PROVIDING AN IMMUTABLE ANTIVIRUS PAYLOAD FOR INTERNET READY COMPUTE NODES
First Claim
Patent Images
1. An apparatus comprising:
- a non-volatile storage including a first volume to store a basic input/output system (BIOS) and a second volume to store an operating system (OS) payload portion including an antivirus software stack, wherein the OS payload portion is separate from and is a subset of an OS kernel stored in a different storage and the antivirus software stack is to restore an integrity of the different storage subsequent to corruption of the different storage.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes initializing a portion of a computing system in a pre-boot environment using a basic input/output system (BIOS) stored in a non-volatile storage of the computing system, launching a boot manager to enable a launch of an operating system (OS) payload, and if the OS payload is not successfully launched, executing an OS payload portion and an antivirus stack stored in the non-volatile storage to restore an integrity of the mass storage. Other embodiments are described and claimed.
24 Citations
31 Claims
-
1. An apparatus comprising:
a non-volatile storage including a first volume to store a basic input/output system (BIOS) and a second volume to store an operating system (OS) payload portion including an antivirus software stack, wherein the OS payload portion is separate from and is a subset of an OS kernel stored in a different storage and the antivirus software stack is to restore an integrity of the different storage subsequent to corruption of the different storage. - View Dependent Claims (2, 3, 4, 5)
-
6. A system comprising:
-
a processor to execute instructions; a first non-volatile storage coupled to the processor to store an operating system (OS) kernel; and a second non-volatile storage to store a basic input/output system (BIOS) and an operating system (OS) payload portion including an antivirus software stack, wherein the OS payload portion is separate from and is a subset of the OS kernel and the antivirus software stack is to restore an integrity of the first non-volatile storage subsequent to corruption of the first non-volatile storage. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. At least one machine readable medium comprising a plurality of instructions that in response to being executed on a computing device, cause the computing device to:
initialize a hardware portion of the computing device in a pre-boot environment using a basic input/output system (BIOS) stored in a non-volatile storage of the computing device, launch a boot manager in the pre-boot environment to enable a launch of an operating system (OS) payload stored in a mass storage of the computing device, if the OS payload is not successfully launched, execute an OS payload portion and an antivirus stack stored in the non-volatile storage to restore an integrity of the mass storage, and otherwise enter into a boot environment using the OS payload stored in the mass storage. - View Dependent Claims (13, 14, 15)
-
16. A method comprising:
-
initializing a portion of a computing system in a pre-boot environment using a basic input/output system (BIOS) stored in a non-volatile storage of the computing system; launching a boot manager in the pre-boot environment to enable a launch of an operating system (OS) payload stored in a mass storage of the computing system; and if the OS payload is not successfully launched, executing an OS payload portion and an antivirus stack stored in the non-volatile storage to restore an integrity of the mass storage, and otherwise entering into a boot environment using the OS payload stored in the mass storage. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. (canceled)
-
29. (canceled)
-
30. (canceled)
-
31. (canceled)
Specification