EP1508091A4 - System update protocol and bootable cd controller with embedded operating system - Google Patents

System update protocol and bootable cd controller with embedded operating system

Info

Publication number
EP1508091A4
EP1508091A4 EP03741823A EP03741823A EP1508091A4 EP 1508091 A4 EP1508091 A4 EP 1508091A4 EP 03741823 A EP03741823 A EP 03741823A EP 03741823 A EP03741823 A EP 03741823A EP 1508091 A4 EP1508091 A4 EP 1508091A4
Authority
EP
European Patent Office
Prior art keywords
output device
client
peripheral output
software update
packed file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP03741823A
Other languages
German (de)
French (fr)
Other versions
EP1508091A1 (en
Inventor
Vincent Wu
Sheng Lee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Toshiba TEC Corp
Original Assignee
Toshiba Corp
Toshiba TEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/156,303 external-priority patent/US20030226139A1/en
Priority claimed from US10/156,521 external-priority patent/US20030226005A1/en
Application filed by Toshiba Corp, Toshiba TEC Corp filed Critical Toshiba Corp
Publication of EP1508091A1 publication Critical patent/EP1508091A1/en
Publication of EP1508091A4 publication Critical patent/EP1508091A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1203Improving or facilitating administration, e.g. print management
    • G06F3/1204Improving or facilitating administration, e.g. print management resulting in reduced user or operator actions, e.g. presetting, automatic actions, using hardware token storing data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1229Printer resources management or printer maintenance, e.g. device status, power levels
    • G06F3/123Software or firmware update, e.g. device firmware management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1285Remote printer device, e.g. being remote from client or server

