Mobile computer system capable for copying set-up application including removal routine from peripheral device for removing device programs after the device is removed
First Claim
Patent Images
1. A method of providing robust computer expansion, said method comprising:
- detecting a peripheral inserted into a computer system;
copying a set-up application from a first memory space on said peripheral to a second memory space in said computer system;
executing an install routine in said set-up application after said copying; and
executing a removal routine in said set-up application in said second memory space in response to a removal of said peripheral from said computer system.
12 Assignments
0 Petitions
Accused Products
Abstract
A robust external interface for a computer system is disclosed. The robust external interface allows a user to insert or remove external peripherals to the external interface at any time such that the user does not need to carefully follow any scripted procedures. The external interface software detects insertions or removals and acts in an appropriate manner.
-
Citations
42 Claims
-
1. A method of providing robust computer expansion, said method comprising:
-
detecting a peripheral inserted into a computer system;
copying a set-up application from a first memory space on said peripheral to a second memory space in said computer system;
executing an install routine in said set-up application after said copying; and
executing a removal routine in said set-up application in said second memory space in response to a removal of said peripheral from said computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
executing a welcome application in said first memory space on said peripheral after executing said install routine in said set-up application.
-
-
3. The method as claimed in claim 1, said method further comprising:
installing driver programs into said computer system from said install routine in said set-up application, said driver programs associated with said peripheral.
-
4. The method as claimed in claim 1, said method further comprising:
installing operating system extensions into said computer system from said install routine in said set-up application.
-
5. The method as claimed in claim 1, said method further comprising:
detecting removal of said peripheral from said computer system by detecting a bus error from an access to said first memory space on said peripheral.
-
6. The method as claimed in claim 1, said method further comprising:
detecting said removal of said peripheral from said computer system by detecting a falling edge from a signal on an expansion interface.
-
7. The method as claimed in claim 1 wherein detecting said peripheral inserted into a computer system comprises detecting a rising edge from a signal on an expansion interface.
-
8. The method as claimed in claim 1, said method further comprising:
adjusting a chip select policy such that a processor in said computer system can legally access said first memory space on said peripheral.
-
9. The method as claimed in claim 1, said method further comprising:
-
accessing a memory access time definition field from a known location in said first memory space on said peripheral;
adjusting a memory wait state policy according to said memory access time definition field.
-
-
10. The method as claimed in claim 1, said method further comprising:
installing operating system patches into said computer system from said install routine in said set-up application.
-
11. The method as claimed in claim 10 wherein said removal routine removes said operating system patches after removal of said peripheral from said computer system.
-
12. The method as claimed in claim 10 wherein said removal routine leaves said operating system patches after removal of said peripheral from said computer system.
-
13. The method as claimed in claim 2 wherein said welcome application comprises a back-up program and said back-up program copies information from a memory in said computer system to a nonvolatile storage system on said peripheral.
-
14. The method as claimed in claim 13 wherein said nonvolatile storage system comprises flash memory.
-
15. The method as claimed in claim 13, said method further comprising:
restoring information stored in said nonvolatile storage system back into said memory in said computer system.
-
16. A method of providing robust expansion for a computer system, said method comprising:
-
copying a removal routine from a memory in a peripheral device to a main memory in said computer system upon insertion of said peripheral device into said computer system;
detecting removal of said peripheral device from an expansion interface of said computer system; and
executing said removal routine in said main memory of said computer system that handles the removal of said peripheral device in response to detecting removal of said peripheral device. - View Dependent Claims (17, 18, 19, 20, 21, 22)
adjusting a chip select policy such that a processor in said computer system can not legally access said memory in said peripheral device.
-
-
22. The method as claimed in claim 16 wherein said removal routine leaves an operating system patch installed when said peripheral device was inserted after removal of said peripheral device from said computer system.
-
23. An extensible computer apparatus, said apparatus comprising:
-
an expansion interface on a computer system, said computer system having a main memory;
a peripheral device, said peripheral device for insertion into said expansion interface, said peripheral device having a peripheral memory space; and
a set-up utility program, said set-up utility program residing in said peripheral memory space; and
a peripheral detection and handling program on said computer system, said peripheral detection and handling program for detecting when said peripheral device is inserted into said expansion interface and for copying said set-up utility program from said peripheral memory space into said main memory when said peripheral device is inserted, and said peripheral detection and handling program for detecting when said peripheral device is removed from said expansion interface and executing a removal routine in said set-up utility program in said main memory when said peripheral device is removed. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A method of backing up a mobile computer system, said method comprising:
-
detecting the insertion of a small handheld back-up peripheral inserted into an expansion interface of said mobile computer system, said small handheld back-up peripheral comprising a back-up program and a nonvolatile storage system;
immediately executing said back-up program in response to detecting the insertion of said small handheld back-up peripheral into said expansion interface; and
copying information from a memory in said mobile computer system to said nonvolatile storage system in said small handheld back-up peripheral using said back-up program. - View Dependent Claims (41, 42)
restoring information stored in said nonvolatile storage system back into said memory in said mobile computer system.
-
Specification