System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised
Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | ZIPPILLI DOMINIC BRINKMAN MATTHEW STELLA JOSHUA |
description | Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9003372B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9003372B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9003372B23</originalsourceid><addsrcrecordid>eNqNjj0OwjAMhbswIOAOvkClqh0QKwjEXpiRadwfkcRVYqh6Q46FQQwMILHY8vP77DdN7uUYhRygN-BIWjZQc4BAvcWq8w1ErmXAQFCx69mTlwhDJ63OIVBUyTxtF8-DTxtW_hfBV9G7DQYDwjC0-o0CaPlKtHgjOBP5lxjYdZEMaLSeRQ0dWjt-rubJpEYbafHuswR228Nmn1LPJ82JFXmS07FcZVlRLPN1XvxheQAtNGax</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised</title><source>esp@cenet</source><creator>ZIPPILLI DOMINIC ; BRINKMAN MATTHEW ; STELLA JOSHUA</creator><creatorcontrib>ZIPPILLI DOMINIC ; BRINKMAN MATTHEW ; STELLA JOSHUA</creatorcontrib><description>Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150407&DB=EPODOC&CC=US&NR=9003372B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150407&DB=EPODOC&CC=US&NR=9003372B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZIPPILLI DOMINIC</creatorcontrib><creatorcontrib>BRINKMAN MATTHEW</creatorcontrib><creatorcontrib>STELLA JOSHUA</creatorcontrib><title>System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised</title><description>Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjj0OwjAMhbswIOAOvkClqh0QKwjEXpiRadwfkcRVYqh6Q46FQQwMILHY8vP77DdN7uUYhRygN-BIWjZQc4BAvcWq8w1ErmXAQFCx69mTlwhDJ63OIVBUyTxtF8-DTxtW_hfBV9G7DQYDwjC0-o0CaPlKtHgjOBP5lxjYdZEMaLSeRQ0dWjt-rubJpEYbafHuswR228Nmn1LPJ82JFXmS07FcZVlRLPN1XvxheQAtNGax</recordid><startdate>20150407</startdate><enddate>20150407</enddate><creator>ZIPPILLI DOMINIC</creator><creator>BRINKMAN MATTHEW</creator><creator>STELLA JOSHUA</creator><scope>EVB</scope></search><sort><creationdate>20150407</creationdate><title>System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised</title><author>ZIPPILLI DOMINIC ; BRINKMAN MATTHEW ; STELLA JOSHUA</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9003372B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ZIPPILLI DOMINIC</creatorcontrib><creatorcontrib>BRINKMAN MATTHEW</creatorcontrib><creatorcontrib>STELLA JOSHUA</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZIPPILLI DOMINIC</au><au>BRINKMAN MATTHEW</au><au>STELLA JOSHUA</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised</title><date>2015-04-07</date><risdate>2015</risdate><abstract>Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US9003372B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T05%3A22%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZIPPILLI%20DOMINIC&rft.date=2015-04-07&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9003372B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |