Multiple system images for over-the-air updates

ABSTRACT

In one embodiment, a computing device may execute software from a first portion of memory of the computing device. The computing device may download from a server a new version of the software. The client computing device may receive instructions from the server to request an over-the-air (OTA) download of the new version of the software. The instructions may be an out-of-band message. The new version of the software may be installed into a second portion of memory of the computing device, and the new version of the software is executed from the second portion of memory. The download of the new version of software may be pursuant to a manifest for the download to determine whether the computing device may download the new version of software.

RELATED APPLICATIONS

This application is a continuation under 35 U.S.C. §120 of U.S. patentapplication Ser. No. 14/322,792, filed 2 Jul. 2014, which is acontinuation under 35 U.S.C. §120 of U.S. patent application Ser. No.14/097,327, filed 5 Dec. 2013, now U.S. Pat. No. 8,832,439, issued 9Sep. 2014, which is a continuation under 35 U.S.C. §120 of U.S. patentapplication Ser. No. 13/349,137, filed 12 Jan. 2012, now U.S. Pat. No.8,631,239, issued 1 Jan. 2014.

TECHNICAL FIELD

The present disclosure relates generally to over-the-air softwareupdates.

BACKGROUND

Mobile devices possessing wireless data connectivity to public IPnetworks, otherwise known as the Internet, have become prevalent inrecent times. Mobile devices include system software, or firmware thatmay need updating or reprogramming to remedy security exploits, bugs,and to support new features. Mobile devices commonly support OTA (overthe air) programming, or FOTA (firmware over the air). It is used forupgrades to mobile phones and PDAs. The feature goes by several namesincluding “software update”, “firmware update” or “device management.”Originally, firmware updates required visiting a specific servicecenter, every mobile brand having their own. Another method has beenupgrading by connecting the mobile device via a cable to a PC (personalcomputer). Both these methods are considered inconvenient by consumersand also depend heavily on consumers to seek out the upgrade, andtherefore the majority of mobile phone manufacturers and operators havenow adopted FOTA technology for their handsets. If the mobile device hasFOTA capability, the user can instead download the firmware upgrade overthe air directly from his or her mobile device. FOTA also allowsmanufacturers and operators to “push out” firmware upgrades to ensurethat mobile consumers have the latest software improvements, which helpsreduce customer support costs and increase consumer satisfaction.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A illustrates an example network environment facilitating a FOTAoperation.

FIG. 1B illustrates an example network environment of a socialnetworking system.

FIG. 2A illustrates an example partitioning of memory to support abackground OTA firmware update.

FIG. 2B illustrates an example method of performing an OTA firmwareupdate.

FIG. 3 an example method of receiving a manifest for performing a FOTAoperation.

FIG. 4 illustrates an example method of performing a resumable downloadof firmware during an FOTA operation.

FIG. 5 illustrates an example method of booting a mobile device withnewly-downloaded firmware.

FIG. 6 illustrates the software execution and security checks involvedin the boot process of FIG. 5.

FIG. 7 illustrates an example network environment.

FIG. 8 illustrates an example computer system.

FIG. 9 illustrates an example mobile device platform.

DETAILED DESCRIPTION

Particular embodiments are now described in detail with reference to afew embodiments thereof as illustrated in the accompanying drawings. Inthe following description, numerous specific details are set forth inorder to provide a thorough understanding of the present disclosure. Itis apparent, however, to one skilled in the art, that the presentdisclosure may be practiced without some or all of these specificdetails. In other instances, well known process steps and/or structureshave not been described in detail in order not to unnecessarily obscurethe present disclosure. In addition, while the disclosure is describedin conjunction with the particular embodiments, it should be understoodthat this description is not intended to limit the disclosure to thedescribed embodiments. To the contrary, the description is intended tocover alternatives, modifications, and equivalents as may be includedwithin the spirit and scope of the disclosure as defined by the appendedclaims.

FIG. 1A illustrates an example network environment in which data may betransmitted from a server to a mobile device. In particular embodiments,update update server 120 may communicate with mobile device 122 andtransmit data to mobile device 122 through network cloud 121. Updateserver 120 may comprise one or more computers or computing devices. Inparticular embodiments, update server 120 may be operably connected topayload server 124. Update server 120 and payload server 124 may beoperable to deliver, alone or in conjunction, an OTA update of anysuitable software application to mobile device 122.

Network cloud 121 generally represents a network or collection ofnetworks (such as the Internet, a corporate intranet, a virtual privatenetwork, a local area network, a wireless local area network, a cellularnetwork, a wide area network, a metropolitan area network, or acombination of two or more such networks) over which update server 120may communicate with mobile device 122.

Mobile device 122 is generally a portable computer or computing deviceincluding functionality for communicating (e.g., remotely) over anetwork. For example, mobile device 122 can be a mobile phone, a tabletcomputer, a laptop computer, a handheld game console, an electronic bookreader, or any other suitable portable devices. Mobile device 122 mayexecute one or more client applications, such as a web browser (e.g.,Microsoft Windows Internet Explorer, Mozilla Firefox, Apple Safari,Google Chrome, and Opera, etc.) or special-purpose client application(e.g., Microsoft Outlook, Facebook for iPhone, etc.), to access and viewcontent and messages transmitted from update server 120 over networkcloud 121. In particular embodiments, mobile device 122 may connect tonetwork cloud 121 via a base station 131 of a cellular network (e.g., aGlobal System for Mobile Communications or GSM cellular network, a LongTerm Evolution or LTE network). In particular embodiments, mobile device122 may connect to network cloud 121 via a wireless access point 132 ofa WI-FI network.

In particular embodiments, mobile device 122 may connect to a socialnetworking system through network cloud 121. A social networking system,such as a social networking website, enables its users to interact withit, and with each other through, the system. Typically, to become aregistered user of a social networking system, an entity, either humanor non-human, registers for an account with the social networkingsystem. Thereafter, the registered user may log into the socialnetworking system via an account by providing, for example, a correctlogin ID or username and password. As used herein, a “user” may be anindividual (human user), an entity (e.g., an enterprise, business, orthird party application), or a group (e.g., of individuals or entities)that interacts or communicates with or over such a social networkenvironment.

When a user registers for an account with a social networking system,the social networking system may create and store a record, oftenreferred to as a “user profile”, in connection with the user. The userprofile may include information provided by the user and informationgathered by various systems, including the social networking system,relating to activities or actions of the user. For example, the user mayprovide his name, profile picture, contact information, birth date,gender, marital status, family status, employment, education background,preferences, interests, and other demographical information to beincluded in his user profile. The user may identify other users of thesocial networking system that the user considers to be his friends. Alist of the user's friends or first degree contacts may be included inthe user's profile. Connections in social networking systems may be inboth directions or may be in just one direction. For example, if Bob andJoe are both users and connect with each another, Bob and Joe are eachconnections of the other. If, on the other hand, Bob wishes to connectto Sam to view Sam's posted content items, but Sam does not choose toconnect to Bob, a one-way connection may be formed where Sam is Bob'sconnection, but Bob is not Sam's connection. Some embodiments of asocial networking system allow the connection to be indirect via one ormore levels of connections (e.g., friends of friends). Connections maybe added explicitly by a user, for example, the user selecting aparticular other user to be a friend, or automatically created by thesocial networking system based on common characteristics of the users(e.g., users who are alumni of the same educational institution). Theuser may identify or bookmark websites or web pages he visits frequentlyand these websites or web pages may be included in the user's profile.

The user may provide information relating to various aspects of the user(such as contact information and interests) at the time the userregisters for an account or at a later time. The user may also updatehis or her profile information at any time. For example, when the usermoves, or changes a phone number, he may update his contact information.Additionally, the user's interests may change as time passes, and theuser may update his interests in his profile from time to time. A user'sactivities on the social networking system, such as frequency ofaccessing particular information on the system, may also provideinformation that may be included in the user's profile. Again, suchinformation may be updated from time to time to reflect the user'smost-recent activities. Still further, other users or so-called friendsor contacts of the user may also perform activities that affect or causeupdates to a user's profile. For example, a contact may add the user asa friend (or remove the user as a friend). A contact may also writemessages to the user's profile pages—typically known as wall-posts. Auser may also input status messages that get posted to the user'sprofile page.

