CA2424508C - Internet-enabled device provisioning, upgrade and recovery mechanism - Google Patents

Internet-enabled device provisioning, upgrade and recovery mechanism Download PDF

Info

Publication number
CA2424508C
CA2424508C CA 2424508 CA2424508A CA2424508C CA 2424508 C CA2424508 C CA 2424508C CA 2424508 CA2424508 CA 2424508 CA 2424508 A CA2424508 A CA 2424508A CA 2424508 C CA2424508 C CA 2424508C
Authority
CA
Canada
Prior art keywords
partition
script
partitions
computing device
partition table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA 2424508
Other languages
French (fr)
Other versions
CA2424508A1 (en
Inventor
Andre Francois Viljoen
Pieter Bernardus Truter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intrinsyc Software International Inc
Intrinsyc Software Inc
Original Assignee
Intrinsyc Software International Inc
Intrinsyc Software Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CA002380762A external-priority patent/CA2380762A1/en
Application filed by Intrinsyc Software International Inc, Intrinsyc Software Inc filed Critical Intrinsyc Software International Inc
Priority to CA 2424508 priority Critical patent/CA2424508C/en
Publication of CA2424508A1 publication Critical patent/CA2424508A1/en
Application granted granted Critical
Publication of CA2424508C publication Critical patent/CA2424508C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4416Network booting; Remote initial program loading [RIPL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1417Boot up procedures

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The invention consists of a boot loader for a device, comprising an IP stack supporting Internet protocols, and a scripting engine to run a default script. The IP stack includes address discovery service (for example, BOOTP and DHCP), a URI to IP address translator (for example, DNS), and a protocol for file transfer over the Internet (for example, HTTP, FTP and/or TFTP). On start-up of the device, the boot loader runs the default script to initialize the device and verify the integrity of any data and operating systems in memory on the device.

Claims (23)

1. A computing device including a boot loader having an IP
stack containing an address discovery service, a URI to IP
address translator and one or more Internet file transfer protocol comprising:

a) a script engine operative to use a default script to initialize said device, including verifying the integrity of any data and operating systems in memory on said device;

b) an IP stack containing an address discovery service, a URI to IP address translator and one or more internet file transfer protocols; and c) a boot loader operating system and drivers operating to cause said Internet file transfer protocols to download an operating system over the Internet.
2. The computing device according to claim 1, wherein said script engine uses said default script to verify a primary partition table and a secondary partition table in memory on said device, said primary partition table and said secondary partition table being identical in content, and said content being partition metadata describing one or more partitions in memory on said device and said initialization further including generating and verifying said partitions in memory on said device using said partition metadata.
3. The computing device according to claim 1, further comprising a user interface operative to allow a user to interrupt said default script.
4. The computing device according to claim 1, wherein said default script can be replaced with a script downloaded from a remote server.
5. The computing device according to claim 2, wherein said partition metadata consists of a URI for additional scripts to generate content for an individual partition.
6. The computing device according to claim 5, wherein said additional scripts can further be used to update said partition metadata.
7. The computing device according to claim 2, wherein said partition table script is downloaded from a remote server.
8. The computing device according to claim 1, wherein said scripting engine supports security protocols to authenticate a remote server for downloaded data.
9. The computing device according to claim 1, wherein said scripting engine supports security protocols to obfuscate the content of downloaded data.
10. The computing device according to claim 1, wherein said scripting engine supports security protocols to authenticate the origin of downloaded data.
11. The computing device according to claim 2, wherein said default script provides instructions to download said partition table script and generate said partition tables and said partitions upon every boot-up of said device, regardless of the status of any existing partition tables and partitions.
12. The computing device according to claim 2, wherein said partition tables and said partitions are located in different units of physical memory on said device.
13. A method of booting a device, comprising:

a) providing a boot loader, said boot loader having a script engine and an IP stack containing an address discovery service, a URI to IP address translator and one or more Internet file transfer protocols;

b) reading and executing a default script to initialize said device, said default script including logic for verifying the integrity of any data and operating systems in memory on said device.
14. The method according to claim 13, wherein said default script includes the steps of:

a) generating a primary partition table and a secondary partition table in memory on said device using a partition table script, said primary partition table and said secondary partition table being identical in content, and said content being partition metadata describing one or more partitions in memory on said device;

