Great research starts with great data.

Learn More
More >
Patent Analysis of

System and method for altering functionality of an application

Updated Time 12 June 2019

Patent Registration Data

Publication Number

US10002070

Application Number

US14/498037

Application Date

26 September 2014

Publication Date

19 June 2018

Current Assignee

KASPERSKY LAB ZAO

Original Assignee (Applicant)

KASPERSKY LAB ZAO

International Classification

G06F11/36,G06F21/55,G06F11/30,G06F11/07,G06F9/445

Cooperative Classification

G06F11/3692,G06F8/65,G06F11/0715,G06F11/0778,G06F11/0793

Inventor

OVCHARIK, VLADISLAV I.,KONDRATOV, VITALY V.,KIRIKOVA, EVGENIYA P.

Patent Images

This patent contains figures and images illustrating the invention and its embodiment.

US10002070 System altering 1 US10002070 System altering 2 US10002070 System altering 3
See all images <>

Abstract

Disclosed are systems and methods for altering functionality of an application. An example method comprises updating the application, wherein the application includes one or more functional modules; detecting events occurring on the computer after the updating, wherein types of the detected events belong to a set of detectable events; determining which of the one or more functional modules of the application caused the detected events; and altering the one or more detected functional modules, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.

Read more

Claims

1. A method for altering functionality of an application installed on a computer, the method comprising: receiving, by the computer, an application update comprising a patch, service pack, or software update, wherein the application update is transmitted from a remote server to the computer via a network, or (ii) loaded into the computer from a removable data medium; updating the application, by a hardware processor of the computer, based upon the application update, wherein the application includes one or more functional modules; detecting one or more events occurring on the computer after the updating, wherein types of the detected events belong to a set of detectable events; determining, by the hardware processor of the computer, which of the one or more functional modules of the application caused the one or more detected events; and altering the one or more determined functional modules when a number of detected events per a predetermined time interval exceeds a threshold, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.

2. The method of claim 1, wherein the set of detectable events comprises at least one of the following: an increase in number of application memory dumps per a predetermined time interval; an increase in number of operating system dumps per a predetermined time interval; an increase of average workload of a processor of the computer above a predetermined limit; an increase in number of reboots of the computer per a predetermined time interval; incorrect working of one or more functional modules of the application; freezing of the application; and freezing of traffic verification.

3. The method of claim 1, wherein the altering of the functional modules and which functional modules are altered further depends on a computer user's choice.

4. The method of claim 1, wherein the altering comprises at least one of the following: turning a functional module on; turning a functional module off; removing a functional module; and changing settings of a functional module.

5. The method of claim 1, wherein the altering comprises reverting at least one functional module to its state before the update by:(a) replacing one or more files stored in a file system accessible to the computer with previous versions of the one or more files; and/or(b) modifying one or more registry keys of an operating system installed on the computer.

6. The method of claim 1, wherein the altering comprises removing at least one prior application update which affected functioning of an installed application update.

7. The method of claim 1, further comprising: displaying (a) information associated with the detected event(s) and the functional module(s) determined to have caused the detected events, and/or (b) a list of the one or more altered functional modules, to a user or administrator of the computer.

8. A system for altering functionality of an application installed on a computer, the system comprising:a hardware processor configured to: receive an application update comprising a patch, service pack, or software update, wherein the application update is (i) transmitted from a remote server to the computer via a network, or (ii) loaded into the computer from a removable data medium; update the application based upon the application update, wherein the application includes one or more functional modules; detect events occurring on the computer after the update, wherein types of the detected events belong to a set of detectable events; determine which of the one or more functional modules of the application caused the detected events; and alter the one or more determined functional modules when a number of detected events per a predetermined time interval exceeds a threshold, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.

9. The system of claim 8, wherein the set of detectable events comprises at least one of the following: an increase in number of application memory dumps per a predetermined time interval; an increase in number of operating system dumps per a predetermined time interval; an increase of average workload of a processor of the computer above a predetermined limit; an increase in number of reboots of the computer per a predetermined time interval; incorrect working of one or more functional modules of the application; freezing of the application; and freezing of traffic verification.

10. The system of claim 8, wherein the altering of the functional modules and which functional modules are altered further depends on a computer user's choice.

11. The system of claim 8, wherein the altering comprises at least one of the following: turning a functional module on; turning a functional module off; removing a functional module; and changing settings of a functional module.

12. The system of claim 8, wherein the altering comprises reverting at least one functional module to its state before the update by:(a) replacing one or more files stored in a file system accessible to the computer with previous versions of the one or more files; and/or(b) modifying one or more registry keys of an operating system installed on the computer.