A social network system may maintain social graph information, which cangenerally model the relationships among groups of individuals, and mayinclude relationships ranging from casual acquaintances to closefamilial bonds. A social network may be represented using a graphstructure. Each node of the graph corresponds to a member of the socialnetwork. Edges connecting two nodes represent a relationship between twousers. In addition, the degree of separation between any two nodes isdefined as the minimum number of hops required to traverse the graphfrom one node to the other. A degree of separation between two users canbe considered a measure of relatedness between the two users representedby the nodes in the graph.

A social networking system may support a variety of applications, suchas photo sharing, on-line calendars and events. For example, the socialnetworking system may also include media sharing capabilities. Forexample, the social networking system may allow users to postphotographs and other multimedia files to a user's profile, such as in awall post or in a photo album, both of which may be accessible to otherusers of the social networking system. Social networking system may alsoallow users to configure events. For example, a first user may configurean event with attributes including time and date of the event, locationof the event and other users invited to the event. The invited users mayreceive invitations to the event and respond (such as by accepting theinvitation or declining it). Furthermore, social networking system mayallow users to maintain a personal calendar. Similarly to events, thecalendar entries may include times, dates, locations and identities ofother users.

The social networking system may also support a privacy model. A usermay or may not wish to share his information with other users orthird-party applications, or a user may wish to share his informationonly with specific users or third-party applications. A user may controlwhether his information is shared with other users or third-partyapplications through privacy settings associated with his user profile.For example, a user may select a privacy setting for each user datumassociated with the user and/or select settings that apply globally orto categories or types of user profile information. A privacy settingdefines, or identifies, the set of entities (e.g., other users,connections of the user, friends of friends, or third party application)that may have access to the user datum. The privacy setting may bespecified on various levels of granularity, such as by specifyingparticular entities in the social network (e.g., other users),predefined groups of the user's connections, a particular type ofconnections, all of the user's connections, all first-degree connectionsof the user's connections, the entire social network, or even the entireInternet (e.g., to make the posted content item index-able andsearchable on the Internet). A user may choose a default privacy settingfor all user data that is to be posted. Additionally, a user mayspecifically exclude certain entities from viewing a user datum or aparticular type of user data.

Social networking system may maintain a database of information relatingto geographic locations or places. Places may correspond to variousphysical locations, such as restaurants, bars, train stations, airportsand the like. Some places may correspond to larger regions thatthemselves contain places—such as a restaurant or a gate location in anairport. In one implementation, each place can be maintained as a hubnode in a social graph or other data structure maintained by the socialnetworking system.

FIG. 1B illustrates an example social networking system. In particularembodiments, the social networking system may store user profile dataand social graph information in user profile database 101. In particularembodiments, the social networking system may store user event data inevent database 102. For example, a user may register a new event byaccessing a client application to define an event name, a time and alocation, and cause the newly created event to be stored in eventdatabase 102. In particular embodiments, the social networking systemmay store user privacy policy data in privacy policy database 103. Inparticular embodiments, the social networking system may storegeographic and location data in location database 104. In particularembodiments, databases 101, 102, 103, and 104 may be operably connectedto the social networking system's front end. In particular embodiments,the front end 120 may interact with client device 122 through networkcloud 121. Client device 122 is generally a computer or computing deviceincluding functionality for communicating (e.g., remotely) over acomputer network. Client device 122 may be a desktop computer, laptopcomputer, personal digital assistant (PDA), in- or out-of-car navigationsystem, smart phone or other cellular or mobile phone, or mobile gamingdevice, among other suitable computing devices. Client device 122 mayexecute one or more client applications, such as a web browser (e.g.,Microsoft Windows Internet Explorer, Mozilla Firefox, Apple Safari,Google Chrome, and Opera, etc.) or special-purpose client application(e.g., Facebook for iPhone, etc.), to access and view content over acomputer network. Front end 120 may include web or HTTP serverfunctionality, as well as other functionality, to allow users to accessthe social networking system. Network cloud 121 generally represents anetwork or collection of networks (such as the Internet or a corporateintranet, or a combination of both) over which client devices 122 mayaccess the social network system.

In particular embodiments, location database 104 may store aninformation base of places, where each place includes a name, ageographic location and meta information (such as the user thatinitially created the place, reviews, comments, check-in activity data,and the like). Places may be created by administrators of the systemand/or created by users of the system. For example, a user may registera new place by accessing a client application to define a place name andprovide a geographic location and cause the newly created place to beregistered in location database 104. As discussed above, a created placemay correspond to a hub node, which an administrator can claim forpurposes of augmenting the information about the place and for creatingads or other offers to be delivered to users. In particular embodiments,system front end 120 may construct and serve a web page of a place, asrequested by a user. In some embodiments, a web page of a place mayinclude selectable components for a user to “like” the place or check into the place. In particular embodiments, location database 104 may storegeo-location data identifying a real-world geographic location of a userassociated with a check-in.

While mobile device 122 may access the social networking system througha mobile web browser resident on mobile device 122, in particularembodiments, mobile device 122 may run a special piece of applicationsoftware installed in the memory of mobile device 122 to connect to thesocial networking system. In particular embodiments, the specializedsocial networking application may maintain a persistent TCP/IPconnection with the social networking system in order to send andreceive updates from mobile device 122 to the social networking system.In particular embodiments, the firmware of mobile device 122 itself maybe provided by the social networking system. While this disclosuredescribes updating system firmware provided by a social networkingsystem, this disclosure is applicable to any type of firmware orsoftware OTA update.

Security is of eminent concern in firmware, and to a lesser extent,software application updates. Generally, firmware or softwareapplication publishers push new versions of their software/firmware tousers in response to correcting a bug or fixing a software exploit thatallows users or third-parties to compromise the device or the system.For example, the firmware/software publisher may update their softwareto eliminate a particular software exploit or attack, such as aneavesdropping or man-in-the-middle exploit. However, generally when anew update is announced, the exploit becomes public. Thus, there is arisk that malicious users may harvest software updates, downgrade theirparticular mobile device, and compromise the overall system.

FIG. 2A illustrates an example storage area 200 of mobile device 122. Inparticular embodiments, storage area 200 is solid-state flash memory,but this disclosure contemplates any suitable storage media. Flashmemory 200 is partitioned into a plurality of discrete blocks.Bootloader partition 201 stores a dedicated application program executedby the system chip of mobile device 122 to begin the booting sequence toload the system image into RAM. In particular embodiments, thebootloader application may be digitally signed by a private key forsecurity purposes. In particular embodiments, bootloader partition 201may include multiple replicas of the bootloader application for flashsafety; if one page of memory in which the bootloader application sitsis corrupted, mobile device 122 may load one of the copies of thebootloader application.

As will be discussed further, booting to a particular system imagerequires a signed an authenticated manifest. Flash memory 200 includes arecovery manifest partition 202 that is necessary for booting torecovery system image partition 203. In particular embodiments, recoverymanifest partition 202 is digitally signed with both a universalmanifest key and a device specific manifest key for authentication andsecurity purposes. In particular embodiments, recovery manifest 202includes device 122's unique serial number. In particular embodiments,the serial number in manifest stored in manifest partition 202 is signedby a serial number key. The various keys permit the bootloader to verifythat the recovery manifest stored in manifest partition 202 comes from atrusted source, and is not third-party code for purposes of exploitingsecurity flaws. For instance, absent any security updates, a user mayoverwrite recovery system image in recovery system image partition 203with a custom ROM, and corrupt the other system images or manifests,forcing mobile device 122 to boot to a third-party ROM.

Recovery system image partition 203 stores the system image, orfirmware, that shipped from the factory floor with mobile device 122. Inparticular embodiments, recovery system image partition 203 is used whenthe device's other system image partitions 206 and 207 have beencorrupted, so that mobile device 122 may revert back to factory settingsif the device has been bricked.

Manifest partition 205 stores a manifest that is critical for booting toa system image written in system image partition #1 (206) or systemimage partition #2 (207). Because data corruption of the manifest mayresult in being unable to boot to either system image, in particularembodiments, flash memory 200 may include multiple copies of themanifest in manifest partition 205. In particular embodiments, themanifest is signed with a universal manifest private key and per devicemanifest private key.

Flash memory includes system image partitions 1 and 2 (206 and 207) forstoring system firmware. At any given moment, only one system image isrunning (the “active image”), and the other image is free for updating(the “inactive image”). Thus, mobile device may run active image 1 whileupdating inactive image 2 and reboot to image 2, therefore making image2 the active image. In such a manner, mobile device 122 “ping-pongs”between the two system images. The overall update process is describedin further detail with respect to FIG. 2A.