Definitions

  • This invention is related to a communication protocol for updating files on a printer controller, and to the field of booting operating systems, particularly the type used for controllers of output peripheral components, such as network printers.
  • a printer controller which function is to control all printing functions on a related peripheral output device, will sometimes require files to be loaded from external distribution means for the purpose of providing software upgrades, new software installations, and/or batch configurations.
  • Some printers allow these tasks to be done by physically copying the files to the printer controller via a storage distribution device (e.g., CD-ROM, floppy drive, etc.), and then executing corresponding commands for setup and configuration through conventional input devices (e.g., mouse and keyboard) and a video display panel.
  • a storage distribution device e.g., CD-ROM, floppy drive, etc.
  • a workstation user may easily apply a patch for a certain component by running the self- extracting and self-installing patch file provided by a vendor.
  • the same patch may also be applied to the printer controller with the same components.
  • the printer lacks input device accommodations (e.g., monitor, keyboard), it is not easy to initiate the install process of such software updates.
  • What is needed is a client-server networking protocol that would facilitate uploading of the required file(s) to the printer controller, and issuing of any commands necessary for installation.
  • the controllers of network printers such as models SC-2 and GL-1010 controllers available from Toshiba, use the Microsoft Embedded NT operating system (OS).
  • OS Microsoft Embedded NT operating system
  • a controller CD-ROM is installed.
  • the CD-ROM is used to boot up the system, after which the updates are made to the OS software on the controller hard drive.
  • the software update is completed, the user must remove the CD-ROM and reboot the controller from the hard drive.
  • the controller accepts print jobs from a client.
  • the controller can also network with the client to set up system and user parameters, and can store print/scan jobs on the controller hard drive.
  • the above steps of booting from the CD and rebooting from the hard drive can be cumbersome and time consuming. Also, additional time and effort may often be expended in diagnosing and troubleshooting OS problems after a software update. Also, the hard drive can be unreliable storage medium, vulnerable to computer viruses and other sources of errors or loss of data. Also, the hard drive is an additional component that adds to the size and expense of the controller.
  • the present invention disclosed and claimed herein in one aspect thereof, comprises a system update protocol.
  • a software update is packed into a packed file, which packed file includes a unique signature.
  • the packed file is uploaded from a trusted client computer to the network printer.
  • the integrity of the packed file is automatically checked on the network printer by performing a checksum and signature comparison to ensure the packed file is transmitted correctly.
  • the packed file is resent from the client when the packed file is determined to be corrupt.
  • the packed file is unpacked into a predetermined directory structure of unpacked files.
  • the client computer then signals the network printer cause installation of the software update on the network printer.
  • printer controller which includes one or more non- volatile memory elements for storing print/fax/scan data and printer controller system parameters.
  • the non-volatile memory elements can include flash memory PCMCIA cards.
  • a nonvolatile storage medium is also provided for retaining an operating system, wherein the printer controller is bootable from the non-volatile storage medium.
  • the non-volatile storage medium is preferably a CD-ROM or other removable type data disc.
  • FIG. 1 illustrates a client/server protocol exchange flow diagram of the protocol
  • FIG. 2 illustrates a client/server system block diagram utilizing the disclosed protocol architecture
  • Fig. 3 depicts a bootable CD controller in accordance with the present invention.
  • the disclosed protocol architecture provides the capability of allowing the print controller to execute the installation commands after correctly receiving the file.
  • the disclosed system update protocol is not limited to a single underlying transport. It is designed to run on, for example, TCP/IP (Transmission Control Protocol/Internet Protocol - a Microsoft® protocol suite) and EPX/SPX (Internet Packet eXchange/Sequenced Packet eXchange - a Novell® communication protocol).
  • TCP/IP Transmission Control Protocol/Internet Protocol - a Microsoft® protocol suite
  • EPX/SPX Internet Packet eXchange/Sequenced Packet eXchange - a Novell® communication protocol.
  • the protocol consists of a reduced set of commands.
  • the one or more target files are packed (i.e., compressed into a single large file) into a packed file, and a signature is prepended to the packed file for security reasons.
  • the packed file may be optionally encrypted with a special agreed-upon key for added security.
  • FIG. 1 there is illustrated a client/server protocol exchange flow diagram of the protocol.
  • the horizontal lines between a client program flow diagram 100 and server program flow diagram 102 denote the direction and type of content of the network packets exchanged between the client program on a client and server program on the print controller (also denoted as a peripheral output device), while the vertical lines between the blocks of a flow diagram denote the flow of control.
  • the disclosed protocol consists of the following commands: SEND, to transfer a chunk of the target file; SENDEND, to signal the end of transferring; ACTION, to instruct the server what to do with the file; STATUS, to check the status of the action; and STATUSREPLY, to return the status of the transfer or action.
  • the server program 102 running on the printer controller is responsible for servicing these commands.
  • the client program 100 running on a workstation (or client) is the driver of a task, i.e., the client controls the processes on the printer controller.
  • Flow begins in a function block 104 where the client program 100 first "packs" all of the appropriate files into a single packed file, which single packed file includes a file header that contains a special signature recognized only by the printer controller (i.e., server program) and trusted client programs.
  • the signature may be encrypted by a variable key (e.g., based upon file size) so that it cannot simply be copied to another file header.
  • the client program 100 also appends a checksum to the end of the packed file. Thus the integrity of the packed file can be ascertained by checking both the unique signature and the checksum.
  • the server program 102 is currently in a "listen" mode, as indicated in a function block 106, awaiting incoming commands from a client. Flow is then to a function block 108 where the client program 100 performs a connect function by initiating a synchronization (i.e., also denoted as "synch") operation over a flow line 110 to the function block 106 of the server program 102 in order to establish a reliable connection to the printer controller.
  • the server program 102 responds with synch commands over a flow line 112 to the function block 108.
  • two listening sockets will be opened; one for TCP/IP traffic, and another for IPX/SPX traffic.
  • Flow in the client program 100 is then to a function block 114 where the packed file is transmitted to the printer controller through a sequence of SEND commands.
  • the client program 100 then issues the sequence of SEND commands to the server program 102, as indicated by a signal flow line 116 to a function block 118, to transfer the packed file to the printer controller.
  • Flow in the server program 102 is to the function block 118 where the SEND commands are received, and the received file segments associated with the sequence of the SEND commands are written as a single data file set.
  • flow in the client program 100 is to a function block 120 where the client program 100 transmits a SENDEND command to the server program 102, as indicated by a signal flow line 122 to a function block 124.
  • Flow in the server program 102 is to the function block 124 where after the last file segment has been received, and the server program 102 closes the data file.
  • the server program 102 receives SENDEND command, it will have received the entire file.
  • Flow in the client program 100 is then to a function block 126 where the client program 100 queries the server program 102 for the status of the file transmission by sending the STATUS command, as indicated by a signal flow line 128 to a function block 130.
  • Flow in the server program 102 is to the function block 130 where the data file is unpacked, and a "sanity" check is performed to determine if the file was correctly transmitted, i.e., by authenticating the signature, recalculating the checksum, etc.
  • flow in the server program 102 is to a function block 132 where the printer controller sends back a "processing" Reply signal to the client program 100, as indicated by a signal flow line 134 to a function block 136.
  • flow continues to a decision block 138 to determine if the received packed file passed the sanity check. If not, flow is out the "N" path to a function block 140, where the packed file is deleted. Flow then loops back to the input of the function block 118 to receive the next retransmission of the packed file.
  • the server program 102 also signals the client program 100 in the Reply signal of packed file failing the sanity check (i.e., a "corrupted" file). Flow in the client program 100 is to the function block 136 where the status Reply is received. The client program 100 then interrogates the received status Reply signal, as indicated in a decision block 142. If the Reply signal indicates that the server program 102 is in a state of "processing,” flow is out the "P" path back to the input of the function block 126 to continue querying the server program 102.
  • the printer controller includes a readable storage medium, e.g., hard disk drive, or a sufficient amount of RAM memory to accommodate the unpacked files.
