Browse Prior Art Database

Remote Image Selection On Startup of a Computer Device

IP.com Disclosure Number: IPCOM000244892D
Publication Date: 2016-Jan-27
Document File: 4 page(s) / 216K

Publishing Venue

The IP.com Prior Art Database

Abstract

The disclosure shows how to remotely select an operating system (OS) to boot without redefining existing standards or changing existing hardware. It enhances the bootloader to send a list of boot entries to a server and let the server choose which OS to load.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 87% of the total text.

Page 01 of 4

The disclosure shows how to remotely select an operating system (OS) to boot without redefining existing standards or changing existing hardware. It enhances the bootloader to send a list of boot entries to a server and let the server choose which OS to load.

Problem statement

Remotely selecting an operating system to boot without redefining existing standards or changing existing hardware.

Existing approaches have flaws:

• Bootloader only allows interaction via the attached keyboard • PXE Boot (Preboot eXecution Environment) loads and executes external code • Data is loaded via insecure channels • No verification of the code possible • No choice if code shall be loaded or not • Changes to the Wake-On-LAN (WOL) package have been proposed but never implemented

Disclosure Approach

1. After system boot the bootloader sets up its TCP/IP stack (requesting an IP address if no fixed was stored in the configuration file)

2. Bootloader sends list of boot entries to server specified in configuration file or if no server was specified to the DHCP server (Dynamic Host Configuration Protocol)

  3. Server receives boot entries 4. Server sends selection to bootloader 5. Bootloader loads OS that server selected See figures 1 to 4 below.


Page 02 of 4

Figure 1

Figure 2


Page 03 of 4

Figure 3

Figure 4



Page 04 of 4

Advantages

• Secure • Only data is send, no (executable) code, no remote hacking • Client interprets data • Client may ignore server selection • Clien...