer system
US20060020844A1 (en) * 2004-07-22 2006-01-26 Gibbons Patrick L Recovery of custom BIOS settings
US20060265582A1 (en) * 2005-05-18 2006-11-23 Chao-Tsung Fan Method for updating factory default settings and boot loaders in an embedded system
US20070255934A1 (en) * 2006-04-28 2007-11-01 Dennis Lowell B System and method for maintaining multiple information handling system configuration images
WO2012175495A1 (en) * 2011-06-20 2012-12-27 Thomson Licensing Method for restoring configuration settings of a cpe device to factory default settings, and cpe device using the method

Similar Documents

Publication Publication Date Title
US10789076B2 (en) Methods, apparatus and articles of manufacture to update virtual machine templates
KR101498614B1 (en) Apparatus and method of deactivating malicious codes
EP3361331B1 (en) Method and apparatus for controlling and managing an industry process
US20150128122A1 (en) Systems and Methods for Updating Software
EP3113419B1 (en) Network accessing method and router
CN104461594B (en) The upgrade method and device of embedded OS
CN106775981B (en) Process processing method and device and computer readable medium
CN109918187B (en) Task scheduling method, device, equipment and storage medium
US11368366B2 (en) Group policy object update compliance and synchronization
WO2014040458A1 (en) Systems and methods for repairing system files
EP3304403B1 (en) Method for the secure booting of a computer system and computer system
WO2018019424A1 (en) Integrated subscriber identity module having a core os and an application os
CN105243012A (en) Linux based cluster network performance evaluating method
CN112162825A (en) Equipment configuration method, device, equipment and storage medium
CN108702395A (en) Wireless mesh network is formed
US10585665B2 (en) Setting a build indicator to enable or disable a feature
US20200099583A1 (en) Approach to defining computer system configuration definitions
CN112130491B (en) Device state control method and device, storage medium and electronic device
WO2016122677A1 (en) Configurations for in-factory and post-factory use
CN111158769A (en) Method and device for checking and modifying BIOS (basic input output System) options
CN112000508A (en) Starting repair method of ARM server and related device
CN110187890B (en) Project deployment method, electronic equipment and storage medium
US20180041499A1 (en) System and method for securing ipmi remote authenticated key-exchange protocol (rakp) over hash cracks
CN115421859A (en) Dynamic loading method and device of configuration file, computer equipment and storage medium
CN108958823A (en) The method for modifying basic input output system setting value

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15880567

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15880567

Country of ref document: EP

Kind code of ref document: A1