  • the ACTION instructions can further include the actions of "controller software update,” “run,” or "configure.”
  • Flow in the server program 102 is to the function block 148 where the ACTION signal is received and processed.
  • Flow in the server program 102 is to a function block 150 where the received ACTION is performed.
  • the "controller software update” action initiates a predefined installation process in the printer controller to upgrade the existing software.
  • the packed file includes at least one executable file.
  • the "run” action simply causes execution of the one or more executable files of the unpacked file set, which is suitable for installing patches for a single module.
  • the "configure” action initiates a special operating system process, e.g., a system command associated with RegEdit, to add/change some system parameters of the printer controller, as specified in the unpacked file set.
  • the client program 100 may optionally check the execution status of the ACTION in the server program 102.
  • flow is to a function block 152 of the client program 100 where a STATUS signal is transmitted to the server program 102, as indicated by a signal flow line 154 from the function block 152 to the function block 150.
  • a function block 156 where the server program 102 transmits a "processing" Reply signal to the client program 100, as indicated by a Reply signal flow line 158 to a status function block 160 of the client program 100.
  • the processing time may take longer.
  • the server program 102 may need to be rebooted.
  • flow is to a decision block 162 to determine if the server program 102 needs to be rebooted, in accordance with the particular ACTION instruction. If not, flow is out the "N" path of decision block 162 to a Continue terminal 164 of the server, and therefrom signaling an "OK" status across a signal line 166 to the status function block 160 of the client program 100 to indicate that the ACTION has been completed without a reboot.
  • flow is out the "Y" path of decision block 162 of the server program 102 to a function block 168 to terminate the connection to the client program 100 during the rebooting process.
  • a "Reset" signal is then transmitted from the server program 102 to the status function block 160 of the client program 100, as indicated by a signal flow line 170 to the status function block 160.
  • Flow is then to a reboot terminal 172 where the server program is rebooted to implement the software updates. Note that the connection between the client and server will not automatically restore after the printer controller restarts.
  • the client program 100 then takes the appropriate action in response to the signals received into the status function block 160.
  • flow is to a decision block 174 where the client program 100 interrogates the status signals received from the server program 102. If the status is "processing,” flow is out the "P” path back to the input of the function block 152 to continue querying the server program 102. If the status is either "OK" or "Reset,” flow is out the "O" path to a Continue terminal 176 of the client.
  • the details of Continue terminal 176 of the client are not shown in FIG. 1.
  • the client program 100 may choose to start another transfer on the same connection, i.e., the process associated with a new sequence of SEND commands in the function block 114, or disconnect from the server program 102 (printer controller) and start a new connection to another printer controller.
  • the server program 102 printer controller
  • the server program 102 will delete the received file and go back to wait for a new sequence of SEND commands, as associated with function block 118. If the connection is terminated by the client, the controller will return to the listening mode associated with function block 102, to wait for a new connection.
  • the disclosed protocol works well for a special-purpose printer controller running on top of the operating system having networking support.
  • a general-purpose file transfer protocol e.g., FTP (File Transfer Protocol)
  • FTP File Transfer Protocol
  • the Berkeley socket interface can be used to implement both the client program 100 and server program 102.
  • a client computer 200 is disposed on a network 202, e.g., a
  • first network peripheral output device 204 which in this particular embodiment is a printer controller.
  • first network peripheral output device 204 is not restricted to a printer controller, but can be a variety of network-based equipment suitably configured to execute the disclosed protocol architecture, for example, a multi-function output device (that includes capabilities of faxing, scanning, printing, etc.).
  • the client computer 200 includes the client protocol program 100, and the first peripheral output device 204 includes the server program 102.
  • Both of the client and server protocol programs (100 and 102) can be implemented in firmware (e.g., EEPROM) in either or both of the client computer 200 and the first peripheral output device 204.
  • the first peripheral output device 204 opens two listening sockets to accommodate either or both TCP/IP traffic and IPX/SPX traffic communicated across the network 202.
  • the client computer 200 sends only IPX/SPX traffic on the relatively local network 202
  • the first peripheral output device 204 can communicate with the client computer 200 to receive the updated software, and execute the disclosed protocol to facilitate the installation of the software and ascertain the status of the updating process on the first peripheral output device 204.
  • networks can extend great distances utilizing a global communication network (GCN) 206, e.g., the Internet, over which communication is facilitated utilizing the TCP/IP protocol suite.
  • GCN global communication network
  • a second peripheral output device 208 disposed on the GCN 206 and executing the disclosed server protocol 102 will also open the two listening sockets to accommodate either or both TCP/IP traffic and IPX/SPX traffic communicated across the GCN 206.
  • the client computer 200 can be used to upload software to the second peripheral output device 208, and monitor the software installation process.
  • Another aspect of the present invention is to simplify the aforementioned two-step boot operation.
  • the controller of the present invention uses OS and controller code from a non-volatile storage disc, preferably a CD-ROM or DVD-ROM. It utilizes external memory cards (non- volatile flash memory) to store user data and system parameters which would have been stored on hard drive. Since the static object code of the OS and controller resides on a different media than the variable user data and parameters, updating (or upgrading) the OS or
  • Controller becomes extremely trivial.
  • the administrator simply shuts down the system, replaces the CD with a new version, and restarts the system.
  • the data and system parameters remain unchanged across system restart.
  • the present bootable CD controller uses an embedded operating system, preferably "Windows NT Embedded” sold by Microsoft Corporation.
  • An embedded OS offers several benefits for this type of implementation. For example, this OS does not require the use of a keyboard, mouse or VGA monitor.
  • selectable modules can be installed on various destination media, including a hard drive, a ROM, and a CD-ROM.
  • An embedded OS is reliable in system shutdown, reboot, and boot up states. As shown in Fig. 3, a CD-ROM 306 replaces the previous function of the hard drive 318, and the OS and system services remain with the CD-ROM 306, thus making it bootable.
  • Storage for system parameters 314 and print/fax/scan data 316 is stored in a Flash memory card (not shown).
  • the Multifunction Peripheral 302 of FIG 3 comprises a Copier/Print Device.
  • Multifunction Peripheral 302 has a network card 304 for communicating over a network with other devices such as other computers, printers, clients, and servers.
  • the CPU 308 controls the operation of the Multifunction Peripheral 302 and has System Memory for storing various operating parameters.
  • the memory card (not shown), which may be a flash memory card, PCMCIA card, or other types of non- volatile RAM that are well known in the art, comprises the storage memory control 312, memory card system parameters 314 and print/fax/scan data 316.
  • the CD-ROM contains the bootable partition, the Windows NT Embedded Operating System files, the basic NT services, and the device drivers.
  • the CD-ROM also contains the controller service files for "Print,” “Fax,” “Scan” and “Network” functions, along with web page files.
  • the system parameters are directed to the system memory card. This is preferably accomplished using the embedded OS tool called “Target Designer.” Of course, this can also be accomplished with other similar tools.
  • the system memory card also includes a "Disable Page” file (i.e. a memory swap file) from the embedded OS and Windows NT activities settings (such as network setup parameters).
  • the system memory card can retain other variable data such as a "Print Spooler” temporary file storage and system event logs.
  • the data is directed to the data memory card, and can include print job data. This print job data is in a file format that encompasses the function of the "job record” that had previously been stored in the NT registry.
  • the data memory card also includes fax job data, scan data and email data, along with any job or message logs.
  • a "Storage Volume Control" utility program is preferably implemented to monitor memory card storage volume. This utility program includes software settings to limit the usage of partition, to prevent a maximum data limit to be exceeded.
  • the present bootable CD controller provides many benefits, including the phase-out and discontinuation of the hard drive controller model, resulting in reducing the size of the hardware and the cost of distribution. Also, reliability of storage media is improved by replacing the volatile hard drive with a CD-ROM.
  • the bootable CD also provides savings of time and effort for software version upgrades, and OS trouble shooting and diagnostics.
  • the invention also provides virus protection by employing read-only media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Stored Programmes (AREA)
  • Computer And Data Communications (AREA)

