System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised

Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZIPPILLI DOMINIC, BRINKMAN MATTHEW, STELLA JOSHUA
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ZIPPILLI DOMINIC
BRINKMAN MATTHEW
STELLA JOSHUA
description Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9003372B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9003372B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9003372B23</originalsourceid><addsrcrecordid>eNqNjj0OwjAMhbswIOAOvkClqh0QKwjEXpiRadwfkcRVYqh6Q46FQQwMILHY8vP77DdN7uUYhRygN-BIWjZQc4BAvcWq8w1ErmXAQFCx69mTlwhDJ63OIVBUyTxtF8-DTxtW_hfBV9G7DQYDwjC0-o0CaPlKtHgjOBP5lxjYdZEMaLSeRQ0dWjt-rubJpEYbafHuswR228Nmn1LPJ82JFXmS07FcZVlRLPN1XvxheQAtNGax</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised</title><source>esp@cenet</source><creator>ZIPPILLI DOMINIC ; BRINKMAN MATTHEW ; STELLA JOSHUA</creator><creatorcontrib>ZIPPILLI DOMINIC ; BRINKMAN MATTHEW ; STELLA JOSHUA</creatorcontrib><description>Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150407&amp;DB=EPODOC&amp;CC=US&amp;NR=9003372B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150407&amp;DB=EPODOC&amp;CC=US&amp;NR=9003372B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZIPPILLI DOMINIC</creatorcontrib><creatorcontrib>BRINKMAN MATTHEW</creatorcontrib><creatorcontrib>STELLA JOSHUA</creatorcontrib><title>System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised</title><description>Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjj0OwjAMhbswIOAOvkClqh0QKwjEXpiRadwfkcRVYqh6Q46FQQwMILHY8vP77DdN7uUYhRygN-BIWjZQc4BAvcWq8w1ErmXAQFCx69mTlwhDJ63OIVBUyTxtF8-DTxtW_hfBV9G7DQYDwjC0-o0CaPlKtHgjOBP5lxjYdZEMaLSeRQ0dWjt-rubJpEYbafHuswR228Nmn1LPJ82JFXmS07FcZVlRLPN1XvxheQAtNGax</recordid><startdate>20150407</startdate><enddate>20150407</enddate><creator>ZIPPILLI DOMINIC</creator><creator>BRINKMAN MATTHEW</creator><creator>STELLA JOSHUA</creator><scope>EVB</scope></search><sort><creationdate>20150407</creationdate><title>System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised</title><author>ZIPPILLI DOMINIC ; BRINKMAN MATTHEW ; STELLA JOSHUA</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9003372B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ZIPPILLI DOMINIC</creatorcontrib><creatorcontrib>BRINKMAN MATTHEW</creatorcontrib><creatorcontrib>STELLA JOSHUA</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZIPPILLI DOMINIC</au><au>BRINKMAN MATTHEW</au><au>STELLA JOSHUA</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised</title><date>2015-04-07</date><risdate>2015</risdate><abstract>Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9003372B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T05%3A22%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZIPPILLI%20DOMINIC&rft.date=2015-04-07&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9003372B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true