Method and system for analyzing the impact of a software update

Data processing: software development – installation – and managem – Software upgrading or updating – Plural version management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S168000, C717S171000, C717S127000, C717S128000, C717S131000

Reexamination Certificate

active

07614046

ABSTRACT:
A method and system for analyzing the impact on software of an update to a software system is provided. The impact analysis system identifies resources that are affected by an update to the software system and identifies resources that are accessed by various software components during execution of the software components. To analyze the effects of an update, the impact analysis system identifies those accessed resources of the software components that are affected by the update as being impacted resources. The impact analysis system considers those software components that access the impacted resources to be impacted software components. The impact analysis system provides a user interface through which a user can view and analyze the impact of an update.

REFERENCES:
patent: 6009274 (1999-12-01), Fletcher et al.
patent: 7376945 (2008-05-01), Kakumani et al.
patent: 7386839 (2008-06-01), Golender et al.
patent: 2003/0110253 (2003-06-01), Anuszczyk et al.
patent: 2004/0260678 (2004-12-01), Verbowski et al.
patent: 2005/0155031 (2005-07-01), Wang et al.
patent: 2005/0188268 (2005-08-01), Verbowski et al.
U.S. Appl. No. 10/918,086, filed Aug. 13, 2004, Yuan et al.
“Web-to-Host: Reducing the Total Cost of Ownership,” The Tolly Group, Total Cost of Ownership White Paper, May 2000 (13 pages).
Reiter, Michael K. and Aviel D. Rubin, “Crowds: Anonymity for Web Transactions,” ACM Transactions on Information and System Security, vol. 1, No. 1, Nov. 1998, ACM 1998 (pp. 66-92).
Liblit, Ben, Alex Aiken, Alice X. Zheng and Michael I. Jordan, “Bug Isolation via Remote Program Sampling,” PLDI'03, Jun. 9-11, 2003, ACM (pp. 141-154).
Osterlund, Robert, “PIKT: Problem Informant/Killer Tool,” Proceedings of the 14th Systems Administration Conference, Dec. 3-8, 2000, USENIX 2000, pp. 147-165.
“Change Auditing Solution,” Tripwire, Inc., Copyright Tripwire, Inc., 2005 (1 page) http://www.tripwire.com/ [Accessed Oct. 3, 2005].
Chaum, David, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, Feb. 1981, vol. 24, No. 2, ACM 1981 (8 pages).
Forrest, Stephanie, Steven A. Hofmeyr, Anil Somayaji and Thomas A. Longstaff, “A Sense of Self for Unix Processes,” Proceedings of the 1996 Symposium on Security and Privacy, IEEE Computer Society Press, 1996 (9 pages).
Chen, Mike Y., Emre Kiciman, Eugene Fratkin, Armando Fox and Eric Brewer, “Pinpoint: Problem Determination in Large, Dynamic Internet Services,” In Proceedings of International Conference on Dependable Systems and Networks 2002, 10 pages.
Benaloh, Josh Daniel Cohen, “Verifiable Secret-Ballot Elections,” Dissertation, Yale University, Dec. 1996, Josh Daniel Cohen Benaloh 1988, 132 pages.
Handley, Mark, Vern Paxson and Christian Kreibich, “Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics,” Presentation at USENIX Security 2002, 31 pages.
Burgess, Mark, “A Site Configuration Engine,” In Computer Systems 1995, pp. 1-29.
Traugott, Steve and Joel Huddleston, “Bootstrapping an Infrastructure,” Proceedings of the 12th Systems Administration Conference, LISA Dec. 1998, USENIX, pp. 181-196.
Clarke, Ian, Oskar Sandberg, Brandon Wiley and Theodore W. Hong, “Freenet: A Distributed Anonymous Information Storage and Retrieval System,” Lecture Notes in Computer Science, Springer-Verlag GmbH, ISSN: 0302-9743, vol. 2009 / 2001, p. 46, online date Jun. 2003, 21 pages.
Ensel, Christian and Keller, Alexander, “An Approach for Managing Service Dependencies with XML and the Resource Description Framework,” IBM Research Report, RC 22307 Jan. 15, 2002, Computer Science, IBM Research Division (pp. 1-17).