13. The system of claim 8, wherein the altering comprises removing at least one prior application update which affected functioning of an installed application update.

14. A computer program product stored on a non-transitory computer-readable storage medium, the computer program product comprising computer-executable instructions for altering functionality of an application installed on a computer, including instructions for: receiving, by the computer, an application update comprising a patch, service pack, or software update, wherein the application update is (i) transmitted from a remote server to the computer via a network, or (ii) loaded into the computer from a removable data medium; updating the application, by a hardware processor of the computer, based upon the application update, wherein the application includes one or more functional modules; detecting one or more events occurring on the computer after the updating, wherein types of the detected events belong to a set of detectable events; determining which of the one or more functional modules of the application caused the detected events; and altering the one or more determined functional modules when a number of detected events per a predetermined time interval exceeds a threshold, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.

15. The computer program product of claim 14, wherein the set of detectable events comprises at least one of the following: an increase in number of application memory dumps per a predetermined time interval; an increase in number of operating system dumps per a predetermined time interval; an increase of average workload of a processor of the computer above a predetermined limit; an increase in number of reboots of the computer per a predetermined time interval; incorrect working of one or more functional modules of the application; freezing of the application; and freezing of traffic verification.

16. The computer program product of claim 14, wherein the altering of the functional modules and which functional modules are altered further depends on a computer user's choice.

17. The computer program product of claim 14, wherein the altering comprises at least one of the following: turning a functional module on; turning a functional module off; removing a functional module; and changing settings of a functional module.

18. The computer program product of claim 14, wherein the altering comprises reverting at least one functional module to its state before the update by:(a) replacing one or more files stored in a file system accessible to the computer with previous versions of the one or more files; and/or(b) modifying one or more registry keys of an operating system installed on the computer.

19. The computer program product of claim 14, wherein the altering comprises removing at least one prior application update which affected functioning of an installed application update.

Read more

Claim Tree

  • 1
    1. A method for altering functionality of an application installed on a computer, the method comprising:
    • receiving, by the computer, an application update comprising a patch, service pack, or software update, wherein the application update is transmitted from a remote server to the computer via a network, or (ii) loaded into the computer from a removable data medium
    • updating the application, by a hardware processor of the computer, based upon the application update, wherein the application includes one or more functional modules
    • detecting one or more events occurring on the computer after the updating, wherein types of the detected events belong to a set of detectable events
    • determining, by the hardware processor of the computer, which of the one or more functional modules of the application caused the one or more detected events
    • and altering the one or more determined functional modules when a number of detected events per a predetermined time interval exceeds a threshold, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.
    • 2. The method of claim 1, wherein
      • the set of detectable events comprises
    • 3. The method of claim 1, wherein
      • the altering of the functional modules and which functional modules are altered further depends on a computer user's choice.
    • 4. The method of claim 1, wherein
      • the altering comprises
    • 5. The method of claim 1, wherein
      • the altering comprises reverting at least one functional module to its state before the update by:
    • 6. The method of claim 1, wherein
      • the altering comprises
    • 7. The method of claim 1, further comprising: displaying
      • (a) information associated with the detected event(s) and the functional module(s) determined to have caused the detected events, and/or
      • (b) a list of the one or more altered functional modules, to a user or administrator of the computer.
  • 8
    8. A system for altering functionality of an application installed on a computer, the system comprising:
    • a hardware processor configured to: receive an application update comprising a patch, service pack, or software update, wherein the application update is (i) transmitted from a remote server to the computer via a network, or (ii) loaded into the computer from a removable data medium
    • update the application based upon the application update, wherein the application includes one or more functional modules
    • detect events occurring on the computer after the update, wherein types of the detected events belong to a set of detectable events
    • determine which of the one or more functional modules of the application caused the detected events
    • and alter the one or more determined functional modules when a number of detected events per a predetermined time interval exceeds a threshold, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.
    • 9. The system of claim 8, wherein
      • the set of detectable events comprises
    • 10. The system of claim 8, wherein
      • the altering of the functional modules and which functional modules are altered further depends on a computer user's choice.
    • 11. The system of claim 8, wherein
      • the altering comprises
    • 12. The system of claim 8, wherein
      • the altering comprises reverting at least one functional module to its state before the update by:
    • 13. The system of claim 8, wherein
      • the altering comprises
  • 14
    14. A computer program product stored on a non-transitory computer-readable storage medium, the computer program product comprising
    • computer-executable instructions for altering functionality of an application installed on a computer, including instructions for: receiving, by the computer, an application update comprising a patch, service pack, or software update, wherein the application update is (i) transmitted from a remote server to the computer via a network, or (ii) loaded into the computer from a removable data medium
    • updating the application, by a hardware processor of the computer, based upon the application update, wherein the application includes one or more functional modules
    • detecting one or more events occurring on the computer after the updating, wherein types of the detected events belong to a set of detectable events
    • determining which of the one or more functional modules of the application caused the detected events
    • and altering the one or more determined functional modules when a number of detected events per a predetermined time interval exceeds a threshold, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.
    • 15. The computer program product of claim 14, wherein
      • the set of detectable events comprises
    • 16. The computer program product of claim 14, wherein
      • the altering of the functional modules and which functional modules are altered further depends on a computer user's choice.
    • 17. The computer program product of claim 14, wherein
      • the altering comprises
    • 18. The computer program product of claim 14, wherein
      • the altering comprises reverting at least one functional module to its state before the update by:
    • 19. The computer program product of claim 14, wherein
      • the altering comprises
See all independent claims <>

