Loading remote binaries onto a write-protected device
First Claim
1. A system, comprising:
- a memory; and
a processor programmed to;
receive, at an embedded computing device that executes a write-protected firmware build, a binary library overload instruction that specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build;
verify integrity of the alternative shared library using an integrity check value obtained within configuration information;
configure, within a random access memory (RAM) storage area of the memory, the alternative binary library to execute instead of the write-protected binary library as specified in the received binary library overload instruction, comprising the processor being programmed to configure the alternative binary library to execute instead of the write-protected binary library in response to successful verification of the alternative shared library; and
execute the write-protected firmware build using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction.
2 Assignments
0 Petitions
Accused Products
Abstract
A binary library overload instruction is received at an embedded computing device that executes a write-protected firmware build. The binary library overload instruction specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build. The alternative binary library is configured within a random access memory (RAM) storage area to execute instead of the write-protected binary library as specified in the received binary library overload instruction. The write-protected firmware build is executed using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction.
33 Citations
20 Claims
-
1. A system, comprising:
-
a memory; and a processor programmed to; receive, at an embedded computing device that executes a write-protected firmware build, a binary library overload instruction that specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build; verify integrity of the alternative shared library using an integrity check value obtained within configuration information; configure, within a random access memory (RAM) storage area of the memory, the alternative binary library to execute instead of the write-protected binary library as specified in the received binary library overload instruction, comprising the processor being programmed to configure the alternative binary library to execute instead of the write-protected binary library in response to successful verification of the alternative shared library; and execute the write-protected firmware build using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
a memory; and a processor programmed to; receive, at an embedded computing device that comprises an appliance computing device and that executes a write-protected firmware build, a binary library overload instruction that specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build; configure, within a random access memory (RAM) storage area of the memory, the alternative binary library to execute instead of the write-protected binary library as specified in the received binary library overload instruction; receive an instruction to restart execution of the appliance computing device with the write-protected firmware build using the write-protected binary library; restart the appliance computing device in conjunction with clearing the RAM storage area; and execute and use the write-protected firmware build using the alternative binary library instead of the write-protected binary library of the write-protected firmware build specified in the binary library overload instruction during execution of the appliance computing device. - View Dependent Claims (8, 9, 10)
-
-
11. A computer program product, comprising:
a computer readable storage medium having computer readable program code embodied therewith, where the computer readable program code when executed on an embedded computing device causes the embedded computing device to; receive a binary library overload instruction that specifies a write-protected binary library of a write-protected firmware build executed by the embedded computing device to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build; verify integrity of the alternative shared library using an integrity check value obtained within configuration information; configure, within a random access memory (RAM) storage area, the alternative binary library to execute instead of the write-protected binary library as specified in the received binary library overload instruction, comprising the computer readable program code when executed on the embedded computing device causing the embedded computing device to configure the alternative binary library to execute instead of the write-protected binary library in response to successful verification of the alternative shared library; and execute the write-protected firmware build using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction. - View Dependent Claims (12, 13, 14, 15, 16)
-
17. A computer program product, comprising:
a computer readable storage medium having computer readable program code embodied therewith, where the computer readable program code when executed on an embedded computing device causes the embedded computing device to; receive a binary library overload instruction that specifies a write-protected binary library of a write-protected firmware build executed by the embedded computing device to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build; configure, within a random access memory (RAM) storage area, the alternative binary library to execute instead of the write-protected binary library as specified in the received binary library overload instruction; receive an instruction to restart execution of the embedded computing device with the write-protected firmware build using the write-protected binary library; restart the embedded computing device in conjunction with clearing the RAM storage area; and execute and use the write-protected firmware build using the alternative binary library instead of the write-protected binary library of the write-protected firmware build specified in the binary library overload instruction during execution of the embedded computing device. - View Dependent Claims (18, 19, 20)
Specification