Secure recovery apparatus and method

A safe and secure boot technology, applied in the direction of program control devices, instruments, error detection/correction, etc.

Active Publication Date: 2014-06-11
GOOGLE LLC
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the user has an old recovery device,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure recovery apparatus and method
  • Secure recovery apparatus and method
  • Secure recovery apparatus and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Modern computers can include various backup and recovery mechanisms. Due to data corruption (eg, due to malware or hardware failure), it may be desirable to replace or repair an image of the firmware or operating system on a bootable hard disk or other storage mechanism. However, restoring an image using a restore image can also be complex, if not a difficult process, and the restore image itself can also be prone to data corruption. Therefore, restoration of a corrupted image may inevitably require the intervention of computer technicians at considerable cost. The subject technology provides a secure bank of data that users can turn to when all else fails, alleviating the need for user or computer technician intervention.

[0017] figure 1 is an exemplary diagram of an apparatus and system for loading a boot image including firmware and secure memory locations in accordance with one aspect of the subject technology. According to one aspect, computer system 100 may i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether each level is usable by the device. If a level of boot code is determined to be unusable, a secure copy of the boot code is loaded from a secure read-only location to repair the unusable code to launch the computer operating system.

Description

technical field [0001] The subject technology generally relates to computer recovery systems and methods, ie, recovery of an operating system or firmware. Background technique [0002] Some computers, such as notebooks, support recovery mode, which restores a computer to a good state if its rewritable operating system and / or firmware has crashed or become corrupted. Typically, a user initiates recovery mode via keystrokes when the computer starts up. In some cases, the notebook is able to initiate recovery mode on its own if it determines there is a problem with the firmware and / or operating system. Although the above situation has become the mainstream method, the user still needs a separate recovery device. If the user does not have a recovery device (SD card or USB stick), the user must create one by downloading an installer and running it on a second computer. After the recovery device is inserted, the system will boot from the recovery device and attempt to repair it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/14G06F21/57
CPCG06F11/1417G06F11/1666G06F9/4403G06F21/57
Inventor 瑞安·塔伯恩兰德尔·R·斯潘格勒
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products