Flash memory 200 also includes writable user data partition 208 forstoring applications, media, and other user data, and unwritable systemdata partition 204 for maintaining operating system settings and othernecessary files.

FIG. 2B illustrates an example high-level method for performing an OTAfirmware update using the memory configuration of FIG. 2A. At Step 210,mobile device 122 begins the OTA update process. Subsequently, at Step220, mobile device 122, while still running on the active system image,for example, system image #1 (206), requests an update from athird-party. At Step 230, mobile device 122 receives an OTA manifest forthe update, and writes it to manifest partition 205. At Step 240, mobiledevice 122 downloads the updated firmware and writes it to the inactivesystem image; in this example, system image #2 (207). Finally, tocomplete the update process, mobile device 122 reboots to the updatedimage (system image #2) at Step 250. The downloading of the manifest,downloading of the payload, and booting of the system are described infurther detail with regard to FIGS. 3, 4, and 5/6, respectively.

FIG. 3 illustrates an example method of updating system firmwareresident on client device 122 via an update server 120 and payloadserver 124. As previously discussed, update server 120 may be a separateserver from payload server 124. In particular embodiments, update server120 and payload server 124 may be the same server or servers. Thisdisclosure contemplates any suitable hardware configuration for updateserver 120 and payload server 124.

At Step 301, the OTA update process begins. In particular embodiments,the OTA update process may be triggered based on the expiration of aperiodic timer, such as once a day. In particular embodiments, thesocial networking system, software provider, or carrier may trigger theOTA update process by transmitting an out-of-band message instructingmobile device 122 to begin the OTA process. In particular embodiments,the out of band message may be via the short-message service (SMS) inthe form of a text or MIMS message. In particular embodiments, the outof band message may be via the SMS in the form of a notification. Inparticular embodiments, the out of band message may be a wireless accessprotocol (WAP) push over the carrier SMS channel. In particularembodiments, the out of band message may be a data message through thepacket switched core network of the carrier of mobile device 122. Inparticular embodiments, the out of band message may be a notificationpushed from the social networking system via a persistent TCP/IPconnection with mobile device 122. In particular embodiments, thepersistent TCP/IP connection is a VPN tunnel. In particular embodiments,the OTA update process is triggered by user action, such as selecting an“update device” option from the user interface of mobile device 122.This disclosure contemplates any suitable means of triggering the OTAupdate process.

At Step 302, mobile device 122 polls update server 120 to check if a newfirmware update is available by sending a request to the URL or IPaddress of update server 120. In particular embodiments, the request maybe in the form of an HTTP POST request. In particular embodiments, therequest may be an HTTPS POST. In particular embodiments, the request mayinclude the time of the request for security purposes, such as toprevent a malicious user from requesting older versions of the firmware.In particular embodiments, the request may include an identifier for theparticular hardware platform of mobile device 122. In particularembodiments, the request may include the current software (or “system”)version running on mobile device 122, again to prevent a malicious userfrom hoarding or harvesting previous updates. In particular embodiments,the request may include the update time in order to protect againstman-in-the-middle attacks; increased or abnormally long latency mayindicate the presence of a malicious third-party.

In particular embodiments, update server 120 generates a unique firmwareOTA manifest for each mobile device 122 based on its unique serialnumber. In order to verify the authenticity of the serial number ofmobile device 122, mobile devices 122 making a request to update server120 may, in particular embodiments, digitally sign the request viaasymmetric key algorithms. In particular embodiments, when mobile device122 is manufactured, the device manufacturer may burn a serial numberprivate key into the ROM or fuses of mobile device 122, so that mobiledevice 122 may digitally sign transmissions to third-parties having thematching serial number public key. In particular embodiments, the serialnumber private key is unique to each device. In particular embodiments,the serial number key is universal to all devices, but mobile device 122and update server 120 maintain public and private keys unique to eachdevice. Thus, in such embodiments, a third-party may detect a devicespoofing a particular serial number, because the device cannot signrequests with a correct serial number private key. In particularembodiments, the device serial number is burned into the fuses or ROM ofmobile device 122, and as such, a user cannot alter the device's serialnumber.

For didactic purposes, an example request message is provided below:

POST https://device.facebook.com/update? time=1309272392&hardware-version=g1d030a7& device-serial-number=355266040148288&system-version=1.03& update-time=1307491710&previous-system-version=1.01&update-check-trigger=device/facebook-push/user-ui/recovery-mode&development=0& hmac=facdd9a635a1e402a83810824d8c65e

In the above example, the hmac (hash-based message authentication code)value is generated by a particular cryptographic hash function inconjunction with the serial number private key. In particularembodiments, the hash function is MD5 or SHA-1. Methods of verifyingdata integrity and authenticity are well-known in the art, and thisdisclosure contemplates any suitable method of verifying theauthenticity of a request.

At Step 303, update server 120 receives the request from mobile device122. In particular embodiments, update server 120 checks thesystem-version value transmitted in the request. If this value matchesthe most recent version available, at Step 304, update server 120transmits a value in response to the HTTPS POST request, for example“302”, that indicates that mobile device 122 has the most up-to-datesoftware, and should do nothing. Mobile device 122, upon receiving theresponse, terminates the OTA process.

In particular embodiments, update server 120 may be busy due to networkcongestion, technical difficulties, or other unforeseen issues, and mayissue a response to the HTTPS POST request, for example, “400”,indicating that mobile device 122 should try again later. In suchembodiments, mobile device 122 may wait a predetermined amount of time,for example one hour, and retransmit the HTTPS POST request to updateserver 120.

If, at Step 303, update server 120 determines that a new version for thefirmware/software exists, update server 120 then validates the requestat Step 304. In particular embodiments, update server 120 mayadditionally determine at Step 303 whether mobile device 122 is allowedto obtain the updated firmware. For example, the administrator of updateserver 120 may progressively roll out firmware or software in order toslowly address any complaints and prevent widespread damage, or“bricking” of all its customers. For example, update server 120 may rollout firmware updates based on IP address ranges or physical locations,hardware or system version, or based on the user's corporate affiliation(such as the administrator of update server 120's own employees). Thisdisclosure contemplates any suitable method of selectively rolling out asoftware update, and any suitable method of determining whether aparticular mobile device 122 is scheduled or authorized for a firmwareupdate.

If update server 120 determines that a new update is available and, inparticular embodiments, that requesting mobile device 122 is authorizedto download the update, at Step 205, update server 120 validates therequest. In particular embodiments, update server 120 includes a copy ofthe serial number private key of mobile device 122. In such embodiments,update server 120 may validate the request by checking the hmac valueand device serial number. In particular embodiments, update server 10may include mobile device 122's serial number public key in order tovalidate the request. As previously disclosed, in particular embodimentsthe serial number keys may be universal to all devices. In particularembodiments, the serial number keys are unique to each device/serialnumber. This disclosure contemplates any suitable implementation forsecurely validating a request.

At Step 306, update server 120 generates a unique OTA manifest for theupdate for mobile device 122. The OTA manifest is one of two keys tokeeping the OTA update process secure; it also provides instructions tomobile device 122 for downloading the payload (the actual firmwareupdate). For didactic purposes, an example manifest is displayed below:

manifest {   systemVersion: “1.02”,   payloadURL:  “http://device.update.com/99993e364706816aba3e25717850c26”,  payloadSHA1: “99993e364706816aba3e25717850c26”,   systemSHA1:“601f1889667efaebb33b8c12572835da”,   updaterSHA1:“2ab01a57287b40037b4cdb3bed18b8”,     downloadPolicy [       {bearer:“wife”, battery: “charging”,       bandwidthLimit: 262144},      {bearer: “3g”, time: {2200, 0600}, battery: 50},       {bearer:“3g”, state: “idle”, bandwidthLimit: 65536,       battery: 50},     ],  reboot {     deadline: 1307088682,     battery: 25,   } }deviceSerialNumber: “355263040152098”

The example manifest above includes a system version and a URL fromwhich mobile device 122 may download the payload (the firmware update).In particular embodiments, mobile device 122 downloads the payload viaHTTP. In particular embodiments, mobile device 122 downloads the payloadvia FTP. This disclosure contemplates any suitable transfer protocol fordownloading the payload, and any suitable URL defining a location fromwhich the payload may be downloaded.