Wang, Yi-Min, Chad Verbowski and Daniel R. Simon, “Persistent-state Checkpoint Comparison for Troubleshooting Configuration Failures,” Microsoft Technical Report MSR-TR-2003-28, Microsoft Research, Microsoft Corporation, Apr. 4, 2003, IEEE 2003, 7 pages.
Wang, Yi-Min, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan and Zheng Zhang, “Strider: A Black-box, State-based Approach to Change and Configuration Management and Support,” Proceedings of the 17th Large Installation Systems Administration Conference, Oct. 26-31, 2003, USENIX 2003 (pp. 159-171).
Goldschlag, David, Michael Reed and Paul Syverson, “Onion Routing for Anonymous and Private Internet Connections,” CACM Feb. 1999 (5 pages).
Apap, Frank, Andrew Honig, Shlomo Hershkop, Eleazar Eskin and Sal Stolfo, “Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses,” Proceedings of LISA 1999 (pp. 1-13).
Kremenek, Ted and Dawson Engler, “Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations,” Proceedings of the 10th Annual International Static Analysis Symposium Jun. 2003 ( 21 pages).
Wang, Helen J., Chun Yuan, Yih-Chun Hu, Zheng Zhang and Yi-min Wang, “Friends Troubleshooting Network, Towards Privacy-Preserving, Automatic Troubleshooting,” Microsoft Research Paper MSR-TR-2003-81, Microsoft Research, Nov. 2003 (6 pages).
KaZaa, http://www.kazaa.com, Copyright Sharman Networks 2002-2005, 1 page.
Engler, Dawson, David Yu Chen, Seth Hallem, Andy Chou and Benjamin Chelf, “Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code,” Proceedings of ACM Symposium on Operating Systems Principles, Oct. 2001 (23 pages).
Aguilera, Marcos K., Jeffrey C. Mogul, Janet L. Wiener, Patrick Reynolds and Athicha Muthitacharoen, “Performance Debugging for Distributed Systems of Black Boxes,” SOSP'03, Oct. 19-22, 2003, ACM 2003 (16 pages).
“Desktop and Notebook TCO Updated for the 21st Century,” Sep. 12, 2003, Gartner Teleconference http://www.dataquest.com/teleconferences/asset—47431.jsp.
Przydatek, Bartosz, Dawn Song and Adrian Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” SenSys Nov. 2003, ACM 2003 (pp. 255-265).
Larsson, Magnus and Ivica Crnkovic, “Configuration Management for Component-based Systems,” in Proceedings of International Conference on Software Engineering May 2001 (5 pages).
Couch, Dr. Alva L. And Michael Gilfix, “It's Elementary, Dear Watson: Applying Logic Programming To Convergent System Management Processes,” In proceedings of LISA XIII 1999, Nov. 7-12, 1999 (pp. 121-135).
Freedman, Michael J., Emil Sit, Josh Cates and Robert Morris, “Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer,” IPTPS 2002 (6 pages).
Wang, Helen J., John Platt, Yu Chen, Ruyun Zhang and Yi-Min Wang, “PeerPressure: A Statistical Method for Automatic Misconfiguration Troubleshooting,” Microsoft Research Technical Report MSR-TR-2003-80, Microsoft Corporation, Nov. 2003 (13 pages).
Paxson, Vern, “Bro: A System for Detecting Network Intruders in Real-Time,” Computer Networks, 31 (23-24), Dec. 14, 1999 (pp. 1-22).
Fujioka, Atsushi, Tatsuaki Okamoto and Kazuo Ohta, “A Practical Secret Voting Scheme for Large Scale Elections,” Advances in Cryptology AUSCRYPT '92, Dec. 13-16, 1992 Proceedings, Springer-Verlag 1993 (pp. 244-251).
Solomon, David A. and Mark E. Russinovich, “Chapter 5—Management Mechanisms,” Inside Microsoft Windows 2000, Third Edition, Microsoft Press, David A. Solomon and Mark E. Russinovich 2000 (75 pages).
Redstone, Joshua A., Michael M. Swift and Brian N. Bershad, “Using Computers to Diagnose Computer Problems,” Proceedings of the HotOS IX: The 9th Workshop on Hot Topics in Operating Systems, May 18-21, 2003, USENIX 2003 (pp. 91-96).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for analyzing the impact of a software update does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for analyzing the impact of a software update, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for analyzing the impact of a software update will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4096904

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.