$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for automatic detection and distribution of code version updates 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/445
출원번호 US-0141635 (1998-08-28)
발명자 / 주소
  • Lam An Ngoc
  • Nguyen-Phuc Vinh-Thuan
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Sawyer Law Group LLPKrall
인용정보 피인용 횟수 : 74  인용 특허 : 23

초록

Aspects for automatic code version update detection and distribution for an application program running on a computer system in a computer network are described. In a method aspect, the method includes providing two agent processes, a slave agent and a master agent, on an agent system in the compute

대표청구항

[ What is claimed is:] [1.]1. A method for automatic code version update detection and distribution for an application program running on a computer system in a computer network, the method comprising:providing two agent processes, a slave agent and a master agent, on an agent system in the computer

이 특허에 인용된 특허 (23)

  1. Johnson Mark R. ; Cline Terry B., Acquisition and operation of remotely loaded software using applet modification of browser software.
  2. Davis Michael L. ; Ben-Natan Or ; Copeland Bruce W., Automatic software installation on heterogeneous networked client computer systems.
  3. Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
  4. van Hoff Arthur A. ; Gosling James A. ; Yellin Frank, Compiler system and method for resolving symbolic references to externally located program files.
  5. Bayless Jeanne A. ; Black William B. ; Brannick Gary L. ; Lee Gene W. ; Lloyd Lora M. ; Mason Larry P. ; Mathis Amy L. ; Steenbergen James E. ; Stoldt Mark R. ; Young Garrett C. ; Young Gary C. ; Fis, Computer telephone system.
  6. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  7. Leblang David B. (Wayland MA) Allen Larry W. (Cambridge MA) Chase ; Jr. Robert P. (Newton MA) Douros Bryan P. (Framingham MA) Jabs David E. (Sudbury MA) McLean ; Jr. Gordon D. (Brookline MA) Minard D, Dynamic rule-based version control system.
  8. Leblang David B. (Wayland MA) Allen Larry W. (Cambridge MA) Chase ; Jr. Robert P. (Newton MA) Douros Bryan P. (Framingham MA) Jabs David E. (Sudbury MA) McLean ; Jr. Gordon D. (Brookline MA) Minard D, Dynamic software version auditor which monitors a process to provide a list of objects that are accessed.
  9. Lister Martin Edward,GBX ; Phipps Simon,GBX ; Rooney Noel,GBX, Hosted machine code installation.
  10. Kullick Steven ; Titus Diane, Method and apparatus for automatic software replacement.
  11. Kullick Steven ; Titus Diane, Method and apparatus for managing and automatically updating software programs.
  12. Nabahi Narimane, Method and system for custom computer software installation.
  13. Sonderegger Kelly Ervin, Method for managing globally distributed software components.
  14. Van Hoff Arthur ; Payne Jonathan ; Shaio Sami, Method for the distribution of code and data updates.
  15. Marron Assaf (Poughkeepsie NY), Method of operating a data processing system having a dynamic software update facility.
  16. Lorie Raymond A. (San Jose CA) Mohan Chandrasekaran (San Jose CA) Pirahesh Mir H. (San Jose CA), Multiple version database concurrency control system.
  17. Khoyi Dana (Dracut MA) Soucie Marc S. (Tyngsboro MA) Surppenant Carolyn E. (Dracut MA) Stern Laura O. (Woburn MA) Pham Ly-Huong T. (Chelmsford MA), Multitasking computer system for integrating the operation of different application programs which manipulate data objec.
  18. Nakagawa Toru,JPX ; Takada Yuji,JPX, Software distribution and maintenance system and method.
  19. Morris Robert J. T. (Los Gatos CA), System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing.
  20. Herrmann Conrad, System for internet-based delivery of computer applications.
  21. Morris Robert J. T. (Los Gatos CA), System for reducing storage requirements and transmission loads in a backup subsystem in client-server environment by tr.
  22. Chiles Anthony A. ; Chiles David C. ; Manbeck ; Jr. Jackie Lee ; Nguyen Vu Hoanh, Technique for automatically updating software stored on a client computer in a networked client-server environment.
  23. Foster Richard D. (Poughkeepsie NY) McCaulley Ellory K. (Boulder CO), Version management system using pointers shared by a plurality of versions for indicating active lines of a version.