Abstract

A system update protocol. A software update is packed into a packed file (item 104 of fig. 1), which packed file includes a unique signature. The packed file is uploaded from a trusted client computer (100) to the network printer (102). The integrity of the packed file is automatically checked on the network printer by performing a checksum and signature comparison (130) to ensure the packed file is transmitted correctly (132). The packed file is resent (140 to 118) when the packed file is determined to be corrupt. The packed file is unpacked into a predetermined directory structure of unpacked files. The client computer then signals (154) the network printer cause installation (150) of the software update on the network printer. In another embodiment, the printer controller includes one or more non-volatile memory elements for storing print/fax/scan data and printer controller system parameters. The printer controller is bootable from the non-volatile storage medium, such as a CD-ROM or other removable type data disc.

Description

SYSTEM UPDATE PROTOCOL AND BOOTABLE CD CONTROLLER WITH EMBEDDED OPERATING SYSTEM
Background of the Invention This invention is related to a communication protocol for updating files on a printer controller, and to the field of booting operating systems, particularly the type used for controllers of output peripheral components, such as network printers.
A printer controller (or printer), which function is to control all printing functions on a related peripheral output device, will sometimes require files to be loaded from external distribution means for the purpose of providing software upgrades, new software installations, and/or batch configurations. Some printers allow these tasks to be done by physically copying the files to the printer controller via a storage distribution device (e.g., CD-ROM, floppy drive, etc.), and then executing corresponding commands for setup and configuration through conventional input devices (e.g., mouse and keyboard) and a video display panel. This process proves to be impractical and time-consuming when an administrator has to manage many such printers that are remotely located at many different sites (or network nodes) such as buildings or even across the country.
A workstation user may easily apply a patch for a certain component by running the self- extracting and self-installing patch file provided by a vendor. The same patch may also be applied to the printer controller with the same components. However, because the printer lacks input device accommodations (e.g., monitor, keyboard), it is not easy to initiate the install process of such software updates.
What is needed is a client-server networking protocol that would facilitate uploading of the required file(s) to the printer controller, and issuing of any commands necessary for installation. Sometimes it is also desirable to update the operating system of the controller. The controllers of network printers, such as models SC-2 and GL-1010 controllers available from Toshiba, use the Microsoft Embedded NT operating system (OS). In order to perform these software updates, a controller CD-ROM is installed. The CD-ROM is used to boot up the system, after which the updates are made to the OS software on the controller hard drive. After the software update is completed, the user must remove the CD-ROM and reboot the controller from the hard drive. After the controller boots up and begins running, the controller accepts print jobs from a client. The controller can also network with the client to set up system and user parameters, and can store print/scan jobs on the controller hard drive.
In situations where software updates for operating systems can be frequent, the above steps of booting from the CD and rebooting from the hard drive can be cumbersome and time consuming. Also, additional time and effort may often be expended in diagnosing and troubleshooting OS problems after a software update. Also, the hard drive can be unreliable storage medium, vulnerable to computer viruses and other sources of errors or loss of data. Also, the hard drive is an additional component that adds to the size and expense of the controller.
Summary of the Invention
The difficulties and drawbacks associated with previous-type systems are overcome by the methods and apparatuses of the present invention.
The present invention disclosed and claimed herein, in one aspect thereof, comprises a system update protocol. A software update is packed into a packed file, which packed file includes a unique signature. The packed file is uploaded from a trusted client computer to the network printer. The integrity of the packed file is automatically checked on the network printer by performing a checksum and signature comparison to ensure the packed file is transmitted correctly. The packed file is resent from the client when the packed file is determined to be corrupt. The packed file is unpacked into a predetermined directory structure of unpacked files. The client computer then signals the network printer cause installation of the software update on the network printer.
Another aspect of the present invention is a printer controller which includes one or more non- volatile memory elements for storing print/fax/scan data and printer controller system parameters. The non-volatile memory elements can include flash memory PCMCIA cards. A nonvolatile storage medium is also provided for retaining an operating system, wherein the printer controller is bootable from the non-volatile storage medium. The non-volatile storage medium is preferably a CD-ROM or other removable type data disc.
As will be realized, the invention is capable of other and different embodiments and its several details are capable of modifications in various respects, all without departing from the invention. Accordingly, the drawing and description are to be regarded as illustrative and not restrictive. Brief Description of the Drawings
For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description taken in conjunction with the accompanying drawings, in which: FIG. 1 illustrates a client/server protocol exchange flow diagram of the protocol; and
FIG. 2 illustrates a client/server system block diagram utilizing the disclosed protocol architecture; and
Fig. 3 depicts a bootable CD controller in accordance with the present invention.
Detailed Description of the Invention
The disclosed protocol architecture provides the capability of allowing the print controller to execute the installation commands after correctly receiving the file.
Unlike most popular file transfer protocols, the disclosed system update protocol is not limited to a single underlying transport. It is designed to run on, for example, TCP/IP (Transmission Control Protocol/Internet Protocol - a Microsoft® protocol suite) and EPX/SPX (Internet Packet eXchange/Sequenced Packet eXchange - a Novell® communication protocol). Thus a client user may choose either transport protocol allowing the server program running on the print controller the capability of responding.
The protocol consists of a reduced set of commands. The one or more target files are packed (i.e., compressed into a single large file) into a packed file, and a signature is prepended to the packed file for security reasons. The packed file may be optionally encrypted with a special agreed-upon key for added security.
Referring now to FIG. 1, there is illustrated a client/server protocol exchange flow diagram of the protocol. The horizontal lines between a client program flow diagram 100 and server program flow diagram 102 denote the direction and type of content of the network packets exchanged between the client program on a client and server program on the print controller (also denoted as a peripheral output device), while the vertical lines between the blocks of a flow diagram denote the flow of control.
The disclosed protocol consists of the following commands: SEND, to transfer a chunk of the target file; SENDEND, to signal the end of transferring; ACTION, to instruct the server what to do with the file; STATUS, to check the status of the action; and STATUSREPLY, to return the status of the transfer or action.
