CA2424508C - Internet-enabled device provisioning, upgrade and recovery mechanism - Google Patents
Internet-enabled device provisioning, upgrade and recovery mechanism Download PDFInfo
- Publication number
- CA2424508C CA2424508C CA 2424508 CA2424508A CA2424508C CA 2424508 C CA2424508 C CA 2424508C CA 2424508 CA2424508 CA 2424508 CA 2424508 A CA2424508 A CA 2424508A CA 2424508 C CA2424508 C CA 2424508C
- Authority
- CA
- Canada
- Prior art keywords
- partition
- script
- partitions
- computing device
- partition table
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4416—Network booting; Remote initial program loading [RIPL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1417—Boot up procedures
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Stored Programmes (AREA)
Abstract
The invention consists of a boot loader for a device, comprising an IP stack supporting Internet protocols, and a scripting engine to run a default script. The IP stack includes address discovery service (for example, BOOTP and DHCP), a URI to IP address translator (for example, DNS), and a protocol for file transfer over the Internet (for example, HTTP, FTP and/or TFTP). On start-up of the device, the boot loader runs the default script to initialize the device and verify the integrity of any data and operating systems in memory on the device.
Claims (23)
1. A computing device including a boot loader having an IP
stack containing an address discovery service, a URI to IP
address translator and one or more Internet file transfer protocol comprising:
a) a script engine operative to use a default script to initialize said device, including verifying the integrity of any data and operating systems in memory on said device;
b) an IP stack containing an address discovery service, a URI to IP address translator and one or more internet file transfer protocols; and c) a boot loader operating system and drivers operating to cause said Internet file transfer protocols to download an operating system over the Internet.
stack containing an address discovery service, a URI to IP
address translator and one or more Internet file transfer protocol comprising:
a) a script engine operative to use a default script to initialize said device, including verifying the integrity of any data and operating systems in memory on said device;
b) an IP stack containing an address discovery service, a URI to IP address translator and one or more internet file transfer protocols; and c) a boot loader operating system and drivers operating to cause said Internet file transfer protocols to download an operating system over the Internet.
2. The computing device according to claim 1, wherein said script engine uses said default script to verify a primary partition table and a secondary partition table in memory on said device, said primary partition table and said secondary partition table being identical in content, and said content being partition metadata describing one or more partitions in memory on said device and said initialization further including generating and verifying said partitions in memory on said device using said partition metadata.
3. The computing device according to claim 1, further comprising a user interface operative to allow a user to interrupt said default script.
4. The computing device according to claim 1, wherein said default script can be replaced with a script downloaded from a remote server.
5. The computing device according to claim 2, wherein said partition metadata consists of a URI for additional scripts to generate content for an individual partition.
6. The computing device according to claim 5, wherein said additional scripts can further be used to update said partition metadata.
7. The computing device according to claim 2, wherein said partition table script is downloaded from a remote server.
8. The computing device according to claim 1, wherein said scripting engine supports security protocols to authenticate a remote server for downloaded data.
9. The computing device according to claim 1, wherein said scripting engine supports security protocols to obfuscate the content of downloaded data.
10. The computing device according to claim 1, wherein said scripting engine supports security protocols to authenticate the origin of downloaded data.
11. The computing device according to claim 2, wherein said default script provides instructions to download said partition table script and generate said partition tables and said partitions upon every boot-up of said device, regardless of the status of any existing partition tables and partitions.
12. The computing device according to claim 2, wherein said partition tables and said partitions are located in different units of physical memory on said device.
13. A method of booting a device, comprising:
a) providing a boot loader, said boot loader having a script engine and an IP stack containing an address discovery service, a URI to IP address translator and one or more Internet file transfer protocols;
b) reading and executing a default script to initialize said device, said default script including logic for verifying the integrity of any data and operating systems in memory on said device.
a) providing a boot loader, said boot loader having a script engine and an IP stack containing an address discovery service, a URI to IP address translator and one or more Internet file transfer protocols;
b) reading and executing a default script to initialize said device, said default script including logic for verifying the integrity of any data and operating systems in memory on said device.
14. The method according to claim 13, wherein said default script includes the steps of:
a) generating a primary partition table and a secondary partition table in memory on said device using a partition table script, said primary partition table and said secondary partition table being identical in content, and said content being partition metadata describing one or more partitions in memory on said device;
b) verifying said primary partition table and said secondary partition table against said partition table script;
c) generating said one or more partitions using said metadata on said primary partition; and d) verifying said one or more partitions against said partition metadata.
a) generating a primary partition table and a secondary partition table in memory on said device using a partition table script, said primary partition table and said secondary partition table being identical in content, and said content being partition metadata describing one or more partitions in memory on said device;
b) verifying said primary partition table and said secondary partition table against said partition table script;
c) generating said one or more partitions using said metadata on said primary partition; and d) verifying said one or more partitions against said partition metadata.
