Claims
- 1. A system for updating application code on a client device from a remote server, said system comprising:
a client device further comprising permanent memory and writeable non-volatile memory; an interface between said client device and a communication channel connected to the remote server; software code stored in said permanent memory to perform a boot sequence on said client device, said boot sequence including verifying the validity of application software contained in said writeable memory, retrieving from the remote server through said communication channel update data for identifying invalid code segments, retrieving from the remote server through said communication channel replacement code for replacement of said invalid code segments, comparing validity status data within said update data for identifying invalid code segments such that only invalid code segments need be replaced whereby a compression of data transmission is effected; and authentication data stored in said permanent memory for authenticating said update information.
- 2. The system of claim 1 wherein said system further comprises a forced update switch for generating a reset signal; and wherein said boot sequence further comprises checking for a forced update signal and initiating retrieval of said update data in response to said forced update signal.
- 3. The system of claim 1 wherein said writeable non-volatile memory further comprises a forced update flag settable in response to software errors or upgrade requests; and wherein said boot sequence further comprises checking said forced update flag and initiating retrieval of said update data in response to said forced update flag.
- 4. A method of updating application code on a client device from a remote server over a communication channel, said method comprising:
a) performing a boot sequence based under control of boot code stored in permanent memory in said client device; b) determining whether to update a software application stored in writeable non-volatile memory, and terminating the boot sequence if no update is necessary; c) retrieving from said remote server over said communication channel update data for identifying invalid code segments; d) retrieving from said remote server over said communication channel, replacement code for replacement of said invalid code segments; e) comparing validity status data within said update data for identifying invalid code segments against said replacement code such that only a function of said replacement code need be checked to determine validity of said replacement code whereby a compression of data transmission is effected; f) comparing authentication data within said update data with authentication data stored in said permanent memory for authenticating said update data; g) downloading and authenticating said replacement code from servers specified by location data within said update data upon successful authentication of said update data; and h) writing said replacement code into said writeable memory.
- 5. The method of claim 4 wherein step b) further comprises checking for a forced update signal and initiating an update in response to said forced update signal.
- 6. The method of claim 4 wherein step b) further comprises checking a forced update flag in said writeable memory and initiating an update in response to said forced update flag.
- 7. The method of claim 4 wherein step g) comprises determining from validity status data in said update data which code segments of said software application require updating and downloading only those software code segments requiring updating.
- 8. The method of claim 7 wherein said validity status data comprises hash codes corresponding to discrete logical segments of code within said software application.
- 9. The method of claim 8 wherein said location data comprises internet addresses corresponding to said discrete logical units of code.
- 10. The method of claim 4 wherein said replacement code is encrypted and step g) further comprises decrypting said replacement code.
- 11. The method of claim 4 wherein said replacement code is compressed and step g) further comprises decompressing said replacement software code.
- 12. The method of claim 4 wherein said authentication data comprises a digital signature.
- 13. A system for updating application code on a client device from a remote server, said system comprising:
means for providing permanent memory and writeable non-volatile memory; means for interfacing between said client device and a communication channel connected to the remote server; means for storing software code in said permanent memory including a means for performing a boot sequence on said client device, said boot sequence including a means for verifying the validity of application software contained in said writeable memory; means for retrieving from the remote server through said communication channel, update data for identifying invalid code segments; means for replacement of said invalid code segments with replacement code; means for comparing validity status data within said update data for identifying invalid code segments against said replacement code such that only a portion of said replacement code need be checked to determine validity of said replacement code whereby a compression of data is effected; and means for storing authentication data in said permanent memory for authenticating said update information.
Parent Case Info
[0001] Provisional Application Ser. No. 60/046,749, filed May 12, 1997, in the name of inventors Robert Shaw, Christopher Moeller, Clifford Mercer, Mark Law, and Luis Valente, titled “Operating System and Memory Management,” attorney docket number NAV-006P.