The server program 102 running on the printer controller is responsible for servicing these commands. The client program 100 running on a workstation (or client) is the driver of a task, i.e., the client controls the processes on the printer controller. Flow begins in a function block 104 where the client program 100 first "packs" all of the appropriate files into a single packed file, which single packed file includes a file header that contains a special signature recognized only by the printer controller (i.e., server program) and trusted client programs. The signature may be encrypted by a variable key (e.g., based upon file size) so that it cannot simply be copied to another file header. The client program 100 also appends a checksum to the end of the packed file. Thus the integrity of the packed file can be ascertained by checking both the unique signature and the checksum.
The server program 102 is currently in a "listen" mode, as indicated in a function block 106, awaiting incoming commands from a client. Flow is then to a function block 108 where the client program 100 performs a connect function by initiating a synchronization (i.e., also denoted as "synch") operation over a flow line 110 to the function block 106 of the server program 102 in order to establish a reliable connection to the printer controller. The server program 102 responds with synch commands over a flow line 112 to the function block 108. On the server side, two listening sockets will be opened; one for TCP/IP traffic, and another for IPX/SPX traffic.
Flow in the client program 100 is then to a function block 114 where the packed file is transmitted to the printer controller through a sequence of SEND commands. The client program 100 then issues the sequence of SEND commands to the server program 102, as indicated by a signal flow line 116 to a function block 118, to transfer the packed file to the printer controller. Flow in the server program 102 is to the function block 118 where the SEND commands are received, and the received file segments associated with the sequence of the SEND commands are written as a single data file set. Once the end of the file transfer from the client program 100 is reached, flow in the client program 100 is to a function block 120 where the client program 100 transmits a SENDEND command to the server program 102, as indicated by a signal flow line 122 to a function block 124. Flow in the server program 102 is to the function block 124 where after the last file segment has been received, and the server program 102 closes the data file. When the server program 102 receives SENDEND command, it will have received the entire file.
Flow in the client program 100 is then to a function block 126 where the client program 100 queries the server program 102 for the status of the file transmission by sending the STATUS command, as indicated by a signal flow line 128 to a function block 130. Flow in the server program 102 is to the function block 130 where the data file is unpacked, and a "sanity" check is performed to determine if the file was correctly transmitted, i.e., by authenticating the signature, recalculating the checksum, etc.
While the sanity check is being performed, flow in the server program 102 is to a function block 132 where the printer controller sends back a "processing" Reply signal to the client program 100, as indicated by a signal flow line 134 to a function block 136. In the server program 102, flow continues to a decision block 138 to determine if the received packed file passed the sanity check. If not, flow is out the "N" path to a function block 140, where the packed file is deleted. Flow then loops back to the input of the function block 118 to receive the next retransmission of the packed file. The server program 102 also signals the client program 100 in the Reply signal of packed file failing the sanity check (i.e., a "corrupted" file). Flow in the client program 100 is to the function block 136 where the status Reply is received. The client program 100 then interrogates the received status Reply signal, as indicated in a decision block 142. If the Reply signal indicates that the server program 102 is in a state of "processing," flow is out the "P" path back to the input of the function block 126 to continue querying the server program 102. Alternatively, if the Reply signal indicates a "failed" or "bad" sanity check, flow is out the "B" path of decision block 142 back to the input of function block 114 where the client program 100 resends the packed file to the server program 102 in the sequence of SEND commands.
If the sanity check by the server program 102 is "OK", the Reply signal to the function block 136 of the client program 100 indicates the same, and flow is out the "O" path of the decision block 142 to a function block 144 where the client program 100 sends an ACTION command to the server program 102 instructing the server program 102 to unpack the file set and reconstruct the directory structure associated therewith. (Of course, to facilitate this directoiy structuring, the printer controller includes a readable storage medium, e.g., hard disk drive, or a sufficient amount of RAM memory to accommodate the unpacked files.) This is indicated by a signal flow line 146 from the function block 144 of the client program 100 to a function block 148 of the server program 102. The ACTION instructions can further include the actions of "controller software update," "run," or "configure."
Flow in the server program 102 is to the function block 148 where the ACTION signal is received and processed. Flow in the server program 102 is to a function block 150 where the received ACTION is performed. The "controller software update" action initiates a predefined installation process in the printer controller to upgrade the existing software. For software installed utilizing the "run" command, the packed file includes at least one executable file. The "run" action simply causes execution of the one or more executable files of the unpacked file set, which is suitable for installing patches for a single module. The "configure" action initiates a special operating system process, e.g., a system command associated with RegEdit, to add/change some system parameters of the printer controller, as specified in the unpacked file set. The client program 100 may optionally check the execution status of the ACTION in the server program 102. Thus flow is to a function block 152 of the client program 100 where a STATUS signal is transmitted to the server program 102, as indicated by a signal flow line 154 from the function block 152 to the function block 150. If the server program 102 is in the state of executing the ACTION instruction, flow is to a function block 156 where the server program 102 transmits a "processing" Reply signal to the client program 100, as indicated by a Reply signal flow line 158 to a status function block 160 of the client program 100. Note that where the print controller is undergoing an update, the processing time may take longer.
After completion of the ACTION instruction, the server program 102 may need to be rebooted. Thus flow is to a decision block 162 to determine if the server program 102 needs to be rebooted, in accordance with the particular ACTION instruction. If not, flow is out the "N" path of decision block 162 to a Continue terminal 164 of the server, and therefrom signaling an "OK" status across a signal line 166 to the status function block 160 of the client program 100 to indicate that the ACTION has been completed without a reboot. When a reboot is required, flow is out the "Y" path of decision block 162 of the server program 102 to a function block 168 to terminate the connection to the client program 100 during the rebooting process. A "Reset" signal is then transmitted from the server program 102 to the status function block 160 of the client program 100, as indicated by a signal flow line 170 to the status function block 160. Flow is then to a reboot terminal 172 where the server program is rebooted to implement the software updates. Note that the connection between the client and server will not automatically restore after the printer controller restarts. The client program 100 then takes the appropriate action in response to the signals received into the status function block 160. Thus flow is to a decision block 174 where the client program 100 interrogates the status signals received from the server program 102. If the status is "processing," flow is out the "P" path back to the input of the function block 152 to continue querying the server program 102. If the status is either "OK" or "Reset," flow is out the "O" path to a Continue terminal 176 of the client.