15. The method according to claim 13, wherein said computing device includes a user interface and including the additional step of checking for input from said user interface to interrupt said default script.
16. The method according to claim 14, wherein said partition metadata is a URI for a script to create content for each individual partition.
17. The method according to claim 14, wherein step b) returns to and repeats step a) in the event that validation of said partition tables fails.
18. The method according to claim 14, wherein step d) returns to and repeats step c) in the event that validation of said partitions fails.
19. The method according to claim 13, wherein said scripting engine supports security protocols to authenticate a remote server for downloaded data.
20. The method according to claim 13, wherein said scripting engine supports security protocols to obfuscate the content of downloaded data.
21. The method according to claim 13, wherein said scripting engine supports security protocols to authenticate the origin of downloaded data.
22. The method according to claim 14, wherein said default script provides instructions to download said partition table script and generate said partition tables and said partitions upon every boot of said device, regardless of the status of any existing partition tables and partitions.
23. The method according to claim 14, wherein said partition tables and said partitions are located in different units of physical memory on said device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2424508 CA2424508C (en) | 2002-04-04 | 2003-04-04 | Internet-enabled device provisioning, upgrade and recovery mechanism |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2,380,762 | 2002-04-04 | ||
CA002380762A CA2380762A1 (en) | 2002-04-04 | 2002-04-04 | Internet-enabled device provisioning, upgrade and recovery mechanism |
CA 2424508 CA2424508C (en) | 2002-04-04 | 2003-04-04 | Internet-enabled device provisioning, upgrade and recovery mechanism |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2424508A1 CA2424508A1 (en) | 2003-10-04 |
CA2424508C true CA2424508C (en) | 2011-12-20 |
Family
ID=29216704
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA 2424508 Expired - Fee Related CA2424508C (en) | 2002-04-04 | 2003-04-04 | Internet-enabled device provisioning, upgrade and recovery mechanism |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2424508C (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102314421B (en) | 2010-06-29 | 2014-12-10 | 中兴通讯股份有限公司 | Self-rescuing method and self rescuing device for file system after being damaged |
-
2003
- 2003-04-04 CA CA 2424508 patent/CA2424508C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CA2424508A1 (en) | 2003-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107534647B (en) | System, computing device, and storage medium for transmitting startup script | |
US7350068B2 (en) | Server blade network boot method that minimizes required network bandwidth | |
JP4746393B2 (en) | Method, system, and apparatus for isolating software distribution over a network from outside malicious intrusions | |
US7207039B2 (en) | Secure booting and provisioning | |
US7379982B2 (en) | System and method for custom installation of an operating system on a remote client | |
EP1491983B1 (en) | Three Way Validation and Authentication of Boot Files Transmitted from Server to Client | |
US20060230165A1 (en) | Method and apparatus for provisioning network infrastructure | |
US10572393B2 (en) | Object memory management unit | |
JP5549038B2 (en) | Method for booting network computing device, server and computer system for implementing the method | |
CN107391193A (en) | A kind of client, the system and method for configuration server | |
CN106572200A (en) | IP address configuration method and IP address configuration device for baseboard management controller BMC | |
US20120005321A1 (en) | Router and remote boot method using the router | |
CN106911729A (en) | A kind of operating system remote installation method suitable for domestic processor | |
EP3286652A1 (en) | Object memory management unit | |
US20090254641A1 (en) | Network card capable of remote boot and method thereof | |
CN102468992A (en) | PXE function test system and method | |
CN104615455A (en) | Remote upgrading method and device for IPMC program of ATCA structure | |
US20050132360A1 (en) | Network boot sequence in the absence of a DHCP server | |
CN113741914B (en) | Operating system installation mechanism | |
CA2424508C (en) | Internet-enabled device provisioning, upgrade and recovery mechanism | |
CN109819027A (en) | A kind of server system remote start-up method, device, equipment and storage medium | |
US8707402B1 (en) | Secure computer provisioning | |
Cisco | Loading System Images and Configuration Files | |
Cisco | Installing a PIX Firewall | |
Cisco | System Image, Microcode Image, and Configuration File Load Comma |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20190404 |