In particular embodiments, the OTA manifest includes a series of hmacvalues for verifying the data integrity or authenticating variousportions of the update. In the example above, the manifest includes hashvalues for the payload, system, and updater. In particular embodiments,these hash values may be utilized by mobile device 122 to verify dataintegrity after the download of each portion of the payload, after acomplete download of the payload, and after writing the payload to flashto ensure error-free writing. Although the example above describes hashvalues generated via the SHA1 cryptographic hash function, thisdisclosure contemplates any suitable cryptographic hash function,including without limitation: MD5, GOST, HAVAL, MD2, MD4, PANAMA,RadioGatun, RIPEMD, SHA-0, SHA-256/224, SHA-512/384, Tiger(2),WHIRLPOOL, and the like. This disclosure contemplates any suitablecryptographic hash function. In particular embodiments, the downloadedpayload, system, and updater are unsigned by update server 120 orpayload server 124 in order to reduce cryptographic calculation.

The manifest also includes a download policy, instructing mobile device122 when and how to download the payload. In particular embodiments, themanifest may define the bearer over which mobile device 122 is todownload the payload, for example WiFi, 3G, or 4G. In particularembodiments, the manifest may define the battery state required todownload the payload, for example, charging, over 50%, etc. Inparticular embodiments, the manifest may control the dates and times atwhich mobile device 122 may download the update. In particularembodiments, the manifest may define the state in which mobile device122 must be in order to download the update; for example, only when thedevice is not actively in use. In particular embodiments, the manifestmay define a data or bandwidth limit for the download of the update; forexample, only 1 MB a day or 256k/hour etc. In the above example, themanifest defines three download policies: first, mobile device 122 ispermitted to download the payload when it is on a WiFi bearer andplugged in, up to 262,144 bytes. In the second policy, mobile device 122is permitted to download on a 3G bearer from the hours of 10 PM to 6 AMif the battery is above 50%. In the final policy, mobile device 122 ispermitted to download over a 3G bearer when the device is idle and hasover 50% battery, up to 65k of data. This disclosure contemplates amanifest defining any suitable device or environmental condition fordownloading the payload.

In particular embodiments, the manifest defines when the device rebootsto the newly updated system image. Because rebooting modern mobiledevices is a time-consuming process, it is preferable to reboot mobiledevice 122 when the user is not actively interacting with the device, orfurther, when the user is unlikely to interact with the device for apredetermined amount of time. Thus, in particular embodiments, themanifest may define that the mobile device only reboot itself during aparticular time window, for example, from 3 AM-5 AM. In particularembodiments, the manifest may define a battery state in the rebootconditions. For example, the manifest may instruct mobile device 122only to reboot if the battery level meets some minimum threshold. Inparticular embodiments, the reboot operation may be overridden by useraction. For example, the device may provide the user with a prompt thatstates his or her device will reboot in 10 seconds absent userintervention. This disclosure contemplates any suitable device orenvironment condition requirement for rebooting mobile device 122.

In particular embodiments, the OTA manifest also includes the serialnumber for mobile device 122. Thus the portion under the “manifest { }”block is the universal manifest, because it is the same for all devices.As will be discussed in further detail with reference to paragraphs 5and 6, the system bootloader will not load a system image unless themanifest passes a number of checks. In particular embodiments, one suchcheck is to determine that the manifest serial number matches the serialnumber of the mobile device.

In particular embodiments, to enhance security, the manifest andappended serial number may each be signed by a different cryptographicsecurity key. The universal manifest itself may be signed by a universalmanifest private key stored at the firmware developer's secure location.Because, in such embodiments, mobile device 122 maintains a copy of theuniversal manifest public key, mobile device 122 may verify that themanifest comes from the developer itself, rather than a man-in-themiddle. Additionally, the serial number appended to the manifest may besigned by a number of keys. In particular embodiments, the serial numbermay be signed by a private per device manifest key stored at updateserver 120. Because mobile device 122 maintains a public per devicemanifest key, mobile device 122 may verify the identity of the firmwaredeveloper. In particular embodiments, the serial number appended to theuniversal manifest may also be signed with a serial number private keymaintained at the update server 120. In particular embodiments, theserial number may be signed by both the private per device manifest andserial number keys. This disclosure contemplates any suitable method ofauthenticating the universal manifest and serial number.

At Step 307, mobile device 122 receives the manifest from update server120 and authenticates the universal manifest and serial number asdescribed above. In particular embodiments, it uses itsUniveralManifestKey.public to authenticate the signature on theuniversal manifest, and PerDeviceManifestKey.public andSerialNumberKey.private to authenticate the signature on the serialnumber.

Having authenticated the manifest, mobile device 122 at Step 308 arequests the payload from payload server 124 by making a request to theURL specified in the manifest. In particular embodiments, the request isan HTTP request. In particular embodiments, the request is an HTTPrequest with range support in order to support resumable or partialdownloading of the payload. In particular embodiments, the request is atorrent tracker file for downloading from a plurality of downloadservers 124. This disclosure contemplates any suitable method ofrequesting and downloading the payload. Steps 308 a-d pertain to thedownloading of the payload; the download process is described in furtherdetail with respect to FIG. 4. After successfully downloading thepayload, at Step 309, mobile device 122 reboots the system in accordancewith the reboot instructions included in the manifest.

FIG. 4 illustrates the download process of 308 a-d in greater detail. AtStep 401, mobile device accesses the download policies included in thereceived manifest (for example, “DownloadPolicy[ ]”). At Step 402,mobile device 122 begins the download of the payload pursuant to theinstructions in the download policy. In particular embodiments, thepayload may be cached or hosted on a third-party server separate fromthe firmware developer's servers. In particular embodiments, the payloadmay be segmented into multiple blocks of a predetermined size, forexample, 65k. In particular embodiments, mobile device 122 downloads thepayload to system data partition 204.

At Step 403, mobile device 122 begins download of the next block. Mobiledevice 122 downloads blocks so long as it meets the download policies inthe manifest; if mobile device 122 meets its daily bandwidth or datalimit, for example, it stops downloading until it is able to downloadmore data pursuant to the download policy. At Step 404, mobile device122 checks whether it has downloaded the complete payload to system datapartition 204. If not, the process repeats Step 403.

After downloading the entire payload, at Step 405, the current runningsystem in the user space checks the downloaded data against the hashvalue transmitted in the manifest. For example, mobile device 122 mayrun the SHA-1 algorithm on the downloaded data, and check it against thevalue of payloadSHA1 received in the universal manifest. If the valuesdo not match, mobile device 122 knows that a download error hasoccurred, and at Step 406, it identifies which blocks were corrupted. Inparticular embodiments, each block includes its own hash value (SHA1 orotherwise). In such embodiments, at Step 406 mobile device 122calculates hash values for each downloaded block and compares it to thehash value downloaded with each block. In particular embodiments, mobiledevice 122 performs a checksum immediately upon downloading a block, andredownloads any blocks whose calculated hash value does not match itsdownloaded hash value. This disclosure contemplates any suitable methodof checking individual blocks and identifying bad blocks of the payload.

After identifying the bad blocks, mobile device 122 then requests frompayload server 124 only the bad blocks for re-downloading at Step 407.The process then returns to the hack check of 405 to verify the dataintegrity of the entire downloaded payload. After verifying that thehash value of the complete payload matches the value of payloadSHA1, theprocess proceeds to Step 408. In particular embodiments, the systemcalls a more secure layer to perform the hash check of Step 407immediately prior to writing the system image to flash memory 200.

At Step 408 mobile device 122 copies the downloaded system image fromsystem data partition 204 to the inactive system image partition.Because a single bad page write onto flash memory 200 could cause a bootfailure, mobile device 122 performs one more hash check at Step 409 toverify the data integrity of the system image written to the inactivesystem image partition. In particular embodiments, the payload may be incompressed format. In such embodiments, mobile device 122 may extractthe downloaded system image to the inactive system partition. Finally,if the system image in the inactive system image partition passes thehash check, the system reboots pursuant to the reboot instructions ofthe universal manifest and completes installation of the updatedfirmware.

FIG. 5 illustrates an example method of booting a mobile device to anewly updated system image. At Step 501, upon powering on the device,the boot ROM in the mobile chip validates the bootloader applicationsignature via a public bootloader key. In particular embodiments, theboot ROM first reads the boot configuration table (BCT) from one of thebootloader flash replicas, which contain the bootloader hash and theflash block address. The boot ROM then decrypts, via the publicbootloader key, the bootloader in memory, and verifies the bootloaderhash from the BCT. In particular embodiments, the public bootloader keyis burned into the fuses of mobile device 122 at the factory. Uponverifying the bootloader, the chip runs the bootloader application frombootloader partition 201.