이 특허를 인용한 특허 (74)

  1. Borlick, Matthew G.; Johnson, Steven D., Apparatus and method to update code in an information storage and retrieval system while that system remains in normal operation.
  2. Borlick,Matthew G.; Johnson,Steven D., Apparatus and method to update code in an information storage and retrieval system while that system remains in normal operation.
  3. Lakhdhir,Mansoor A., Apparatus, system and method for detecting old version of an applet in a client brower's JVM.
  4. Mikurak,Michael G., Asset tracking in a network-based supply chain environment.
  5. Banzhof,Carl E., Automated computer vulnerability resolution system.
  6. Suorsa,Raymond E.; Poskanzer,Harold; Ferguson,Glenn; LeVasseur,Joshua T., Automated provisioning of computing networks using a network database model.
  7. Ly, Huey, Deployed agent used in the installation and maintenance of software.
  8. Nguyen,Truc D.; Wilson,Silvy J., Download and installation of software from a network printer.
  9. Montroy, Albert T.; Graves, Eric C.; Dyer, Douglas M., Dynamic distributed memory locking in a computer network.
  10. Mikurak, Michael G., Enhanced visibility during installation management in a network-based supply chain environment.
  11. Jamie Nelson ; Jonathan Nelson ; David Spencer ; Rajeev Angal, Environment for creating and managing network management software objects.
  12. Delsart, M Bertrand, Executable code for constrained computing environments.
  13. Mikurak, Michael G., Increased visibility during order management in a network-based supply chain environment.
  14. Mikurak, Michael G., Increased visibility during order management in a network-based supply chain environment.
  15. Mikurak, Michael G., Increased visibility during order management in a network-based supply chain environment.
  16. Mikurak, Michael G., Increased visibility during order management in a network-based supply chain environment.
  17. Moore, Bryan R.; Gupta, Nikhil; Achtermann, Jeffrey M.; Yiu, Victor G., Installing and updating interpreted programming language applications using a designated virtual machine.
  18. Moore, Bryan R.; Gupta, Nikhil; Achtermann, Jeffrey M.; Yiu, Victor G., Installing and updating interpreted programming language applications using a designated virtual machine.
  19. Jerding, Dean F.; Rodriquez, Arturo A.; Schlarb, John M.; Domina, Frank, Management of applications and their current versions.
  20. Ferris, James Michael; Huff, David P., Management of virtual appliances in cloud-based network.
  21. Ver Steeg, William C.; Morse, Kenneth, Managing configuration data.
  22. Pugh,William A.; MacLean,Brendan X, Method and apparatus for multi-version updates of application services.
  23. Curtis,Bryce Allen, Method and apparatus for saving install properties in a fileset object and/or system registry for use during uninstall.
  24. Sharma,Rahul; Matena,Vladimir; Mortazavi,Masood; Krishnan,Sanjeev, Method and apparatus for upgrading managed application state for a java based application.
  25. Banks,Donald E.; Uban,Thomas W.; Donahue,Timothy P.; Leclerc,Denis H., Method and apparatus providing interoperation of execution images of different versions.
  26. Bruce Anthony Beadle ; Michael Wayne Brown ; Leonard Robert Nizinski, Jr. ; Douglas Scott Rothert, Method and apparatus to store extended security information in a data structure which shadows a java class object.
  27. Koganti, Sudheer B.; Sprigg, Stephen A.; Therrell, Amy Suzanne; Minear, Brian; Nguyen, Phil Tien, Method, software and apparatus for performing actions on a wireless device using action lists and versioning.
  28. Koganti, Sudheer B.; Sprigg, Stephen A.; Therrell, Amy Suzanne; Minear, Brian; Nguyen, Phil Tien, Method, software and apparatus for performing actions on a wireless device using action lists and versioning.
  29. Koganti, Sudheer; Sprigg, Stephen; McGaraghan, Amy; Minear, Brian; Nguyen, Phil, Method, software and apparatus for performing actions on a wireless device using action lists and versioning.
  30. Koganti, Sudheer B.; Kelley, Brian H.; Hohlfeld, Matthew, Methods and apparatus for dataset synchronization in a wireless environment.
  31. Mazzaferri, Richard James; Parry-Barwick, Stephen; Low, Anthony Edward, Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment.
  32. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for executing, by a virtual machine, an application program requested by a client machine.
  33. Wookey, Michael; Low, Anthony Edward; Parry-Barwick, Stephen, Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session.
  34. Hutchinson, Robin; Giubileo, John; O'Brien, Darci, Methods and systems for managing enterprise assets.