Description

CROSS-REFERENCE TO RELATED APPLICATIONS

The present disclosure claims benefit of priority under 35 U.S.C. 119(a)-(d) to a Russian Application No. 2014131816 filed on Aug. 1, 2014, which is incorporated by reference herein.

FIELD OF TECHNOLOGY

The invention relates generally to the field of computer software, and specifically, to systems and methods of altering functionality of an application installed on a computer.

BACKGROUND

A large number of modern computer applications are multifunctional software programs consisting of multiple modules having different functionality. Moreover, without halting the working of the application, services responsible for the working of certain functional modules can be turned on and off, thus reducing the load on the computer system.

The working capability of functional modules can be influenced by software updates of the application: along with the software updates, files and register keys may be downloaded which can influence the working of several functional modules. Even though software updates are supposed to eliminate errors in the working of an application or add new functional capabilities, it often happens that new errors will appear in the working of an application after a regular updating. Moreover, the new errors may affect not only the working of the application itself, but also the working of the computer system as a whole, and also have disastrous consequences for the data of the user. It is especially important to maintain the working capability of security applications, which not only afford protection against various computer threats but can also perform the encoding of the user's data.

Restoration tools are typically used to restore the working capability of an application or an operating system (OS), as well as eliminate errors in their operation. For example, the Windows OS uses a “System restore” component. This component enables a restoring of the working capability of the OS by rollback (restoration of the previous condition) of the system files, register branches, applications, and so forth. However, restoration points are not created for each update, and after the restoration of the system from the last restoration point many applications installed after its creation may not work correctly.

A method of testing of software updates with the possibility of rollback of updates in the event of unsatisfactory test results is also known. However, these methods do not always solve the problems of ensuring working capability of an application with installed updates and of the computer system without disconnecting the functionality causing the error in the working of the application or the OS, or rollback of the installed updates.

SUMMARY

Disclosed are systems, methods and computer program products for altering the functionality of an application upon incorrect operation of the application update. The technical result of the disclosed aspects is to increase the working stability of the computer by altering the functionality of an application based on certain events and functional modules.

In one aspect, an example method for altering functionality of an application installed on a computer includes: updating, by a hardware processor of the computer, the application, wherein the application includes one or more functional modules; detecting events occurring on the computer after the updating, wherein types of the detected events belong to a set of detectable events; determining which of the one or more functional modules of the application caused the detected events; and altering the one or more detected functional modules, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.

In one example aspect, the set of detectable events may include at least one of the following: an increase in number of application memory dumps per a predetermined time interval; an increase in number of operating system dumps per a predetermined time interval; an increase of average workload of a processor of the computer above a predetermined limit; an increase in number of reboots of the computer per a predetermined time interval; incorrect working of one or more functional modules of the application; freezing of the application; and freezing of traffic verification.

In one example aspect, the altering may be performed when a number of detected events per a predetermined time interval exceeds a predetermined number.

In one example aspect, the altering of the functional modules and which functional modules are altered may further depend on a computer user's choice.

In one example aspect, the altering comprises at least one of the following: turning a functional module on; turning a functional module off; removing a functional module; and changing settings of a functional module.

In one example aspect, the altering may comprise reverting at least one functional module to its state before the update.

In one example aspect, the altering may comprise removing at least one prior application update which affected functioning of an installed application update.

In one aspect, an example system for altering functionality of an application installed on a computer, comprises: an installation module configured to update the application, wherein the application includes one or more functional modules; the observation module configured to detect events occurring on the computer after the update, wherein types of the detected events belong to a set of detectable events; the alteration module configured to determine which of the one or more functional modules of the application caused the detected events; and the alteration module further configured to alter the one or more detected functional modules, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.

