发明名称 Managing software deployment
摘要 The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
申请公布号 US9411954(B2) 申请公布日期 2016.08.09
申请号 US201614988779 申请日期 2016.01.06
申请人 International Business Machines Corporation 发明人 Bell, Jr. Jerome R.;Heiser Mari F.;Hinton Heather M.;Readshaw Neil I.;Sivakumar Karthik
分类号 H04L29/06;G06F21/54;G06F21/57 主分类号 H04L29/06
代理机构 代理人 McLane Christopher;Simek Daniel R.
主权项 1. A method for managing software on one or more computing devices, the method comprising: identifying, by one or more computer processors, an instance of software installed on a computing device; determining, by one or more computer processors, a fingerprint corresponding to the instance of software installed on the computing device; determining, by one or more computer processors, a security risk associated with the instance of software installed on the computing device; identifying, by one or more computer processors, a software management policy for the instance of software based, at least in part, on the determined fingerprint, the determined security risk associated with the instance of software, and a designated purpose of the computing device; identifying, by one or more computer processors, a second computing device that includes a second instance of software that has a similar fingerprint to the determined fingerprint corresponding to the instance of software installed on the computing device; identifying, by one or more computer processors, a second software management policy on the second computing device that includes the second instance of software based, at least in part, on the security risk; in response to identifying the second software management policy, enforcing, by one or more computer processors, the second software management policy on the second instance of software; determining, by one or more computer processors, the security risk associated with the computing device based, at least in part on, on one or more instances of software installed on the computing device; and determining whether a second instance of software can be added to the computing device based upon the security risk associated with the computing device.
地址 Armonk NY US