Error detection/correction and fault detection/recovery – Data processing system error or fault handling – Reliability and availability
Reexamination Certificate
2005-04-12
2005-04-12
Beausoliel, Robert (Department: 2785)
Error detection/correction and fault detection/recovery
Data processing system error or fault handling
Reliability and availability
C714S015000, C713S002000
Reexamination Certificate
active
06880107
ABSTRACT:
A system and method for monitoring the software configuration of a computer system. As a preliminary step in an error recovery procedure initiated in response to detecting a system error condition, it is determined whether one or more configuration files on the system are in an unauthorized state. If so, one embodiment of the invention contemplates suspending the error recovery procedure until the configuration file has been restored to an authorized. In one embodiment, the determination of whether a configuration file is in an unauthorized state is facilitated by associating a configuration file fingerprint with the configuration file where the fingerprint is indicative of the contents of the configuration file. In this embodiment, the contents of the configuration file can be verified against the fingerprint to determine if any unwarranted or unauthorized modifications have been made to the configuration since the fingerprint was generated. Preferably, an authorized editing or modification tool is provided for modifying the configuration file. The authorized tool updates the fingerprint upon modifying the configuration file to reflect the modified contents of the configuration file. In this manner, modifications made to the configuration file using the authorized tool are distinguishable from modifications that are made without using the authorized tool. In one embodiment, the process of associating the fingerprint with the configuration file comprises determining a signature code for the configuration file based on the contents of the configuration file. In various embodiments, a suitable signature code might be generated an MD5, CRC, SHA, or other suitable checksum generation algorithm.
REFERENCES:
patent: 5410699 (1995-04-01), Bealkowski et al.
patent: 5537540 (1996-07-01), Miller et al.
patent: 5974574 (1999-10-01), Lennie et al.
patent: 6047373 (2000-04-01), Hall et al.
patent: 6263348 (2001-07-01), Kathrow et al.
patent: 6282640 (2001-08-01), Klein
Norton et al., Peter Norton's Complete Guide to Norton SystemWorks 2.0, 1999, Chapters 7 and 15.
Beausoliel Robert
Lally Joseph P.
Maskulinski Michael
McConnell Dan
LandOfFree
Software configuration monitor does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Software configuration monitor, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software configuration monitor will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3379977