Abstract:
Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing system during a boot process, a header section of a read-write portion of firmware of the computing system. The example method further includes generating, using a first cryptographic hash algorithm, a message digest corresponding with the header. The example method also includes decrypting, using a first public-key, an encrypted signature corresponding with the header. The example method still further includes comparing the message digest corresponding with the header and the decrypted signature corresponding with the header. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header match, the example method includes continuing the boot process. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header do not match, the example method includes halting the boot process.
Abstract:
A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether each level is usable by the device. If a level of boot code is determined to be unusable, a secure copy of the boot code is loaded from a secure read-only location to repair the unusable code to launch the computer operating system.
Abstract:
Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing system during a boot process, a header section of a read-write portion of firmware of the computing system. The example method further includes generating, using a first cryptographic hash algorithm, a message digest corresponding with the header. The example method also includes decrypting, using a first public-key, an encrypted signature corresponding with the header. The example method still further includes comparing the message digest corresponding with the header and the decrypted signature corresponding with the header. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header match, the example method includes continuing the boot process. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header do not match, the example method includes halting the boot process.
Abstract:
Methods and apparatus for implementing a recovery mode procedure for a computing device are disclosed. An example method includes determining, by a computing device, that a recovery mode procedure is to be executed on the computing device. The example method further includes, determining whether a trusted recovery image is accessible to the computing device and, in the event the trusted recovery image is accessible to the computing device, executing the recovery mode procedure to repair or replace a current image of the computing device using the trusted recovery image. In the event the trusted recovery image is not accessible to the computing device, the example method includes, providing instructions for obtaining the trusted recovery image, determining the obtained trusted recovery image is accessible to the computing device and executing the recovery mode procedure to repair or replace the current image of the computing device using the obtained trusted recovery image.
Abstract:
A system and method for operating an electronic device in a limited radio mode are provided. The system determines a location of an electronic device. The system also identifies one or more components of the electronic device enabled to provide radio data communication services. The system, for each of the identified one or more components, determines if a respective radio data communication service provided by the component is an authorized service at a determined location of the electronic device and selectively disables the component if the respective data communication service is not an authorized service.
Abstract:
The surface of an touch-sensitive input device may act as a physical button that the user may push down to perform a click or other operation. For example, the user may push down the surface of the input device with one finger for a left click and push down the surface of the input device with two fingers for a right click. In one aspect, a system for detecting a left click or a right click when the user pushes down the surface of the input device is provided. When the system first detects that the surface of the input device is pushed down, the system may wait for a short period of time before making a determination of whether the user is pushing down the surface with one finger or two fingers. During this time, the system may collect additional information to make a more reliable determination.
Abstract:
The surface of an touch-sensitive input device may act as a physical button that the user may push down to perform a click or other operation. For example, the user may push down the surface of the input device with one finger for a left click and push down the surface of the input device with two fingers for a right click. In one aspect, a system for detecting a left click or a right click when the user pushes down the surface of the input device is provided. When the system first detects that the surface of the input device is pushed down, the system may wait for a short period of time before making a determination of whether the user is pushing down the surface with one finger or two fingers. During this time, the system may collect additional information to make a more reliable determination.
Abstract:
According to one general aspect, a method may include aggregating a plurality of network interfaces into a combinatorial network interface group, wherein each network interface provides a respective amount of bandwidth to at least one communications network. The method may also include receiving a request, from an application, to access at least one network resource via a communications network. The method may also include selecting at least one network interface included by the combinatorial network interface group to fulfill the network request based, at least in part, upon the bandwidth provided by the combination of bandwidths provided by the selected network interfaces. The method may further include accessing the network resource via the selected network interface.
Abstract:
Methods and apparatus for implementing a recovery mode procedure for a computing device are disclosed. An example method includes determining, by a computing device, that a recovery mode procedure is to be executed on the computing device. The example method further includes, determining whether a trusted recovery image is accessible to the computing device and, in the event the trusted recovery image is accessible to the computing device, executing the recovery mode procedure to repair or replace a current image of the computing device using the trusted recovery image. In the event the trusted recovery image is not accessible to the computing device, the example method includes, providing instructions for obtaining the trusted recovery image, determining the obtained trusted recovery image is accessible to the computing device and executing the recovery mode procedure to repair or replace the current image of the computing device using the obtained trusted recovery image.
Abstract:
A system and method is disclosed for recovering a boot image. Hardware instructions initiate a loading of a computer operating system on a computing device. During the loading of the operating system, multiple portions of boot code are verified and a determination is made whether each portion is valid. If a portion of boot code is determined to be invalid, a secure portion of the boot code is loaded to repair the invalid code and the loading of the operating system resumed.