At Step 502, the bootloader application gains execution control, and atStep 503, the bootloader reads the manifest from manifest partition 204.In particular embodiments, the bootloader may obtain the manifest fromany of the flash replicas in manifest partition 204.

At Step 503, the bootloader checks the manifest signature with thepublic universal manifest key (UniversalManifestKey.public) and thepublic per device manifest key (PerDeviceManifestKey.public). Inparticular embodiments, the bootloader also verifies the serial numberby using the serial number public key.

At Step 504, the bootloader verifies the hash value of the system imageagainst the hash value transmitted in the manifest. In particularembodiments, the bootloader may perform multiple checksums forpayloadSHA1, systemSHA1, or updaterSHA1. As previously described, anyparticular cryptographic hash function may be utilized.

After verifying that the hash value of the system image matches themanifest system image hash, at Step 506, the system kernel gainsexecution control, completing the update process.

FIG. 6 is an alternative representation of the boot process of FIG. 5.The thick dark arrows in FIG. 6 refer to the system execution flow,whereas the thin arrows refer to security checks.

Mobile device 122 leaves factory floor 607 with a number of pieces ofdata burned into the fuses 601 of its mobile chip 600: serial number 601a, serial number signature 601 b, and bootloader public key 601 c. Thesevalues cannot be changed by third-party code or any modifications,because they are physically hard-coded into the hardware of mobile chip600. As previously discussed, serial number 601 a is central to thesecurity of the OTA update; it permits update server 120 to validate anyrequest for a OTA software download. In particular embodiments, mobiledevice 122 may also include a serial number signature 602 b in itsrequests for OTA updates. Because the number signature 602 b is signedat factory floor 607 via SerialNumberKey.private (check 610), it isessentially impossible for a user to fake or spoof the serial number ofmobile device 122. That is, even if the user were able to obtain a blankmobile chip 600 and reprogram another serial number into fuses 601, heor she would be unable to generate serial number signature 601 b,because the user lacks SerialNumberKey.private. BootloaderKey.public isused by boot ROM 602 to validate bootloader signature 603 a.

Bootloader signature 603 a is generated at a secure location 608,typically at the location of the firmware developer, viaBootloaderKey.private 608 a (Step 611). Secure location 608 includes twoprivate keys that are never distributed to the public:Bootloaderkey.private and UniversalManifestKey.private. After thefirmware developer readies a firmware update to be pushed to alldevices, it attaches a signature to manifest 604 b. Universal manifestsignature 604 a is generated by digitally signing manifest 604 b withUniversalMainfiestKey.private (check 612).

Serial number 604 c is appended to the universal manifest by updateserver 120 during manifest generation. Serial number 604 c also includesa PerDeviceManifest signature 604 d. Both serial number 604 c andPerDeviceManifest signature 604 d are generated by update server 120 bydigitally signing the serial number with SerialNumberKey.private 609 b(check 613) and PerDeviceManifestKey.private 609 a, respectively.

Bootloader 603 verifies universal manifest signature 604 a viaUniversalManifestKey.pub in Step 503, serial number 604 c withSerialNumberKey.pub, and per device manifest signature 604 d withPerDeviceManifestKey.pub (Step 503 a). After the manifest has beenverified, the system image is hashed via a predetermined hash function,and checked against the hash value in manifest 604 b (System ImageSHA1). As previously described above, the newly updated system image orfirmware 605 then takes control of mobile device 122 (Step 506), and mayload applications 606.

While the foregoing embodiments may be implemented in a variety ofnetwork configurations, the following illustrates an example networkenvironment for didactic, and not limiting, purposes. FIG. 7 illustratesan example network environment 700. Network environment 700 includes anetwork 710 coupling one or more servers 720 and one or more clients 730to each other. Network environment 700 also includes one or more datastorage 740 linked to one or more servers 720. Particular embodimentsmay be implemented in network environment 700. For example, socialnetworking system frontend 120 may be written in software programshosted by one or more servers 720. For example, event database 102 maybe stored in one or more storage 740. In particular embodiments, network710 is an intranet, an extranet, a virtual private network (VPN), alocal area network (LAN), a wireless LAN (WLAN), a wide area network(WAN), a metropolitan area network (MAN), a portion of the Internet, oranother network 710 or a combination of two or more such networks 710.The present disclosure contemplates any suitable network 710.

One or more links 750 couple a server 720 or a client 730 to network710. In particular embodiments, one or more links 750 each includes oneor more wired, wireless, or optical links 750. In particularembodiments, one or more links 750 each includes an intranet, anextranet, a VPN, a LAN, a WLAN, a WAN, a MAN, a portion of the Internet,or another link 750 or a combination of two or more such links 750. Thepresent disclosure contemplates any suitable links 750 coupling servers720 and clients 730 to network 710.

In particular embodiments, each server 720 may be a unitary server ormay be a distributed server spanning multiple computers or multipledatacenters. Servers 720 may be of various types, such as, for exampleand without limitation, web server, news server, mail server, messageserver, advertising server, file server, application server, exchangeserver, database server, or proxy server. In particular embodiments,each server 720 may include hardware, software, or embedded logiccomponents or a combination of two or more such components for carryingout the appropriate functionalities implemented or supported by server720. For example, a web server is generally capable of hosting websitescontaining web pages or particular elements of web pages. Morespecifically, a web server may host HTML files or other file types, ormay dynamically create or constitute files upon a request, andcommunicate them to clients 730 in response to HTTP or other requestsfrom clients 730. A mail server is generally capable of providingelectronic mail services to various clients 730. A database server isgenerally capable of providing an interface for managing data stored inone or more data stores.

In particular embodiments, one or more data storages 740 may becommunicatively linked to one or more servers 720 via one or more links750. In particular embodiments, data storages 740 may be used to storevarious types of information. In particular embodiments, the informationstored in data storages 740 may be organized according to specific datastructures. In particular embodiment, each data storage 740 may be arelational database. Particular embodiments may provide interfaces thatenable servers 720 or clients 730 to manage, e.g., retrieve, modify,add, or delete, the information stored in data storage 740.

In particular embodiments, each client 730 may be an electronic deviceincluding hardware, software, or embedded logic components or acombination of two or more such components and capable of carrying outthe appropriate functions implemented or supported by client 730. Forexample and without limitation, a client 730 may be a desktop computersystem, a notebook computer system, a netbook computer system, ahandheld electronic device, or a mobile telephone. The presentdisclosure contemplates any suitable clients 730. A client 730 mayenable a network user at client 730 to access network 730. A client 730may enable its user to communicate with other users at other clients730.

A client 730 may have a web browser 732, such as MICROSOFT INTERNETEXPLORER, GOOGLE CHROME or MOZILLA FIREFOX, and may have one or moreadd-ons, plug-ins, or other extensions, such as TOOLBAR or YAHOOTOOLBAR. A user at client 730 may enter a Uniform Resource Locator (URL)or other address directing the web browser 732 to a server 720, and theweb browser 732 may generate a Hyper Text Transfer Protocol (HTTP)request and communicate the HTTP request to server 720. Server 720 mayaccept the HTTP request and communicate to client 730 one or more HyperText Markup Language (HTML) files responsive to the HTTP request. Client730 may render a web page based on the HTML files from server 720 forpresentation to the user. The present disclosure contemplates anysuitable web page files. As an example and not by way of limitation, webpages may render from HTML files, Extensible Hyper Text Markup Language(XHTML) files, or Extensible Markup Language (XML) files, according toparticular needs. Such pages may also execute scripts such as, forexample and without limitation, those written in JAVASCRIPT, JAVA,MICROSOFT SILVERLIGHT, combinations of markup language and scripts suchas AJAX (Asynchronous JAVASCRIPT and XML), and the like. Herein,reference to a web page encompasses one or more corresponding web pagefiles (which a browser may use to render the web page) and vice versa,where appropriate.