b) verifying said primary partition table and said secondary partition table against said partition table script;
c) generating said one or more partitions using said metadata on said primary partition; and d) verifying said one or more partitions against said partition metadata.
15. The method according to claim 13, wherein said computing device includes a user interface and including the additional step of checking for input from said user interface to interrupt said default script.
16. The method according to claim 14, wherein said partition metadata is a URI for a script to create content for each individual partition.
17. The method according to claim 14, wherein step b) returns to and repeats step a) in the event that validation of said partition tables fails.
18. The method according to claim 14, wherein step d) returns to and repeats step c) in the event that validation of said partitions fails.
19. The method according to claim 13, wherein said scripting engine supports security protocols to authenticate a remote server for downloaded data.
20. The method according to claim 13, wherein said scripting engine supports security protocols to obfuscate the content of downloaded data.
21. The method according to claim 13, wherein said scripting engine supports security protocols to authenticate the origin of downloaded data.
22. The method according to claim 14, wherein said default script provides instructions to download said partition table script and generate said partition tables and said partitions upon every boot of said device, regardless of the status of any existing partition tables and partitions.
23. The method according to claim 14, wherein said partition tables and said partitions are located in different units of physical memory on said device.
CA 2424508 2002-04-04 2003-04-04 Internet-enabled device provisioning, upgrade and recovery mechanism Expired - Fee Related CA2424508C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2424508 CA2424508C (en) 2002-04-04 2003-04-04 Internet-enabled device provisioning, upgrade and recovery mechanism

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CA2,380,762 2002-04-04
CA002380762A CA2380762A1 (en) 2002-04-04 2002-04-04 Internet-enabled device provisioning, upgrade and recovery mechanism
CA 2424508 CA2424508C (en) 2002-04-04 2003-04-04 Internet-enabled device provisioning, upgrade and recovery mechanism

Publications (2)

Publication Number Publication Date
CA2424508A1 CA2424508A1 (en) 2003-10-04
CA2424508C true CA2424508C (en) 2011-12-20

Family

ID=29216704

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2424508 Expired - Fee Related CA2424508C (en) 2002-04-04 2003-04-04 Internet-enabled device provisioning, upgrade and recovery mechanism

Country Status (1)

Country Link
CA (1) CA2424508C (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314421B (en) 2010-06-29 2014-12-10 中兴通讯股份有限公司 Self-rescuing method and self rescuing device for file system after being damaged

Also Published As

Publication number Publication date
CA2424508A1 (en) 2003-10-04

Similar Documents

Publication Publication Date Title
CN107534647B (en) System, computing device, and storage medium for transmitting startup script
US7350068B2 (en) Server blade network boot method that minimizes required network bandwidth
JP4746393B2 (en) Method, system, and apparatus for isolating software distribution over a network from outside malicious intrusions
US7207039B2 (en) Secure booting and provisioning
US7379982B2 (en) System and method for custom installation of an operating system on a remote client
EP1491983B1 (en) Three Way Validation and Authentication of Boot Files Transmitted from Server to Client
US20060230165A1 (en) Method and apparatus for provisioning network infrastructure
US10572393B2 (en) Object memory management unit
JP5549038B2 (en) Method for booting network computing device, server and computer system for implementing the method
CN107391193A (en) A kind of client, the system and method for configuration server
CN106572200A (en) IP address configuration method and IP address configuration device for baseboard management controller BMC
US20120005321A1 (en) Router and remote boot method using the router
CN106911729A (en) A kind of operating system remote installation method suitable for domestic processor
EP3286652A1 (en) Object memory management unit
US20090254641A1 (en) Network card capable of remote boot and method thereof
CN102468992A (en) PXE function test system and method
CN104615455A (en) Remote upgrading method and device for IPMC program of ATCA structure
US20050132360A1 (en) Network boot sequence in the absence of a DHCP server
CN113741914B (en) Operating system installation mechanism
CA2424508C (en) Internet-enabled device provisioning, upgrade and recovery mechanism
CN109819027A (en) A kind of server system remote start-up method, device, equipment and storage medium
US8707402B1 (en) Secure computer provisioning
Cisco Loading System Images and Configuration Files
Cisco Installing a PIX Firewall
Cisco System Image, Microcode Image, and Configuration File Load Comma

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20190404