In one aspect, an example computer program product, stored on a non-transitory computer-readable storage medium, comprises computer-executable instructions for altering functionality of an application installed on a computer, including instructions for: updating, by a hardware processor of the computer, the application, wherein the application includes one or more functional modules; detecting events occurring on the computer after the updating, wherein types of the detected events belong to a set of detectable events; determining which of the one or more functional modules of the application caused the detected events; and altering the one or more detected functional modules, wherein the altering of the functional modules and which functional modules are altered depend on the detected events and on which functional modules caused the detected events.

The above simplified summary of example aspects serves to provide a basic understanding of the present disclosure. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects of the present disclosure. Its sole purpose is to present one or more aspects in a simplified form as a prelude to the more detailed description of the disclosure that follows. To the accomplishment of the foregoing, the one or more aspects of the present disclosure include the features described and particularly pointed out in the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated into and constitute a part of this specification, illustrate one or more example aspects of the present disclosure and, together with the detailed description, serve to explain their principles and implementations.

FIG. 1 illustrates a block diagram of an example system for altering the functionality of an application according to one aspect.

FIG. 2 illustrates a flow diagram of an example method for altering the functionality of an application according to one aspect.

FIG. 3 illustrates example rules for altering the functionality of an application according to one aspect.

FIG. 4 is an example of a general-purpose computer system, such as a personal computer or a server, suitable for implementing discloses aspects of systems and methods for altering the functionality of an application according to one aspect.

DETAILED DESCRIPTION

Example aspects are described herein in the context of a system, method and computer program product for altering functionality of an application. Those of ordinary skill in the art will realize that the following description is illustrative only and is not intended to be in any way limiting. Other aspects will readily suggest themselves to those skilled in the art having the benefit of this disclosure. Reference will now be made in detail to implementations of the example aspects as illustrated in the accompanying drawings. The same reference indicators will be used to the extent possible throughout the drawings and the following description to refer to the same or like items.

FIG. 1 shows an example system for altering functionality of an application according to one aspect of the invention. A software application 110 is installed on a computer system 100. The application 110 can be a browser, a word-, video-, or image-processing application, a system software (such as various utilities), and so on. In the aspect discussed herein, the application 110 is a security application or an antivirus application. In one example aspect, the application 110 includes a plurality of functional modules 111-112. In one aspect, modules 111-112 may be configured to perform different functions of the application.

The antivirus application 110 may contain functional modules configured to ensure security for the computer system 100. Such functional modules may include, but not limited to: a file antivirus module, an email antivirus module, a web antivirus module, an HIPS (Host Intrusion Prevention System) module, an encryption module, an anti-spam module, an antivirus database update module, an application update module, and so on. In one example aspect, the file antivirus module contains program code and logic for detecting harmful activity of all files being opened, run and stored on the user's computer system 100. In one example aspect, the email antivirus contains program code and logic for check incoming and outgoing email for harmful content. In one example aspect, the web antivirus modules contains program code and logic for preventing execution of malicious code which may be contained on web sites visited by the user, and also for blocking the opening of the web sites. In one example aspect, the HIPS module contains program code and logic for detecting unwanted and harmful activity of programs and to block such activity at the moment of program execution.

In one example aspect, the encryption module may contain program code and logic for encrypting files on the user's computer 100. Furthermore, the encryption module may contain full disk encryption functionality. In one example aspect, the anti-spam module may contain program code and logic. for checking email messages for spam content. In one example aspect, the antivirus database update module may contain program code and logic for updating the signature database of malicious files. In one example aspect, the application update module may contain program code and logic for downloading updates from a software manufacturer's remote server (not shown) for the application 110 and to subsequently install them.

In one example aspect, the computer system 100 may include an installation module 101 that contains program code and logic for installing updates of the application 110. In some aspects, the installation module 101 may be one of the functional modules 111-112, as described above. In other aspects, the installation module 101 may be a separate application.

An application update can be a separate piece of software used to eliminate errors in the working of the application, to change its functional capabilities, to make changes in the operating system (OS) registry, to change application interface, to change application settings, to add, modify, or remove one or several functional modules and so on. The application update may be a program patch, a service pack, or also another kind of software update. The installation module 101 may be configured to receive the updates on the network from a remote server. The updates can also be loaded from a removable data medium (such as a flash memory or an optical disk) or by a local-area network (e.g., from a network disk or folder).

If an application update contains a new functionality not provided for by the user agreement, before installing the update the user may be prompted to accept a new user agreement including the new functionality. If the new user agreement is refused, only the part of the update not containing the new functionality may be installed on computer 100.