FIG. 8 illustrates an example computer system 800, which may be usedwith some embodiments of the present disclosure. This disclosurecontemplates any suitable number of computer systems 800. Thisdisclosure contemplates computer system 800 taking any suitable physicalform. As example and not by way of limitation, computer system 800 maybe an embedded computer system, a system-on-chip (SOC), a single-boardcomputer system (SBC) (such as, for example, a computer-on-module (COM)or system-on-module (SOM)), a desktop computer system, a laptop ornotebook computer system, an interactive kiosk, a mainframe, a mesh ofcomputer systems, a mobile telephone, a personal digital assistant(PDA), a server, or a combination of two or more of these. Whereappropriate, computer system 800 may include one or more computersystems 800; be unitary or distributed; span multiple locations; spanmultiple machines; or reside in a cloud, which may include one or morecloud components in one or more networks. Where appropriate, one or morecomputer systems 800 may perform without substantial spatial or temporallimitation one or more steps of one or more methods described orillustrated herein. As an example and not by way of limitation, one ormore computer systems 800 may perform in real time or in batch mode oneor more steps of one or more methods described or illustrated herein.One or more computer systems 800 may perform at different times or atdifferent locations one or more steps of one or more methods describedor illustrated herein, where appropriate.

In particular embodiments, computer system 800 includes a processor 802,memory 804, storage 806, an input/output (I/O) interface 808, acommunication interface 810, and a bus 812. Although this disclosuredescribes and illustrates a particular computer system having aparticular number of particular components in a particular arrangement,this disclosure contemplates any suitable computer system having anysuitable number of any suitable components in any suitable arrangement.

In particular embodiments, processor 802 includes hardware for executinginstructions, such as those making up a computer program. As an exampleand not by way of limitation, to execute instructions, processor 802 mayretrieve (or fetch) the instructions from an internal register, aninternal cache, memory 804, or storage 806; decode and execute them; andthen write one or more results to an internal register, an internalcache, memory 804, or storage 806. In particular embodiments, processor802 may include one or more internal caches for data, instructions, oraddresses. The present disclosure contemplates processor 802 includingany suitable number of any suitable internal caches, where appropriate.As an example and not by way of limitation, processor 802 may includeone or more instruction caches, one or more data caches, and one or moretranslation look-aside buffers (TLBs). Instructions in the instructioncaches may be copies of instructions in memory 804 or storage 806, andthe instruction caches may speed up retrieval of those instructions byprocessor 802. Data in the data caches may be copies of data in memory804 or storage 806 for instructions executing at processor 802 tooperate on; the results of previous instructions executed at processor802 for access by subsequent instructions executing at processor 802 orfor writing to memory 804 or storage 806; or other suitable data. Thedata caches may speed up read or write operations by processor 802. TheTLBs may speed up virtual-address translation for processor 802. Inparticular embodiments, processor 802 may include one or more internalregisters for data, instructions, or addresses. The present disclosurecontemplates processor 802 including any suitable number of any suitableinternal registers, where appropriate. Where appropriate, processor 802may include one or more arithmetic logic units (ALUs); be a multi-coreprocessor; or include one or more processors 802. Although thisdisclosure describes and illustrates a particular processor, thisdisclosure contemplates any suitable processor.

In particular embodiments, memory 804 includes main memory for storinginstructions for processor 802 to execute or data for processor 802 tooperate on. As an example and not by way of limitation, computer system800 may load instructions from storage 806 or another source (such as,for example, another computer system 800) to memory 804. Processor 802may then load the instructions from memory 804 to an internal registeror internal cache. To execute the instructions, processor 802 mayretrieve the instructions from the internal register or internal cacheand decode them. During or after execution of the instructions,processor 802 may write one or more results (which may be intermediateor final results) to the internal register or internal cache. Processor802 may then write one or more of those results to memory 804. Inparticular embodiments, processor 802 executes only instructions in oneor more internal registers or internal caches or in memory 804 (asopposed to storage 806 or elsewhere) and operates only on data in one ormore internal registers or internal caches or in memory 804 (as opposedto storage 806 or elsewhere). One or more memory buses (which may eachinclude an address bus and a data bus) may couple processor 802 tomemory 804. Bus 812 may include one or more memory buses, as describedbelow. In particular embodiments, one or more memory management units(MMUs) reside between processor 802 and memory 804 and facilitateaccesses to memory 804 requested by processor 802. In particularembodiments, memory 804 includes random access memory (RAM). This RAMmay be volatile memory, where appropriate Where appropriate, this RAMmay be dynamic RAM (DRAM) or static RAM (SRAM). Moreover, whereappropriate, this RAM may be single-ported or multi-ported RAM. Thepresent disclosure contemplates any suitable RAM. Memory 804 may includeone or more memories 802, where appropriate. Although this disclosuredescribes and illustrates particular memory, this disclosurecontemplates any suitable memory.

In particular embodiments, storage 806 includes mass storage for data orinstructions. As an example and not by way of limitation, storage 806may include an HDD, a floppy disk drive, flash memory, an optical disc,a magneto-optical disc, magnetic tape, or a Universal Serial Bus (USB)drive or a combination of two or more of these. Storage 806 may includeremovable or non-removable (or fixed) media, where appropriate. Storage806 may be internal or external to computer system 800, whereappropriate. In particular embodiments, storage 806 is non-volatile,solid-state memory. In particular embodiments, storage 806 includesread-only memory (ROM). Where appropriate, this ROM may bemask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM),electrically erasable PROM (EEPROM), electrically alterable ROM (EAROM),or flash memory or a combination of two or more of these. Thisdisclosure contemplates mass storage 806 taking any suitable physicalform. Storage 806 may include one or more storage control unitsfacilitating communication between processor 802 and storage 806, whereappropriate. Where appropriate, storage 806 may include one or morestorages 808. Although this disclosure describes and illustratesparticular storage, this disclosure contemplates any suitable storage.

In particular embodiments, I/O interface 808 includes hardware,software, or both providing one or more interfaces for communicationbetween computer system 800 and one or more I/O devices. Computer system800 may include one or more of these I/O devices, where appropriate. Oneor more of these I/O devices may enable communication between a personand computer system 800. As an example and not by way of limitation, anI/O device may include a keyboard, keypad, microphone, monitor, mouse,printer, scanner, speaker, still camera, stylus, tablet, touch screen,trackball, video camera, another suitable I/O device or a combination oftwo or more of these. An I/O device may include one or more sensors.This disclosure contemplates any suitable I/O devices and any suitableI/O interfaces 808 for them. Where appropriate, I/O interface 808 mayinclude one or more device or software drivers enabling processor 802 todrive one or more of these I/O devices. I/O interface 808 may includeone or more I/O interfaces 808, where appropriate. Although thisdisclosure describes and illustrates a particular I/O interface, thisdisclosure contemplates any suitable I/O interface.

In particular embodiments, communication interface 810 includeshardware, software, or both providing one or more interfaces forcommunication (such as, for example, packet-based communication) betweencomputer system 800 and one or more other computer systems 800 or one ormore networks. As an example and not by way of limitation, communicationinterface 810 may include a network interface controller (NIC) ornetwork adapter for communicating with an Ethernet or other wire-basednetwork or a wireless NIC (WNIC) or wireless adapter for communicatingwith a wireless network, such as a WI-FI network. This disclosurecontemplates any suitable network and any suitable communicationinterface 810 for it. As an example and not by way of limitation,computer system 800 may communicate with an ad hoc network, a personalarea network (PAN), a local area network (LAN), a wide area network(WAN), a metropolitan area network (MAN), or one or more portions of theInternet or a combination of two or more of these. One or more portionsof one or more of these networks may be wired or wireless. As anexample, computer system 800 may communicate with a wireless PAN (WPAN)(such as, for example, a BLUETOOTH WPAN), a WI-FI network (such as, forexample, a 802.11a/b/g/n WI-FI network, a 802.11s mesh network), aWI-MAX network, a cellular telephone network (such as, for example, aGlobal System for Mobile Communications (GSM) network, an Enhanced DataRates for GSM Evolution (EDGE) network, a Universal MobileTelecommunications System (UMTS) network, a Long Term Evolution (LTE)network), or other suitable wireless network or a combination of two ormore of these. Computer system 800 may include any suitablecommunication interface 810 for any of these networks, whereappropriate. Communication interface 810 may include one or morecommunication interfaces 810, where appropriate. Although thisdisclosure describes and illustrates a particular communicationinterface, this disclosure contemplates any suitable communicationinterface.