The details of Continue terminal 176 of the client are not shown in FIG. 1. The client program 100 may choose to start another transfer on the same connection, i.e., the process associated with a new sequence of SEND commands in the function block 114, or disconnect from the server program 102 (printer controller) and start a new connection to another printer controller.
The details of the Continue terminal 164 on the server side are not shown in FIG. 1. The server program 102 (printer controller) will delete the received file and go back to wait for a new sequence of SEND commands, as associated with function block 118. If the connection is terminated by the client, the controller will return to the listening mode associated with function block 102, to wait for a new connection.
The disclosed protocol works well for a special-purpose printer controller running on top of the operating system having networking support. A general-purpose file transfer protocol (e.g., FTP (File Transfer Protocol)) does not fit the need of issuing specialized commands. The Berkeley socket interface can be used to implement both the client program 100 and server program 102.
Except for the STATUS command, all the other commands do not require an explicit acknowledgment-type of reply from the server. The underlying transport will ensure the correct delivery of the data.
Referring now to FIG. 2, there is illustrated a block diagram of client/server system utilizing the disclosed protocol architecture. A client computer 200 is disposed on a network 202, e.g., a
LAN, WAN, etc., in communication with a first network peripheral output device 204, which in this particular embodiment is a printer controller. Note that the first network peripheral output device 204 is not restricted to a printer controller, but can be a variety of network-based equipment suitably configured to execute the disclosed protocol architecture, for example, a multi-function output device (that includes capabilities of faxing, scanning, printing, etc.). The client computer 200 includes the client protocol program 100, and the first peripheral output device 204 includes the server program 102. Both of the client and server protocol programs (100 and 102) can be implemented in firmware (e.g., EEPROM) in either or both of the client computer 200 and the first peripheral output device 204. As indicated hereinabove, the first peripheral output device 204 opens two listening sockets to accommodate either or both TCP/IP traffic and IPX/SPX traffic communicated across the network 202. Thus if the client computer 200 sends only IPX/SPX traffic on the relatively local network 202, the first peripheral output device 204 can communicate with the client computer 200 to receive the updated software, and execute the disclosed protocol to facilitate the installation of the software and ascertain the status of the updating process on the first peripheral output device 204.
It is appreciated that networks can extend great distances utilizing a global communication network (GCN) 206, e.g., the Internet, over which communication is facilitated utilizing the TCP/IP protocol suite. Thus a second peripheral output device 208 disposed on the GCN 206 and executing the disclosed server protocol 102 will also open the two listening sockets to accommodate either or both TCP/IP traffic and IPX/SPX traffic communicated across the GCN 206. Thus the client computer 200 can be used to upload software to the second peripheral output device 208, and monitor the software installation process. Another aspect of the present invention is to simplify the aforementioned two-step boot operation. In a preferred embodiment, the controller of the present invention uses OS and controller code from a non-volatile storage disc, preferably a CD-ROM or DVD-ROM. It utilizes external memory cards (non- volatile flash memory) to store user data and system parameters which would have been stored on hard drive. Since the static object code of the OS and controller resides on a different media than the variable user data and parameters, updating (or upgrading) the OS or
Controller becomes extremely trivial. The administrator simply shuts down the system, replaces the CD with a new version, and restarts the system. The data and system parameters remain unchanged across system restart.
In a preferred embodiment, the present bootable CD controller uses an embedded operating system, preferably "Windows NT Embedded" sold by Microsoft Corporation. An embedded OS offers several benefits for this type of implementation. For example, this OS does not require the use of a keyboard, mouse or VGA monitor. Also, selectable modules can be installed on various destination media, including a hard drive, a ROM, and a CD-ROM. An embedded OS is reliable in system shutdown, reboot, and boot up states. As shown in Fig. 3, a CD-ROM 306 replaces the previous function of the hard drive 318, and the OS and system services remain with the CD-ROM 306, thus making it bootable. Storage for system parameters 314 and print/fax/scan data 316 is stored in a Flash memory card (not shown). In this embodiment, two slots of a PCMCIA cards are used, one for system, the other for data. Such data as had previously been stored on the hard drive is now retained in the memory card partitions. The Multifunction Peripheral 302 of FIG 3 comprises a Copier/Print Device. The
Multifunction Peripheral 302 has a network card 304 for communicating over a network with other devices such as other computers, printers, clients, and servers. The CPU 308 controls the operation of the Multifunction Peripheral 302 and has System Memory for storing various operating parameters. The memory card (not shown), which may be a flash memory card, PCMCIA card, or other types of non- volatile RAM that are well known in the art, comprises the storage memory control 312, memory card system parameters 314 and print/fax/scan data 316. The CD-ROM contains the bootable partition, the Windows NT Embedded Operating System files, the basic NT services, and the device drivers. The CD-ROM also contains the controller service files for "Print," "Fax," "Scan" and "Network" functions, along with web page files. The system parameters are directed to the system memory card. This is preferably accomplished using the embedded OS tool called "Target Designer." Of course, this can also be accomplished with other similar tools. The system memory card also includes a "Disable Page" file (i.e. a memory swap file) from the embedded OS and Windows NT activities settings (such as network setup parameters). The system memory card can retain other variable data such as a "Print Spooler" temporary file storage and system event logs. The data is directed to the data memory card, and can include print job data. This print job data is in a file format that encompasses the function of the "job record" that had previously been stored in the NT registry. The data memory card also includes fax job data, scan data and email data, along with any job or message logs.
A "Storage Volume Control" utility program is preferably implemented to monitor memory card storage volume. This utility program includes software settings to limit the usage of partition, to prevent a maximum data limit to be exceeded.
As described herein, the present bootable CD controller provides many benefits, including the phase-out and discontinuation of the hard drive controller model, resulting in reducing the size of the hardware and the cost of distribution. Also, reliability of storage media is improved by replacing the volatile hard drive with a CD-ROM. The bootable CD also provides savings of time and effort for software version upgrades, and OS trouble shooting and diagnostics. The invention also provides virus protection by employing read-only media.
As described hereinabove, the present invention solves many problems associated with previous type systems. However, it will be appreciated that various changes in the details, materials and arrangements of parts which have been herein described and illustrated in order to explain the nature of the invention may be made by those skilled in the area within the principle and scope of the invention will be expressed in the appended claims.