In one example aspect, the installation module 101 may be connected to an observation module 102 and alteration module 103. The installation module 101 may be configured to send to modules 102 and 103 a list of functional modules of application 110 that have been affected by the installed application update.

In one example aspect, the observation module 102 is configured to detect events associated with the behavior of the computer system 100 which have occurred since the application update. Such detectable events may be, but not limited to, for example, the computer 100 rebooting due to a system error, incorrect functioning of some of the functional modules 111-112 causing a termination of the functional modules or of the entire application 110, an increased load on the processor, a freezing of the application 110, and so on.

The alteration module 103 may be configured to identify the functional modules 111-112 which have influenced or caused the occurrence of the events detected by the observation module 102. The alteration module 103 also configured to alter the identified functional modules effected by the detected events, and the functional modules causing the occurrence of these events. For example, an update of the application 110 might have contained only an update of the files and the register branches for the encryption module. Thus, system reboots might have been caused by incorrect working of the encryption module. Consequently, the alteration module 103 will determine the encryption module to be the module responsible for the system reboots. To prevent incorrect working of the application 110 and the computer system 100, the alteration module 103 may turn the encryption module off, for example, until a release of an update eliminating the occurrence of system reboots. In one aspect, the alteration module 103 can report to the application 110 the need to turn off a corresponding functional module (for example, by creating a necessary registry key). The application in turn would unload services and processes corresponding to the functional module.

FIG. 2 shows an example method of altering functional modules according to one aspect of the invention. At step 201, the installation module 101 may download from a remote server and install on the computer system 100 an update for an application 110. Since the application 110 comprises a plurality of functional modules 111-112, the update may affect some of the functional modules 111-112 (for example, it modifies some of the files or registry keys related to certain functional modules). In one example aspect, a list of the functional modules 111-112 affected by the update may be transmitted by the server to the computer 100 along with the update itself. Thus, in step 202, the installation module 101 may send the list of functional modules affected by the update to the observation module 102 and the alteration module 103.

The observation module 102 immediately after the update is installed begins in step 203 following and detecting occurrences of some types of events taking place in the system 100. These detectable events may include, but not limited to: shutdown of the application 110; increase in the average workload of a processor above a certain predetermined limit (e.g., the average processor workload becoming greater than 80% in the course of an hour); rebooting of the computer system 100 or the frequency of rebooting being too high within a predetermined time interval; incorrect working of one or more of the functional modules of the application 110; freezing of the application 110; and freezing of traffic verification.

The shutdown of the application 110 can be detected when a memory dump of the application 110 is created. The Windows Error Reporting service built into the Windows OS can be used for creating the memory dumps of the application 110 in the Windows OS. A separate debugging process launched by the application 110 at initialization can be responsible for creating memory dumps of the application 110. When the computer system 100 is working under Windows OS, a reboot of the computer system 100 can be detected using the Windows Event Log records, which contains information on important software and hardware events, including reboots of the computer system 100. However, in some cases information about reboot of the computer system 100 does not end up in the event log. A reboot of the computer system can be detected by presence of a memory dump. Savedump.exe utility enters data from the page file into the memory dump file memory.dmp upon occurrence of a system error and subsequent emergency shutdown of Windows.

Freezing of the application 110 or of some of the function modules 111-112 can be determined by analysis of the time taken for processing of system calls by the application 110. An increase above a certain threshold value (for example, 60 seconds) of the time taken for processing system calls by the application 110 may indicate a freezing thereof.

Heuristic algorithms may be used to analyze the processing time of system calls. For example, the following parameters may be set; minimum time (such as 10 seconds), maximum time (such as 60 seconds), and permissible number of delayed calls (such as 10 calls). If the number of system calls whose processing took between the minimum and maximum time exceeds the permissible number of delayed calls, this event may indicate a freezing of the application 110. Moreover, if the processing of even one system call exceeds the maximum time, this also may indicate a freezing of the application 110. It should be noted that the above given parameters are set by a remote server and may be changed periodically.

The freezing of the network traffic verification (TCP/IP protocol stacks) can be detected upon exceeding a certain threshold value by the network traffic processing time (for example, 10 minutes).

If the described events have become much more common (for example, twice as frequent) after the installing of the update compared with before the installing of the update, this may indicate an incompatibility of the installed update and the functional modules of the application. The error causing the reboot of the computer or the sudden shutdown of the application 110 may be contained either in the installed update or in one or more functional modules 111-112. The threshold values indicating the occurrence of the above events may be occasionally changed on a remote server.

In step 204, the observation module 102 may send the list of aforementioned events to the alteration module 103. Then, in step 205, the alteration module 103 determines which of the functional modules 111-112 have caused or influenced the occurrence of the aforementioned events. For example, the shutdown of the application 110 might have been caused by incorrect working of the anti-spam module after the updating of the application 110.