In particular embodiments, bus 812 includes hardware, software, or bothcoupling components of computer system 800 to each other. As an exampleand not by way of limitation, bus 812 may include an AcceleratedGraphics Port (AGP) or other graphics bus, an Enhanced Industry StandardArchitecture (EISA) bus, a front-side bus (FSB), a HYPERTRANSPORT (HT)interconnect, an Industry Standard Architecture (ISA) bus, an INFINIBANDinterconnect, a low-pin-count (LPC) bus, a memory bus, a Micro ChannelArchitecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, aPCI-Express (PCI-X) bus, a serial advanced technology attachment (SATA)bus, a Video Electronics Standards Association local (VLB) bus, aUniversal Asynchronous Receiver/Transmitter (UART) interface, aInter-Integrated Circuit (I²C) bus, a Serial Peripheral Interface (SPI)bus, a Secure Degital (SD) memory interface, a MultiMediaCard (MMC)memory interface, a Memory Stick (MS) memory interface, a Secure DigitalInput Output (SDIO) interface, a Multi-channel Buffered Serial Port(McBSP) bus, a Universal Serial Bus (USB) bus, a General Purpose MemoryController (GPMC) bus, a SDRAM Controller (SDRC) bus, a General PurposeInput/Output (GPIO) bus, a Separate Video (S-Video) bus, a DisplaySerial Interface (DSI) bus, a Advanced Microcontroller Bus Architecture(AMBA) bus, or another suitable bus or a combination of two or more ofthese. Bus 812 may include one or more buses 812, where appropriate.Although this disclosure describes and illustrates a particular bus,this disclosure contemplates any suitable bus or interconnect.

The client-side functionality described above can be implemented as aseries of instructions stored on a computer-readable storage mediumthat, when executed, cause a programmable processor to implement theoperations described above. While the client device 122 may beimplemented in a variety of different hardware and computing systems,FIG. 9 shows a schematic representation of the main components of anexample computing platform of a client or mobile device, according tovarious particular embodiments. In particular embodiments, computingplatform 902 may comprise controller 904, memory 906, and input outputsubsystem 910. In particular embodiments, controller 904 which maycomprise one or more processors and/or one or more microcontrollersconfigured to execute instructions and to carry out operationsassociated with a computing platform. In various embodiments, controller904 may be implemented as a single-chip, multiple chips and/or otherelectrical components including one or more integrated circuits andprinted circuit boards. Controller 904 may optionally contain a cachememory unit for temporary local storage of instructions, data, orcomputer addresses. By way of example, using instructions retrieved frommemory, controller 904 may control the reception and manipulation ofinput and output data between components of computing platform 902. Byway of example, controller 904 may include one or more processors or oneor more controllers dedicated for certain processing tasks of computingplatform 902, for example, for 2D/3D graphics processing, imageprocessing, or video processing.

Controller 904 together with a suitable operating system may operate toexecute instructions in the form of computer code and produce and usedata. By way of example and not by way of limitation, the operatingsystem may be Windows-based, Mac-based, or Unix or Linux-based, orSymbian-based, among other suitable operating systems. The operatingsystem, other computer code and/or data may be physically stored withinmemory 906 that is operatively coupled to controller 904.

Memory 906 may encompass one or more storage media and generally providea place to store computer code (e.g., software and/or firmware) and datathat are used by computing platform 902. By way of example, memory 906may include various tangible computer-readable storage media includingRead-Only Memory (ROM) and/or Random-Access Memory (RAM). As is wellknown in the art, ROM acts to transfer data and instructionsuni-directionally to controller 904, and RAM is used typically totransfer data and instructions in a bi-directional manner. Memory 906may also include one or more fixed storage devices in the form of, byway of example, hard disk drives (HDDs), solid-state drives (SSDs),flash-memory cards (e.g., Secured Digital or SD cards, embeddedMultiMediaCard or eMMD cards), among other suitable forms of memorycoupled bi-directionally to controller 904. Information may also resideon one or more removable storage media loaded into or installed incomputing platform 902 when needed. By way of example, any of a numberof suitable memory cards (e.g., SD cards) may be loaded into computingplatform 902 on a temporary or permanent basis.

Input output subsystem 910 may comprise one or more input and outputdevices operably connected to controller 904. For example, input outputsubsystem may include keyboard, mouse, one or more buttons, thumb wheel,and/or, display (e.g., liquid crystal display (LCD), light emittingdiode (LED), Interferometric modulator display (IMOD), or any othersuitable display technology). Generally, input devices are configured totransfer data, commands and responses from the outside world intocomputing platform 902. The display is generally configured to display agraphical user interface (GUI) that provides an easy to use visualinterface between a user of the computing platform 902 and the operatingsystem or application(s) running on the mobile device. Generally, theGUI presents programs, files and operational options with graphicalimages. During operation, the user may select and activate variousgraphical images displayed on the display in order to initiate functionsand tasks associated therewith. Input output subsystem 910 may alsoinclude touch based devices such as touch pad and touch screen. Atouchpad is an input device including a surface that detects touch-basedinputs of users. Similarly, a touch screen is a display that detects thepresence and location of user touch inputs. Input output system 910 mayalso include dual touch or multi-touch displays or touch pads that canidentify the presence, location and movement of more than one touchinputs, such as two or three finger touches.

In particular embodiments, computing platform 902 may additionallycomprise audio subsystem 912, camera subsystem 912, wirelesscommunication subsystem 916, sensor subsystems 918, and/or wiredcommunication subsystem 920, operably connected to controller 904 tofacilitate various functions of computing platform 902. For example,Audio subsystem 912, including a speaker, a microphone, and a codecmodule configured to process audio signals, can be utilized tofacilitate voice-enabled functions, such as voice recognition, voicereplication, digital recording, and telephony functions. For example,camera subsystem 912, including an optical sensor (e.g., a chargedcoupled device (CCD), or a complementary metal-oxide semiconductor(CMOS) image sensor), can be utilized to facilitate camera functions,such as recording photographs and video clips. For example, wiredcommunication subsystem 920 can include a Universal Serial Bus (USB)port for file transferring, or a Ethernet port for connection to a localarea network (LAN).

Wireless communication subsystem 916 can be designed to operate over oneor more wireless networks, for example, a wireless PAN (WPAN) (such as,for example, a BLUETOOTH WPAN, an infrared PAN), a WI-FI network (suchas, for example, an 802.11a/b/g/n WI-FI network, an 802.11s meshnetwork), a WI-MAX network, a cellular telephone network (such as, forexample, a Global System for Mobile Communications (GSM) network, anEnhanced Data Rates for GSM Evolution (EDGE) network, a Universal MobileTelecommunications System (UMTS) network, and/or a Long Term Evolution(LTE) network). Additionally, wireless communication subsystem 916 mayinclude hosting protocols such that computing platform 902 may beconfigured as a base station for other wireless devices.

Sensor subsystem 918 may include one or more sensor devices to provideadditional input and facilitate multiple functionalities of computingplatform 902. For example, sensor subsystems 918 may include GPS sensorfor location positioning, altimeter for altitude positioning, motionsensor for determining orientation of a mobile device, light sensor forphotographing function with camera subsystem 914, temperature sensor formeasuring ambient temperature, and/or biometric sensor for securityapplication (e.g., fingerprint reader).

In particular embodiments, various components of computing platform 902may be operably connected together by one or more buses (includinghardware and/or software). As an example and not by way of limitation,the one or more buses may include an Accelerated Graphics Port (AGP) orother graphics bus, an Enhanced Industry Standard Architecture (EISA)bus, a front-side bus (FSB), a HYPERTRANSPORT (HT) interconnect, anIndustry Standard Architecture (ISA) bus, an INFINIBAND interconnect, alow-pin-count (LPC) bus, a memory bus, a Micro Channel Architecture(MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express(PCI-X) bus, a serial advanced technology attachment (SATA) bus, a VideoElectronics Standards Association local (VLB) bus, a UniversalAsynchronous Receiver/Transmitter (UART) interface, a Inter-IntegratedCircuit (I²C) bus, a Serial Peripheral Interface (SPI) bus, a SecureDegital (SD) memory interface, a MultiMediaCard (MMC) memory interface,a Memory Stick (MS) memory interface, a Secure Digital Input Output(SDIO) interface, a Multi-channel Buffered Serial Port (McBSP) bus, aUniversal Serial Bus (USB) bus, a General Purpose Memory Controller(GPMC) bus, a SDRAM Controller (SDRC) bus, a General PurposeInput/Output (GPIO) bus, a Separate Video (S-Video) bus, a DisplaySerial Interface (DSI) bus, an Advanced Microcontroller Bus Architecture(AMBA) bus, or another suitable bus or a combination of two or more ofthese.

Additionally, computing platform 902 may be powered by power source 932.

