Basic input output system updates

    公开(公告)号:US11409607B1

    公开(公告)日:2022-08-09

    申请号:US17374081

    申请日:2021-07-13

    摘要: Example implementations relate to Basic Input Output System updates. In some examples, a computing device can include a memory, a processor to, in response to completion of a Basic Input/Output System (BIOS) update, generate and store a boot status variable in the memory, determine whether the BIOS update was successful, in response to the BIOS update being successful, delete the boot status variable from the memory and perform a power event, and in response to the BIOS update being unsuccessful, perform a BIOS recovery.

    Customized thermal and power policies in computers

    公开(公告)号:US11960337B2

    公开(公告)日:2024-04-16

    申请号:US17793648

    申请日:2020-01-22

    摘要: Example approaches for customization of thermal and power policies in computers, are described. In an example, a microcontroller of a computing system, also referred to as system, validates thermal policy custom data stored in a firmware storage medium of the system, in response to a supply of power to the system. On a successful validation of the thermal policy custom data, thermal control settings is updated with a customized thermal policy included in the thermal policy custom data. In response to initiation of a boot operation of the system, a processor of the system validates power policy custom data stored in the firmware storage medium. In response to a successful validation of the power policy custom data during the boot operation, the processor updates power control settings of the system with a customized power policy included in the power policy custom data.

    PERIPHERAL DEVICE CONNECTIONS RESPONSIVE TO IDENTIFICATION DATA MATCHING

    公开(公告)号:US20230359775A1

    公开(公告)日:2023-11-09

    申请号:US18246657

    申请日:2020-09-30

    IPC分类号: G06F21/73 G06F13/40

    摘要: In an example in accordance with the present disclosure, a compute device is described. The compute device includes a host controller to 1) receive identification data of peripheral devices coupled to a computing dock and 2) compare the identification data with values stored in a database. A stored value indicates a combination of peripheral devices previously coupled to the computing dock. The compute device also includes a device connection controller to, responsive to the identification data matching a stored value, retrieve operational data for the peripheral devices from the database. The device connection controller is also to connect the compute device with the peripheral devices based on operational data retrieved from the database.

    Component Firmware Replacements via Networks

    公开(公告)号:US20240289223A1

    公开(公告)日:2024-08-29

    申请号:US18569911

    申请日:2021-06-18

    IPC分类号: G06F11/14 G06F11/07

    摘要: An example non-transitory machine-readable medium includes recovery instructions that, when executed by a processor, cause the processor to detect a corruption of first installed instructions of first component firmware at a computing device and second installed instructions of second component firmware at the computing device. In response to detection of the corruption during pre-boot, if the first installed instructions are detected as corrupt, the recovery instructions request and receive first replacement instructions from a first network address, and replace in the computing device the first installed instructions with the first replacement instructions. If the second installed instructions are detected as corrupt, the recovery instructions request and receive second replacement instructions from a second network address different from the first network address, and replace in the computing device the second installed instructions with the second replacement instructions.

    SECURE BOOT UP OF COMPUTING DEVICES
    7.
    发明公开

    公开(公告)号:US20230334156A1

    公开(公告)日:2023-10-19

    申请号:US18000327

    申请日:2020-06-08

    IPC分类号: G06F21/57 G06F21/54

    摘要: Techniques for secure boot up of unified extensible firmware interface (UEFI) compliant devices are described. In an example, execution of a driver associated with a hardware component of a computing device may be detected during booting of the computing device. Based on the detection, a first driver hash of a system table of the UEFI may be computed, where the system table is a data structure that stores configuration details of the computing device and UEFI services. Thereafter, a second driver hash of the system table may be computed based on detection of completion of the execution of the driver. The first driver hash and the second driver hash may then be compared to determine tampering with the system table of the UEFI.

    STORAGE HASH VALUES
    8.
    发明申请

    公开(公告)号:US20220137846A1

    公开(公告)日:2022-05-05

    申请号:US17419066

    申请日:2019-07-19

    IPC分类号: G06F3/06

    摘要: An example system may include a processor and a non-transitory machine-readable storage medium storing instructions executable by the processer to record, responsive to a first boot of a computing device, storage device identification data and storage device communication path data for a storage device of the computing device, generate a storage device hash value, characterizing a storage configuration of the computing device, from the recorded storage device identification data and the recorded storage device communication path data, and store the storage device hash value to be compared to a subsequently generated storage device hash value characterizing an updated storage configuration of the computing device at a second boot of the computing device.

    Firmware corruption recovery
    9.
    发明授权

    公开(公告)号:US12099612B2

    公开(公告)日:2024-09-24

    申请号:US17794942

    申请日:2020-01-27

    IPC分类号: G06F21/57 G06F11/14

    摘要: In some examples, a computing device comprises a processing resource and a memory resource storing instructions to cause the processing resource to detect, by a basic input/output system (BIOS) of the computing device, firmware corruption in a firmware component of the computing device, generate a recovery agent based on the detected firmware corruption of the firmware component, determine a location of a back-up image of the firmware component based on the generated recovery agent, determine recovery sequence based on the determination of the location of the back-up image of the firmware component; and recover the firmware of the firmware component by executing the determined recovery sequence.

    CUSTOMIZED THERMAL AND POWER POLICIES IN COMPUTERS

    公开(公告)号:US20240192743A1

    公开(公告)日:2024-06-13

    申请号:US18581216

    申请日:2024-02-19

    摘要: Example approaches for customization of thermal and power policies in computers, are described. In an example, a microcontroller of a computing system, also referred to as system, validates thermal policy custom data stored in a firmware storage medium of the system, in response to a supply of power to the system. On a successful validation of the thermal policy custom data, thermal control settings is updated with a customized thermal policy included in the thermal policy custom data. In response to initiation of a boot operation of the system, a processor of the system validates power policy custom data stored in the firmware storage medium. In response to a successful validation of the power policy custom data during the boot operation, the processor updates power control settings of the system with a customized power policy included in the power policy custom data.