As a result, in step 206, the alteration module 103 may alter some of the functional modules 111-112 depending on the detected events and the functional modules causing these events. Altering of the functional modules 111-112 may include, but not limited to: turning on, turning off, or removing of some of the functional modules 111-112 (for example, removal of files, register keys, and also removal of elements of the user interface of the application 110 related to the encryption module). Altering of the functional modules may also include changing the settings of some of the functional modules 111-112. The settings of the update module may be changed so that only updates of the antivirus database are loaded, and not updates of the application 110, except the updates correcting the error that has occurred.

In one example aspect, the alteration module 103 may send a list of altered modules to a network or computer administrator, so that the administrator can make a decision on further altering of the functional modules 111-112 or canceling these changes.

Altering of the functional modules of the application may also include removal of the installed application update. The altering module 103 may also remove old updates of the application 110 if they have influenced the working of the new installed update of the application 110. A known system can optimally choose a computer environment for testing of application updates and make a decision on the basis of the test results (for example, if deviations occur in the normal working of the computer systems with the installed update) as to the need to install this update on the other computer systems containing the application. Based on the test results, this update will also be installed on the other computer systems, or it will be removed from those systems on which it was previously installed.

In step 206, before altering any of the functional modules, the user may be informed by the observation module 102 about the detected events and the functional modules causing them. Then the user or administrator can decide whether to alter the functional modules.

In one example aspect, an administrator can define which events can be monitored. For example, the administrator can provide, in step 203, for detecting all previously mentioned events, except for reboots of the computer system 100.

The table in FIG. 3 shows example rules for altering the functional modules 111-412 of the application 110 in step 206. These rules may be set in advance by an administrator of the computer system or the network. The set of rules may be occasionally changed on a remote server and then sent to the altering module 103 along with the updates of the application or the updates of the antivirus database, if the application 110 is an antivirus.

According to the first rule in the table, if the altering module 103 in step 205 has determined that the increase in the number of shutdowns of the application that is three times greater than the number of shutdowns of the application occurring before the installation of the application update was caused by incorrect working of the encryption module after installation of the application update, then in step 206 all functional modules of the application are turned off except for the encryption module. The encryption module is not turned off because the majority of the user's data might be encrypted, and the turning off might make it impossible for the user to work with their data.

The second rule in the table applies when the application has stopped working more than five times in the course of an hour. The second rule is used when the increase in the number of application freezes was caused by the working of the anti-spam module. According to this rule, in step 206 the anti-spam module is turned off, because this module has caused the increase in the number of application freezes and is not so critical to the user as, for example, the encryption module.

The sixth rule applies when the file antivirus is causing an increase in the number of reboots of the computer system (for example, more than 10 reboots per week). In this case, all modules are turned off except the encryption module and the file antivirus, which are the most important functional modules of the application to the user. If said alterations of the functional modules have not solved the problem of reboots of the computer system or have caused other undesired events, the observation of the behavior of the system is continued by the observation module 102, and the steps of the method shown in FIG. 2 are repeated. As a result, in step 206, some of the functional modules of the application are altered again.

In one example aspect, altering a functional module may include reverting the module to the condition in which it was before the application update—the new files of the update are replaced by the old files, the registry keys are changed, and so on. If the update has affected several functional modules, only the module causing the incorrect event might be changed. For example, according to the eighth rule in the table in FIG. 3, the encryption module is changed to the condition in which it was before the updating of the application, if it was this module which began to work incorrectly after the updating of the application.

FIG. 4 shows an example of a general-purpose computer system (which may be a personal computer or a server) 20, which may be used to implement system and methods for altering functionality of an application. The computer system 20 includes a central processing unit 21, a system memory 22 and a system bus 23 connecting the various system components, including the memory associated with the central processing unit 21. The system bus 23 is realized like any bus structure known from the prior art, including in turn a bus memory or bus memory controller, a peripheral bus and a local bus, which is able to interact with any other bus architecture. The system memory includes permanent memory (ROM) 24 and random-access memory (RAM) 25. The basic input/output system (BIOS) 26 includes the basic procedures ensuring the transfer of information between elements of the computer 20, such as those at the time of loading the operating system with the use of the ROM 24.

The computer 20, in turn, includes a hard disk 27 for reading and writing of data, a magnetic disk drive28 for reading and writing on removable magnetic disks 29 and an optical drive 30 for reading and writing on removable optical disks 31, such as CD-ROM, DVD-ROM and other optical information media. The hard disk 27, the magnetic disk drive 28, and the optical drive 30 are connected to the system bus 23 across the hard disk interface 32, the magnetic disk interface 33 and the optical drive interface 34, respectively. The drives and the corresponding computer information media are power-independent modules for storage of computer instructions, data structures, program modules and other data of the computer 20.