Herein, reference to a computer-readable non-transitory storage mediummay include a semiconductor-based or other integrated circuit (IC) (suchas, for example, a field-programmable gate array (FPGA) or anapplication-specific IC (ASIC)), a hard disk drive (HDD), a hybrid harddrive (HHD), an optical disc, an optical disc drive (ODD), amagneto-optical disc, a magneto-optical drive, a floppy disk, a floppydisk drive (FDD), magnetic tape, a holographic storage medium, asolid-state drive (SSD), a RAM-drive, a SECURE DIGITAL card, a SECUREDIGITAL drive, another suitable computer-readable non-transitory storagemedium, or a suitable combination of these, where appropriate. Acomputer-readable non-transitory storage medium may be volatile,non-volatile, or a combination of volatile and non-volatile, whereappropriate.

This disclosure contemplates one or more computer-readable storage mediaimplementing any suitable storage. In particular embodiments, acomputer-readable storage medium implements one or more portions ofprocessor 802 (such as, for example, one or more internal registers orcaches), one or more portions of memory 804, one or more portions ofstorage 606, or a combination of these, where appropriate. In particularembodiments, a computer-readable storage medium implements RAM or ROM.In particular embodiments, a computer-readable storage medium implementsvolatile or persistent memory. In particular embodiments, one or morecomputer-readable storage media embody software. Herein, reference tosoftware may encompass one or more applications, bytecode, one or morecomputer programs, one or more executables, one or more instructions,logic, machine code, one or more scripts, or source code, and viceversa, where appropriate. In particular embodiments, software includesone or more application programming interfaces (APIs). This disclosurecontemplates any suitable software written or otherwise expressed in anysuitable programming language or combination of programming languages.In particular embodiments, software is expressed as source code orobject code. In particular embodiments, software is expressed in ahigher-level programming language, such as, for example, C, Perl,JavaScript, or a suitable extension thereof. In particular embodiments,software is expressed in a lower-level programming language, such asassembly language (or machine code). In particular embodiments, softwareis expressed in JAVA. In particular embodiments, software is expressedin Hyper Text Markup Language (HTML), Extensible Markup Language (XML),or other suitable markup language.

The present disclosure encompasses all changes, substitutions,variations, alterations, and modifications to the example embodimentsherein that a person having ordinary skill in the art would comprehend.Similarly, where appropriate, the appended claims encompass all changes,substitutions, variations, alterations, and modifications to the exampleembodiments herein that a person having ordinary skill in the art wouldcomprehend.

What is claimed is:
 1. A method comprising: by a client computingdevice, executing software from a first portion of memory of the clientcomputing device; by the client computing device, downloading from aserver a new version of the software pursuant to a manifest for thedownload, wherein the manifest comprises a manifest signature and adevice unique signature; by the client computing device, installing thenew version of the software into a second portion of memory of theclient computing device; and by the client computing device, executingthe new version of the software from the second portion of memory,wherein the executing comprises: authenticating the manifest signaturewith a manifest signature public key; authenticating the device uniquesignature with a device unique public key; and failing to execute thesoftware from the second portion of memory if either authenticationfails.
 2. The method of claim 1, wherein: the client computing devicerequests an over-the-air download of the new version of the software inresponse to an instruction from the server; and the instructioncomprises an out-of-band message.
 3. The method of claim 2, wherein therequest comprises the serial number of the client computing device. 4.The method of claim 1, wherein the manifest comprises a predeterminedbattery state in which the client computing device must be in order todownload the payload.
 5. The method of claim 1, wherein the manifestcomprises a predetermined time period during which the client computingdevice may download the payload.
 6. The method of claim 1, wherein themanifest comprises a predetermined battery state in which the clientcomputing device must be in order to execute the software from thesecond portion of memory.
 7. The method of claim 1, wherein the manifestcomprises a predetermined time period during which the client computingdevice may execute the software from the second portion of memory. 8.The method of claim 1 wherein the manifest further comprises a firsthash value for the payload, and executing the software from the secondportion of memory further comprises: calculating a second hash value forthe downloaded payload based on a predetermined cryptographic hashalgorithm; comparing the first hash value to the second hash value; andfailing to execute from the second portion of memory if the first andsecond hash values are not identical.
 9. The method of claim 1, whereinthe manifest further comprises an encrypted serial number, and executingfrom the second portion of memory comprises: decrypting the serialnumber with a serial number public key; comparing the decrypted serialnumber to a serial number of the one or more computing devices; andfailing to execute software from the second portion of memory if theserial number and the decrypted serial number are not identical.
 10. Anon-transitory, computer-readable media comprising instructionsoperable, when executed by one or more computing systems, to: executesoftware from a first portion of memory of the one or more computingsystems; download from a server a new version of the software pursuantto a manifest for the download, wherein the manifest comprises amanifest signature and a device unique signature; install the newversion of the software into a second portion of memory of the one ormore computing systems; and execute the new version of the software fromthe second portion of memory, wherein the executing comprises:authenticating the manifest signature with a manifest signature publickey; authenticating the device unique signature with a device uniquepublic key; and failing to execute the software from the second portionof memory if either authentication fails.
 11. The media of claim 10,wherein: the one or more computing systems request an over-the-air (OTA)download of the new version of the software in response to aninstruction from the server; and the instruction comprises anout-of-band message.
 12. The media of claim 11 wherein the requestcomprises the serial number of the one or more computing systems. 13.The media of claim 10, wherein the manifest comprises a predeterminedbattery state in which the one or more computing systems must be inorder to download the payload.
 14. The media of claim 10, wherein themanifest comprises a predetermined time period during which the one ormore computing systems may download the payload.
 15. The media of claim10, wherein the manifest comprises a predetermined battery state inwhich the one or more computing systems must be in order to execute thesoftware from the second portion of memory.
 16. The media of claim 10,wherein the manifest comprises a predetermined time period during whichthe one or more computing systems may execute the software from thesecond portion of memory.
 17. The media of claim 10, wherein themanifest further comprises a first hash value for the payload, andexecuting the software from the second portion of memory furthercomprises: calculating a second hash value for the downloaded payloadbased on a predetermined cryptographic hash algorithm; comparing thefirst hash value to the second hash value; and failing to execute thesoftware from the second portion of memory if the first and second hashvalues are not identical.
 18. The media of claim 10, wherein themanifest further comprises an encrypted serial number, and executingfrom the second portion of memory comprises: decrypting the serialnumber with a serial number public key; comparing the decrypted serialnumber to a serial number of the one or more computing systems; andfailing to execute software from the second portion of memory if theserial number and the decrypted serial number are not identical.
 19. Asystem comprising: one or more processors; and a memory coupled to theprocessors comprising instructions executable by the processors, theprocessors being operable when executing the instructions to: executesoftware from a first portion of memory of the system; download from aserver a new version of the software pursuant to a manifest for thedownload, wherein the manifest comprises a manifest signature and adevice unique signature; install the new version of the software into asecond portion of memory of the system; and execute the new version ofthe software from the second portion of memory, wherein the executingcomprises: authenticating the manifest signature with a manifestsignature public key; authenticating the device unique signature with adevice unique public key; and failing to execute the software from thesecond portion of memory if either authentication fails.
 20. The systemof claim 19, wherein: the system requests an over-the-air download ofthe new version of the software in response to an instruction from theserver; and the instruction comprises an out-of-band message.
 21. Thesystem of claim 19, wherein the request comprises the serial number ofthe system.
 22. The system of claim 19, wherein the manifest comprises apredetermined battery state in which the system must be in order todownload the payload.
 23. The system of claim 19, wherein the manifestcomprises a predetermined time period during which the system maydownload the payload.
 24. The system of claim 19, wherein the manifestcomprises a predetermined battery state in which the system must be inorder to execute the software from the second portion of memory.
 25. Thesystem of claim 19, wherein the manifest comprises a predetermined timeperiod during which the system may execute the software from the secondportion of memory.
 26. The system of claim 19, wherein the manifestfurther comprises a first hash value for the payload, and executing thesoftware from the second portion of memory further comprises:calculating a second hash value for the downloaded payload based on apredetermined cryptographic hash algorithm; comparing the first hashvalue to the second hash value; and failing to execute from the secondportion of memory if the first and second hash values are not identical.27. The system of claim 19, wherein the manifest further comprises anencrypted serial number, and executing from the second portion of memorycomprises: decrypting the serial number with a serial number public key;comparing the decrypted serial number to a serial number of the system;and failing to execute software from the second portion of memory if theserial number and the decrypted serial number are not identical.