  35. Mazzaferri, Richard James; Robinson, David Neil, Methods and systems for providing access to a computing environment.
  36. Low, Anthony Edward; Croft, Richard Jason; Mazzaferri, Richard James; Ryman, Paul Adam; Bissett, Nicholas Alexander; Wookey, Michael; Hackett, Donovan Ross, Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session.
  37. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
  38. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
  39. Pugh,William A.; MacLean,Brendan X, Multi-version hosting of application services.
  40. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste, Network audit and policy assurance system.
  41. Moshir, Sean; Andrew, Christopher A. H.; Hudler, Jack Lee; Li, Leon; Gordon, Jonathan M.; Bacon, Michael; Williams, Noah; Lane, Jonathan; Horton, James J.; Ferguson, Dan, Non-invasive automatic offsite patch fingerprinting and updating system and method.
  42. Moshir, Sean; Andrew, Christopher A. H.; Hudler, Jack Lee; Li, Leon; Gordon, Jonathan M.; Bacon, Michael; Williams, Noah; Lane, Jonathan; Horton, James J.; Ferguson, Dan, Non-invasive automatic offsite patch fingerprinting and updating system and method.
  43. Moshir,Sean; Andrew,Christopher A. H.; Hudler,Jack Lee; Li,Leon; Gordon,Jonathan M.; Bacon,Michael; Williams,Noah; Lane,Jonathan; Horton,James J.; Ferguson,Dan, Non-invasive automatic offsite patch fingerprinting and updating system and method.
  44. Petig, Michael; Schlette, Steffen; Lewandowski, Hanno, Online modification of CIL code programs for industrial automation.
  45. Mikurak, Michael G., Scheduling and planning maintenance and service in a network-based supply chain environment.
  46. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Ritter, Stephen J.; Nakawatase, Ryan Tadashi; Pelly, John; Rutherford, M. Celeste, System and method for applying a machine-processable policy rule to information gathered about a network.
  47. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  48. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  49. Ogura, Koujirou, System and method for automatically setting applet latest version.
  50. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  51. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  52. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  53. Brewer,Jason M, System and method for loading resolved java class files to a client device.
  54. Jerding,Dean F.; Rodriguez,Arturo A.; Schlarb,John M.; Domina,Frank, System and method for maintaining applications with their current versions.
  55. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  56. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  57. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  58. Keir, Robin M.; Ecker, Stephen A., System and method for network vulnerability detection and reporting.
  59. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  60. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  61. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  62. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Pelly, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul, System and method for security information normalization.
  63. Minear, Brian; Lekven, Eric J.; Oliver, Mitchell B.; Nguyen, Phil; Gardner, III, Richard Wayne; Sprigg, Stephen A., System and method for updating dataset versions resident on a wireless device.
  64. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  65. Beddoe, Marshall; Keir, Robin, System and method of operating system identification.
  66. Sprigg, Stephen A.; Minear, Brian, System to automatically process components on a device.
  67. Ferris, James Michael; Huff, David P.; Kearney, Bryan; Vujec, Tomislav, Systems and methods for identification and management of cloud-based virtual machines.
  68. Ferris, James Michael; Huff, David P., Systems and methods for management of virtual appliances in cloud-based network.
  69. Ferris, James Michael; Huff, David P., Systems and methods for management of virtual appliances in cloud-based network.
  70. Venkatraman, Charu; Kumar, Arkesh; He, Junxiao; Soni, Ajay, Systems and methods of installing an application without rebooting.
  71. Liang, Sheng; Lindholm, Timothy G., Techniques for implementing pluggable virtual machines.
  72. Liang, Sheng; Lindholm, Timothy G., Techniques for implementing pluggable virtual machines.
  73. Mikurak, Michael G., Technology sharing during demand and supply planning in a network-based supply chain environment.
  74. Horst Heistermann ; Chia-Hsin Li, Version-adaptive serialization and deserialization of program objects in an object-oriented environment.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로