The computer 20 may include one or more hard disk drives 27, removable magnetic disks 29 and removable optical disks 31, but it should be understood that it is possible to employ other types of computer information media 56 which are able to store data in a form readable by a computer (solid state drives, flash memory cards, digital disks, random-access memory (RAM) and so on), which are connected to the system bus 23 via the controller 55.

The computer 20 has a file system 36, where the recorded operating system 35 is stored, and also additional program applications 37, other program modules 38 and program data 39. The user is able to enter commands and information into the computer 20 by using input devices (keyboard 40, mouse 42). Other input devices (not shown) can be used: microphone, joystick, game controller, scanner, and so on. Such input devices usually plug into the computer system 20 through a serial port 46, which in turn is connected to the system bus, but they can be connected in other ways, for example, with the aid of a parallel port, a game port or a universal serial bus (USB). A monitor 47 or other type of display device is also connected to the system bus 23 across an interface, such as a video adapter 48. In addition to the monitor 47, the personal computer can be equipped with other peripheral output devices (not shown), such as loudspeakers, a printer, and so on.

The computer 20 is able to work in a network environment, using a network connection to one or more remote computers 49. The remote computer (or computers) 49 may also be personal computers or servers having the majority or all of the aforementioned elements in describing the nature of the computer 20. Other devices can also be present in the computer network, such as routers, network stations, peer devices or other network nodes.

Network connections can form a local-area computer network (LAN) 50 and a wide-area computer network (WAN). Such networks are used in corporate computer networks and internal company networks, and they generally have access to the Internet. In LAN or WAN networks, the computer 20 is connected to the local-area network 50 across a network adapter or network interface 51. When networks are used, the computer 20 can employ a modem 54 or other modules for providing communications with a wide-area computer network such as the Internet. The modem 54, which is an internal or external device, is connected to the system bus 23 by a serial port 46. It should be noted that the network connections are only examples and need not depict the exact configuration of the network, i.e., in reality there are other ways of establishing a connection of one computer to another by technical communication modules.

In various aspects, the systems and methods described herein may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the methods may be stored as one or more instructions or code on a non-transitory computer-readable medium. Computer-readable medium includes data storage. By way of example, and not limitation, such computer-readable medium can comprise RAM, ROM, EEPROM, CD-ROM, Flash memory or other types of electric, magnetic, or optical storage medium, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a processor of a general purpose computer.

In various aspects, the systems and methods described in the present disclosure in terms of modules. The term “module” as used herein refers to a real-world device, component, or arrangement of components implemented using hardware, such as by an application specific integrated circuit (ASIC) or field-programmable gate array (FPGA), for example, or as a combination of hardware and software, such as by a microprocessor system and a set of instructions to implement the module's functionality, which (while being executed) transform the microprocessor system into a special-purpose device. A module can also be implemented as a combination of the two, with certain functions facilitated by hardware alone, and other functions facilitated by a combination of hardware and software. In certain implementations, at least a portion, and in some cases, all, of a module can be executed on the processor of a general purpose computer (such as the one described in greater detail in FIG. 4 above). Accordingly, each module can be realized in a variety of suitable configurations, and should not be limited to any particular implementation exemplified herein.

In the interest of clarity, not all of the routine features of the aspects are disclosed herein. it will be appreciated that in the development of any actual implementation of the present disclosure, numerous implementation-specific decisions must be made in order to achieve the developer's specific goals, and that these specific goals will vary for different implementations and different developers. it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking of engineering for those of ordinary skill in the art having the benefit of this disclosure.

Furthermore, it is to be understood that the phraseology or terminology used herein is for the purpose of description and not of restriction, such that the terminology or phraseology of the present specification is to be interpreted by the skilled in the art in light of the teachings and guidance presented herein, in combination with the knowledge of the skilled in the relevant art(s). Moreover, it is not intended for any term in the specification or claims to be ascribed an uncommon or special meaning unless explicitly set forth as such.

The various aspects disclosed herein encompass present and future known equivalents to the known modules referred to herein by way of illustration. Moreover, while aspects and applications have been shown and described, it would be apparent to those skilled in the art having the benefit of this disclosure that many more modifications than mentioned above are possible without departing from the inventive concepts disclosed herein.

Read more
PatSnap Solutions

Great research starts with great data.

Use the most comprehensive innovation intelligence platform to maximise ROI on research.

