-
公开(公告)号:US20160306970A1
公开(公告)日:2016-10-20
申请号:US15196164
申请日:2016-06-29
发明人: Jerome R. Bell, JR. , Mari F. Heiser , Heather M. Hinton , Neil I. Readshaw , Karthik Sivakumar
CPC分类号: G06F21/562 , G06F8/62 , G06F8/65 , G06F21/126 , G06F21/14 , G06F21/54 , G06F21/564 , G06F21/57 , G06F21/577 , G06F2221/033 , H04L63/1433 , H04L63/20
摘要: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
-
公开(公告)号:US20160292401A1
公开(公告)日:2016-10-06
申请号:US15186940
申请日:2016-06-20
发明人: Jerome R. Bell, JR. , Mari F. Heiser , Heather M. Hinton , Neil I. Readshaw , Karthik Sivakumar
CPC分类号: G06F21/562 , G06F8/62 , G06F8/65 , G06F21/126 , G06F21/14 , G06F21/54 , G06F21/564 , G06F21/57 , G06F21/577 , G06F2221/033 , H04L63/1433 , H04L63/20
摘要: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
-
公开(公告)号:US20160132678A1
公开(公告)日:2016-05-12
申请号:US14988779
申请日:2016-01-06
发明人: Jerome R. Bell, JR. , Mari F. Heiser , Heather M. Hinton , Neil I. Readshaw , Karthik Sivakumar
CPC分类号: G06F21/562 , G06F8/62 , G06F8/65 , G06F21/126 , G06F21/14 , G06F21/54 , G06F21/564 , G06F21/57 , G06F21/577 , G06F2221/033 , H04L63/1433 , H04L63/20
摘要: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
-
公开(公告)号:US20150365437A1
公开(公告)日:2015-12-17
申请号:US14306890
申请日:2014-06-17
发明人: Jerome R. Bell, JR. , Mari F. Heiser , Heather M. Hinton , Neil I. Readshaw , Karthik Sivakumar
IPC分类号: H04L29/06
CPC分类号: G06F21/562 , G06F8/62 , G06F8/65 , G06F21/126 , G06F21/14 , G06F21/54 , G06F21/564 , G06F21/57 , G06F21/577 , G06F2221/033 , H04L63/1433 , H04L63/20
摘要: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
摘要翻译: 该方法包括识别安装的软件的实例。 该方法还包括确定与安装的软件的实例相对应的指纹。 该方法还包括确定与安装的软件的实例相关联的安全风险。 该方法还包括基于指纹,安全风险和计算设备的指定目的来识别软件实例的软件管理策略。 在一个实施例中,该方法还包括响应于识别软件管理策略,由一个或多个计算机处理器对安装在计算设备上的软件实例执行软件管理策略。
-
-
-