Claims

We claim:
1. A method of updating software on a peripheral output device disposed on a network, comprising the steps of: transmitting software update data from a client to the peripheral output device; and installing software update data on the peripheral output device.
2. The method of claim 1, wherein the software update data in the step of transmitting is in the form of a packed file, which packed file includes a unique signature prepended thereto that is recognizable only by the peripheral output device.
3. The method of claim 1, further comprising the step of checking a unique signature and a checksum of the software update data when received at the peripheral output device.
4. The method of claim 1 , further comprising the step of structuring the software update data on the peripheral output device into a predetermined directory structure.
5. The method of claim 1, wherein the peripheral output device opens at least one of a TCP/IP socket for receiving TCP/IP traffic and an IPX/SPX socket for receiving IPX/SPX traffic.
6. The method of claim 1, wherein the client sends an instruction to the peripheral output device in the step of installing, which instruction causes the peripheral output device to perform at least one of further steps of running a patch file, configuring a system parameter, and installing a controller software update.
7. The method of claim 1, wherein the peripheral output device communicates a reply signal to the client in response to a query by the client, after the client performs at least one of the steps of transmitting the software update data and installing the software update data.
8. The method of claim 1, wherein peripheral output device communicates a reply signal to the client, which reply signal is associated with at least one of the further steps of, performing a sanity check of a packed file, which packed file includes the software update data, authenticating the packed file, unpacking the packed file of the software update data into a predefined file structure, and processing an instruction received from the client to install the software update data.
5 9. The method of claim 1, further comprising the steps of: checking a unique signature and a checksum of the software update data when received at the peripheral output device, if the step of checking fails, deleting the software update data at the peripheral output device, lo sending a signal from the peripheral output device to the client indicating that the software update data checked in the step of checking, failed, and in response thereto, retransmitting the software update data from the client to the peripheral output device.
s 10. A method of updating software on a peripheral output device disposed on a network, comprising the steps of: on a client, packing software update data into a packed file, which packed file includes a unique signature; transmitting the packed file from the client to the peripheral output device; 0 checking the integrity of the packed file at the peripheral output device to ensure the packed file was transmitted correctly; unpacking the packed file into a predetermined directory structure; and installing the software update data on the peripheral output device.
5 11. The method of claim 10, wherein the unique signature of the packed file in the step of packing is prepended thereto and is recognizable only by the peripheral output device.
12. The method of claim 10, wherein the peripheral output device communicates a reply signal to the client in response a query by the client, after the client performs at least one of the steps o of transmitting the packed file and installing the software update data on the peripheral output device.
13. The method of claim 12, wherein the reply signal is generated in response to performing at least one of the further steps of, unpacking the packed file, performing a sanity check of the packed file, authenticating the packed file, and processing an instruction received from the client to install the software update data.
14. A method of updating software on a network printer, comprising the steps of: packing software update data into a packed file, which packed file includes a unique signature; transmitting the packed file from a client computer to the network printer; automatically checking the integrity of the packed file on the network printer to ensure the packed file is transmitted correctly; replying to the client with a reply signal in response to the client querying the network printer for a status of the step of checking; unpacking the packed file into a predetermined directory structure of unpacked files; controlling the network printer from the client computer to execute to cause installation of the software update data on the network printer; and sending a reply to the client from the network printer in response to the client querying the network printer for a status of the step of controlling.
15. The method of claim 14, wherein the client signals the network printer when an end of the transmission of the packed file has been reached in the step of transmitting.
16. Architecture for updating software on a peripheral output device disposed on a network, comprising: software update data transmitted from a client to the peripheral output device; wherein the peripheral output device is controlled by the client to install the software update data.
17. The architecture of claim 16, wherein the software update data is in the form of a packed file, which packed file includes a unique signature prepended thereto that is recognizable only by the peripheral output device.
18. The architecture of claim 16, wherein a unique signature and a checksum of the software update data is checked when received at the peripheral output device.
19. The architecture of claim 16, wherein the software update data is structured into a predetermined directory structure on the peripheral output device.
5
20. The architecture of claim 16, wherein the peripheral output device opens at least one of a TCP/IP socket for receiving TCP/IP traffic and an IPX/SPX socket for receiving IPX/SPX traffic.
o 21. The architecture of claim 16, wherein the client sends an instruction to the peripheral output device, which instruction causes the peripheral output device to perform at least one of running a patch file, configuring a system parameter, and installing a controller software update.
22. The architecture of claim 16, wherein the peripheral output device communicates a s reply signal to the client in response to a query by the client, after the client performs at least one of transmitting the packed file and controlling the peripheral output device.
23. The architecture of claim 22, wherein the reply signal is associated with at least one of performing a sanity check of the packed file, authenticating the packed file, unpacking a packed file o of the software update data, and processing an instruction received from the client cause installation of the software update data.
24. The architecture of claim 16, wherein a unique signature and a checksum of the software update data are both checked when the software update data is received at the peripheral 5 output device, and if the check fails, the software update data is deleted at the peripheral output device, and wherein a signal is sent from the peripheral output device to the client indicating that the software update data failed, in response to which the software update data is retransmitted from the client to the peripheral output device.
25. Architecture for updating software on a peripheral output device disposed on a network, comprising: software update data that is packed into a packed file, and transmitted from a client to the peripheral output device, which packed file includes a unique signature; wherein the integrity of the packed file is automatically checked at the peripheral output device to ensure the packed file was transmitted correctly; wherein the packed file is unpacked into a predetermined directory structure of unpacked files; and wherein the peripheral output device is controlled by the client to cause installation of the software update data.
26. The architecture of claim 25, wherein the unique signature of the packed file is prepended thereto and is recognizable only by the peripheral output device.
27. The architecture of claim 25, wherein the peripheral output device communicates a reply signal to the client in response to the client performing at least one of transmitting the packed file and controlling the peripheral output device.
28. The architecture of claim 27, wherein the reply signal is generated in response to the peripheral output device performing at least one of the steps of, unpacking the packed file, performing a sanity check of the packed file, authenticating the packed file, and processing an instruction received from the client to cause installation of the software update data.
29. Architecture for updating software on a peripheral output device disposed on a network, comprising: software update data that is packed into a packed file, and transmitted over a network from a client to the peripheral output device, which packed file includes a unique signature; wherein the integrity of the packed file is automatically checked at the peripheral output device to ensure the packed file was transmitted correctly; wherein a reply signal is sent to the client in response to the client querying the network printer for a status of the integrity check; wherein the packed file is unpacked into a predetermined directory structure of unpacked files; wherein the peripheral output device is controlled by the client to cause installation of the software update data; and wherein a reply is sent to the client from the network printer in response to the client querying the network printer for a status of the network printer being controlled.
30. The architecture of claim 29, wherein the client signals the network printer when an end of the transmission of the packed file has been reached.
31. The architecture of claim 29, wherein the network is a global communication network.
32. A printer controller comprising: at least one non- volatile memory element for storing print/fax/scan data and printer controller system parameters; a non-volatile storage medium for retaining an operating system, wherein the operating system is bootable from the non-volatile storage medium.
33. The printer controller of claim 32 wherein the non-volatile storage medium is a nonvolatile storage disc.
34. The printer controller of claim 33 wherein the non-volatile storage disc is one of a
CD-ROM and a DVD-ROM.
35. The printer controller of claim 32 wherein the operating system is an embedded operating system.
36. The printer controller of claim 32 wherein the at least one non- volatile memory element comprises at least one flash memory PCMCIA card.
37. The printer controller of claim 32 wherein the non- volatile storage medium comprises a CD-ROM containing at least one of: a bootable partition; embedded operating system files; device drivers; controller service files for "Print," "Fax," "Scan" and "Network" functions; and web page files.
38. The printer controller of claim 32 wherein the non- volatile storage medium comprises a system memory card for storing at least one of: system parameters; a memory swap file from the embedded OS; a print spooler; and a system event log.
39. The printer controller of claim 32 wherein the non-volatile storage medium comprises a data memory card for storing at least one of: print job data; fax job data; scan data; email data; a job log and a message log.
40. The printer controller of claim 32 further comprising a storage volume control utility program to monitor memory card storage volume, to limit the usage of partition, to prevent a maximum data limit from being exceeded.
41. A method comprising: storing print/fax/scan data and printer controller system parameters on at least one non- volatile memory element; retaining an operating system on a non- volatile storage medium; booting the operating system from the non-volatile storage medium.
42. The method of claim 14 wherein the steps of retaining and booting are performed from a non-volatile storage disc.
43. The method of claim 42 wherein steps of retaining and booting are performed from one of a CD-ROM and a DVD-ROM.
44. The method of claim 41 wherein the steps of retaining and booting an operating system comprise retaining and booting an embedded operating system.
45. The method of claim 41 wherein the step of storing on at least one non- volatile memory element comprises storing on at least one flash memory PCMCIA card.
46. The method of claim 41 further comprising an additional step of retaining on the nonvolatile storage medium at least one of: a bootable partition; embedded operating system files; device drivers; controller service files for "Print," "Fax," "Scan" and "Network" functions; and web page files.
47. The method of claim 41 wherein the step of storing on a non-volatile storage medium comprises storing on a system memory card at least one of: system parameters; a memory swap file from the embedded OS; a print spooler; and a system event log.
48. The method of claim 41 wherein the step of storing on a non-volatile storage medium comprises storing on a data memory card at least one of: print job data; fax job data; scan data; email data; a job log and a message log.
49. The method of claim 41 further comprising a step of monitoring memory card storage volume in order to limit the usage of partition, to prevent a maximum data limit from being exceeded.
EP03741823A 2002-05-28 2003-05-28 System update protocol and bootable cd controller with embedded operating system Withdrawn EP1508091A4 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US10/156,303 US20030226139A1 (en) 2002-05-28 2002-05-28 System update protocol
US156303 2002-05-28
US10/156,521 US20030226005A1 (en) 2002-05-28 2002-05-28 Bootable CD controller with embedded operating system
US156521 2002-05-28
PCT/US2003/016752 WO2003100610A1 (en) 2002-05-28 2003-05-28 System update protocol and bootable cd controller