Learn More

Patent Valuation

$

Reveal the value <>

34.0/100 Score

Market Attractiveness

It shows from an IP point of view how many competitors are active and innovations are made in the different technical fields of the company. On a company level, the market attractiveness is often also an indicator of how diversified a company is. Here we look into the commercial relevance of the market.

43.0/100 Score

Market Coverage

It shows the sizes of the market that is covered with the IP and in how many countries the IP guarantees protection. It reflects a market size that is potentially addressable with the invented technology/formulation with a legal protection which also includes a freedom to operate. Here we look into the size of the impacted market.

63.46/100 Score

Technology Quality

It shows the degree of innovation that can be derived from a company’s IP. Here we look into ease of detection, ability to design around and significance of the patented feature to the product/service.

58.0/100 Score

Assignee Score

It takes the R&D behavior of the company itself into account that results in IP. During the invention phase, larger companies are considered to assign a higher R&D budget on a certain technology field, these companies have a better influence on their market, on what is marketable and what might lead to a standard.

25.19/100 Score

Legal Score

It shows the legal strength of IP in terms of its degree of protecting effect. Here we look into claim scope, claim breadth, claim quality, stability and priority.

Citation

Patents Cited in This Cited by
Title Current Assignee Application Date Publication Date
Methods, systems, and computer program products for obtaining and utilizing a score indicative of an overall performance effect of a software update on a software host SCENERA MOBILE TECHNOLOGIES, LLC 26 June 2006 27 December 2007
Verification of successful installation of computer software INTERNATIONAL BUSINESS MACHINES CORPORATION 06 December 2006 12 June 2008
Apparatus and method for rollback of software updates ORACLE AMERICA, INC. 24 May 2011 15 September 2011
Scheduled and quarantined software deployment based on dependency analysis SAP SE 04 July 2012 09 January 2014
Candidate-patch selecting apparatus, computer product, and method FUJITSU LIMITED 10 August 2010 02 December 2010
See full citation <>

More like this

Title Current Assignee Application Date Publication Date
System state information monitoring HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP 29 January 2016 03 August 2017
Method for installing and updating software programs, corresponding server and software package WINC SOLUTIONS B.V. 21 April 2017 26 October 2017
Operating system patching and software update reconciliation TRIPWIRE, INC. 28 September 2012 19 September 2017
Wireless terminal communicable with external device and server and software updating method thereof SAMSUNG ELECTRONICS CO., LTD. 25 August 2016 02 March 2017
Application updating method and device TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED 23 January 2017 16 November 2017
Preparing installations and updates for software systems MICROSOFT TECHNOLOGY LICENSING, LLC 26 October 2015 30 June 2016
Anomaly analysis for software distribution MICROSOFT TECHNOLOGY LICENSING, LLC 21 March 2016 06 October 2016
Configuring acceleration components over a network MICROSOFT TECHNOLOGY LICENSING, LLC 23 June 2016 29 December 2016
Method, main unit, and vehicle for introducing applications into the main unit of the vehicle BAYERISCHE MOTOREN WERKE AKTIENGESELLSCHAFT 08 June 2016 22 December 2016
Mobile terminal application update method and device ALIBABA GROUP HOLDING LIMITED,SHENG, DING 02 March 2017 21 September 2017
Updating firmware at enterprise devices BLACKBERRY LIMITED 30 March 2017 18 January 2018
Method and system for updating smart watch software KANG, ZHIQIANG 22 February 2016 31 August 2017
Method and system for updating the software of a motor vehicle sensor ROBERT BOSCH GMBH 06 March 2017 09 November 2017
Targeted secure software deployment MICROSOFT TECHNOLOGY LICENSING, LLC 23 June 2017 04 January 2018
A network node, a device and methods therein for determining interoperability of software with the device TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) 23 April 2015 27 October 2016
Software updating system and method MICROSOFT TECHNOLOGY LICENSING, LLC 10 March 2003 30 June 2009
See all similar patents <>

More Patents & Intellectual Property

PatSnap Solutions

PatSnap solutions are used by R&D teams, legal and IP professionals, those in business intelligence and strategic planning roles and by research staff at academic institutions globally.

PatSnap Solutions
Search & Analyze
The widest range of IP search tools makes getting the right answers and asking the right questions easier than ever. One click analysis extracts meaningful information on competitors and technology trends from IP data.
Business Intelligence
Gain powerful insights into future technology changes, market shifts and competitor strategies.
Workflow
Manage IP-related processes across multiple teams and departments with integrated collaboration and workflow tools.
Contact Sales
Clsoe
US10002070 System altering 1 US10002070 System altering 2 US10002070 System altering 3