System and method for configuring application programs

Data processing: software development – installation – and managem – Software upgrading or updating

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07945907

ABSTRACT:
A system includes a communication unit to receive a request to change a configuration of an application program, and a storage unit to access a configuration state that represents the configuration. The system further includes a processing unit to identify a further configuration state that is consistent with a system of rules. The further configuration state represents a further configuration that complies with the request. The processing unit uses an integrity preserving transition to change the configuration to the further configuration. The integrity preserving transition terminates with the further configuration when the integrity preserving transition changes the configuration.

REFERENCES:
patent: 6094600 (2000-07-01), Sharpe et al.
patent: 7739517 (2010-06-01), Sahita et al.
patent: 2002/0026572 (2002-02-01), Joory
patent: 2002/0055991 (2002-05-01), Arrouye et al.
patent: 2003/0101245 (2003-05-01), Srinivasan et al.
patent: 2004/0098454 (2004-05-01), Trapp et al.
patent: 2005/0147246 (2005-07-01), Agrawal et al.
patent: 2006/0095378 (2006-05-01), Aggarwal et al.
patent: WO-03102775 (2003-12-01), None
patent: WO-2005045670 (2005-05-01), None
“Poster Presentations by Students and Postdocs”,PORTIA Project Site Visit, Stanford CA,(May 12-13, 2005),1-25.
Agat, J. , et al., “On Confidentiality and Algorithms”,Proceedings of the 2001 IEEE Symposium on Security and Privacy or Programming Under the Constraints of Noninterference, (2001), 1-14.
Benenson, Z , et al., “Secure multi-party computation with security modules”, Z. Benenson, F. C. Gartner, and D. Kesdogan.Secure Multi-Technical Report Oct. 2004, RWTH Aachen University of Technology, (2004),12 pgs.
Bhiri, S , et al., “Ensuring required failure atomicity of composite Web services”,Proceedings of the 14th International Conference on World Wide Web, 138-147.
Dreiling, A. , et al., “Model-Driven Process Configuration of Enterprise Systems”,Proceedings of the 7th Conference on Wirtschaftsinformatik, (2005),1-20.
Malkhi, D. , et al., “Fairplay—A Secure Two-Party Computation System”,Proc. Usenix Security Symposium 2004, 1-20.
Recker, J. , et al., “On the Syntax of Model Configuration—Transforming the C-EPC into Lawful EPC Models”,BPRM 2005, Workshop on Business Process Reference Models, (2005),1-16.
Sabelfeld, A. , et al., “Language-Based Information-Flow Security”,IEEE Journal on Selected Areas in Communications, 21(1), (Jan. 2003).
Van Der Aalst, W.M.P. , et al., “Workflow Patterns”,Distrib. Parallel Databases14(1), (2003),5-51.
Van Der Aalst, W. , et al., “YAWL: Yet Another Workflow Language”,QUT Technical report, FIT-TR-2003-04, Queensland University of Technology, Brisbane, (2003), 1-44.
“Extended European Search Report, Application No. 07 004 680.0-1243”, (May 25, 2007).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for configuring application programs does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for configuring application programs, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for configuring application programs will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2639033

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.