Publications (2)

Publication Number Publication Date
EP1508091A1 EP1508091A1 (en) 2005-02-23
EP1508091A4 true EP1508091A4 (en) 2005-12-21

Family

ID=29586318

Family Applications (1)

Application Number Title Priority Date Filing Date
EP03741823A Withdrawn EP1508091A4 (en) 2002-05-28 2003-05-28 System update protocol and bootable cd controller with embedded operating system

Country Status (4)

Country Link
EP (1) EP1508091A4 (en)
JP (1) JP2005527908A (en)
AU (1) AU2003273157A1 (en)
WO (1) WO2003100610A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1564624A3 (en) * 2004-02-10 2006-04-12 Ricoh Company, Ltd. Virus protection for multi-function peripherals
JP4508687B2 (en) * 2004-03-15 2010-07-21 株式会社リコー Card-type memory interface circuit
US7631360B2 (en) * 2004-06-12 2009-12-08 Microsoft Corporation Hardware protection
JP2006011665A (en) * 2004-06-23 2006-01-12 Ricoh Co Ltd Image processing control device
CN106886423B (en) * 2007-11-27 2020-11-03 波音公司 Method and apparatus for distributing Loadable Software Aircraft Parts (LSAP)
JP2011034130A (en) * 2009-07-29 2011-02-17 Canon Inc Information processor, information processing method, and program
GB2483167B (en) 2010-08-27 2013-05-29 Fxi Technologies As Storage device with separate application and interface processors
RU2495487C1 (en) * 2012-08-10 2013-10-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of determining trust when updating licensed software
JP2015053015A (en) * 2013-09-09 2015-03-19 京セラドキュメントソリューションズ株式会社 Firmware and electronic apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0601704A1 (en) * 1992-11-18 1994-06-15 Canon Information Systems, Inc. Method and apparatus for remotely altering programmable firmware stored in an interface board coupled to a network peripheral
EP1043656A2 (en) * 1999-04-09 2000-10-11 Sun Microsystems, Inc. Method and apparatus for synchronizing firmware
WO2001004749A1 (en) * 1999-07-08 2001-01-18 Axis Ab Method and apparatus for upgrading firmware in an embedded system
WO2001093577A2 (en) * 2000-05-26 2001-12-06 General Instrument Corporation Authorization using ciphertext tokens

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6167567A (en) * 1998-05-05 2000-12-26 3Com Corporation Technique for automatically updating software stored on a client computer in a networked client-server environment
US6718407B2 (en) * 1999-09-30 2004-04-06 Intel Corporation Multiplexer selecting one of input/output data from a low pin count interface and a program information to update a firmware device from a communication interface
US20010029530A1 (en) * 2000-03-03 2001-10-11 Yoshiko Naito System and method of managing resource in network system
US7362459B2 (en) * 2000-11-17 2008-04-22 Seiko Epson Corporation Network device and printer

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0601704A1 (en) * 1992-11-18 1994-06-15 Canon Information Systems, Inc. Method and apparatus for remotely altering programmable firmware stored in an interface board coupled to a network peripheral
EP1043656A2 (en) * 1999-04-09 2000-10-11 Sun Microsystems, Inc. Method and apparatus for synchronizing firmware
WO2001004749A1 (en) * 1999-07-08 2001-01-18 Axis Ab Method and apparatus for upgrading firmware in an embedded system
WO2001093577A2 (en) * 2000-05-26 2001-12-06 General Instrument Corporation Authorization using ciphertext tokens

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
See also references of WO03100610A1 *
U.S. DEPARTMENT OF COMMERCE/NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY: "FIPS PUB 182-2 + change notice 1: Digital Signature Standard (DSS)", 27 January 2000 (2000-01-27), Gaithersburg, MD, pages 1 - 76, XP002345589, Retrieved from the Internet <URL:http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf> [retrieved on 20050915] *

Also Published As

Publication number Publication date
EP1508091A1 (en) 2005-02-23
WO2003100610A1 (en) 2003-12-04
AU2003273157A8 (en) 2003-12-12
AU2003273157A1 (en) 2003-12-12
WO2003100610A8 (en) 2004-03-04
JP2005527908A (en) 2005-09-15

Similar Documents

Publication Publication Date Title
US20050149923A1 (en) System update protocol
US20030226139A1 (en) System update protocol
US8782098B2 (en) Using task sequences to manage devices
US7290258B2 (en) Managing multiple devices on which operating systems can be automatically deployed
US7421688B1 (en) Methods and systems for updating the firmware on a plurality of network-attached computing devices
US6259442B1 (en) Downloading software from a server to a client
US7080134B2 (en) Systems and methods for software distribution and management
US5701492A (en) Fail-safe flashing of EPROM
US6668374B1 (en) Method and apparatus for upgrading firmware in an embedded system
US8554748B1 (en) Method and apparatus for differential file based update for embedded systems
US20020054069A1 (en) Downloading software from a server to a client
US6804773B1 (en) System and method for transferring information over a network
US7349327B2 (en) System and method for remotely updating a network device
US20090254641A1 (en) Network card capable of remote boot and method thereof
WO2003100610A1 (en) System update protocol and bootable cd controller
US8086659B2 (en) Task sequence interface
JP2004165734A (en) Image forming apparatus and firmware program
CN110737444A (en) Remote self-adaptive dynamic deployment method and system for operating system based on firmware
US20030226005A1 (en) Bootable CD controller with embedded operating system
Cisco System Image and Configuration File Load Commands
Cisco Channel Interface Processor Microcode Release Note and Microcode Upgrade Requirements
Cisco Channel Interface Processor Microcode Release Note and Microcode Upgrade Requirements
Cisco System Image and Configuration File Load Commands
Cisco System Image and Configuration File Load Commands
Cisco System Image and Configuration File Load Commands

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20041126

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL LT LV MK

DAX Request for extension of the european patent (deleted)
RIC1 Information provided on ipc code assigned before grant

Ipc: 7G 06F 9/445 B

Ipc: 7G 06F 9/45 A

A4 Supplementary search report drawn up and despatched

Effective date: 20051107

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: TOSHIBA TEC KABUSHIKI KAISHA

Owner name: TOSHIBA CORPORATION

17Q First examination report despatched

Effective date: 20090630

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20091111