WO2007105274A1 - 適用パッチ選別装置及び適用パッチ選別方法 - Google Patents
適用パッチ選別装置及び適用パッチ選別方法 Download PDFInfo
- Publication number
- WO2007105274A1 WO2007105274A1 PCT/JP2006/304742 JP2006304742W WO2007105274A1 WO 2007105274 A1 WO2007105274 A1 WO 2007105274A1 JP 2006304742 W JP2006304742 W JP 2006304742W WO 2007105274 A1 WO2007105274 A1 WO 2007105274A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- patch
- patches
- unapplied
- policy
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/658—Incremental updates; Differential updates
Definitions
- the present invention relates to an apparatus and method for selecting patches to be applied to a system.
- clusters multiple patches (hereinafter simply referred to as “clusters”) called “clusters” that have also been provided with vendor power, and a patch management tool. Applied in bulk. If the cluster and patch management tools are not used, the user has to manually check the failure information manually and select the necessary patches and apply them individually.
- the cluster is a collection of all patches classified by model and OS information, and a flag (such as a security patch or a recommended patch) recommended by the vendor as a major failure correction.
- a flag such as a security patch or a recommended patch
- the user can apply a set of patches in units of clusters or use the notch management tool to extract the latest set of unapplied patches and apply them all at once, security patches or recommended patches and V, It is common to apply a batch of patches with a flag. Don't use these If this is not the case, the only way to determine the necessary patches is to check the information on the failure that has been made public and the operation status of the system.
- Patent Document 1 discloses that when a system is started, a startup file including an executable program not applied to a patch and a patch are transferred from the front system to the back-end system.
- a patch is applied to the executable program included in the startup file, and when the system is shut down, the startup file containing the patched executable program is sent to the front system, and the next time
- a method has been proposed in which the patched executable program is sent from the front system to the back-end system when the system is started.
- a patch is applied in a certain amount such as a cluster, it can be used to correct a major failure recommended by the vendor for the time being.
- Patches for infrequent features may be applied, may include patches that have already been applied, are intended for clusters, and include product (features) patches There are also disadvantages!
- the latest patches are always applied for frequently used functions. There is also an idea that you want to keep. On the other hand, because there is a problem in the system operation, even if the function being used has a failure, it does not meet the conditions for the failure, and it is operating without any problems. Some people don't want to apply the latest patches. In addition, the released patches have a low track record of application and may cause a level down and become a bad patch (a patch that causes a level down and is released but withdrawn). There is also the idea that you want to apply a patch that has been used for some time. However, at present, there is no function for selecting patches to be applied according to the user policy.
- the present invention provides an applied patch sorting device and an applied patch that enable a user of a large number of patches that can be applied to a system to easily and automatically select only patches that the user really wants to apply.
- the object is to provide a sorting method.
- Patent Document 1 Japanese Patent No. 2871433
- the applied patch sorting device extracts information on all unapplied patches of the application target system based on the information of the application target system, as well as the information power of the released patch. Based on the first extraction means, the input means for inputting the user policy, and the user policy input by the input means! /, All the unapplied patches extracted by the first extraction means Information power Second extraction means for extracting information on unapplied patches that are actually applied to the application target system, and information on unapplied patches that are actually applied to the application target system extracted by the second extraction means And an unapplied patch acquisition means for acquiring the unapplied patch according to the above.
- the applied patch selection method extracts information on all unapplied patches of the application target system based on the information of the application target system. Based on the input user policy, the information about the unapplied patches that are actually applied to the application target system is extracted from the information of all the unapplied patches, and the unapplied patches that are actually applied to the application target system. The unapplied patch is acquired according to the information.
- the patch to be applied to the application target system is According to the user policy, it is possible to easily select and acquire.
- FIG. 1 is a diagram illustrating an overview of an entire system including a patch cluster creation system to which the present invention is applied.
- ⁇ 2 It is a diagram showing a set of frequently used function patches.
- FIG. 6 is a diagram showing an example of a policy input screen (policy setting 1 screen).
- FIG. 7 is a diagram showing an example of a policy input screen (policy setting 2 screen).
- FIG. 8 is a diagram showing an example of a policy input screen (policy setting 3 screen).
- FIG. 10 is a diagram showing an example of information stored in DB2.
- FIG. 11 is a diagram showing an example of the latest patch information stored in DB8.
- FIG. 14 is a diagram showing an example of a list screen of all unapplied patches displayed in S1.
- FIG. 15 is a diagram showing an example of a policy input screen (policy setting 0 screen) displayed in S2.
- FIG. 16 is a diagram showing an example of a list screen of all unapplied patches displayed in S3.
- FIG. 17 is a diagram showing an example of a policy input screen (policy setting 1 screen) displayed in S4.
- FIG. 18 is a diagram showing an example of a list screen displayed in S4.
- FIG. 20 is a diagram showing an example of a list screen displayed in S5.
- FIG. 21 is a diagram showing an example of a policy input screen (policy setting 3 screen) displayed in S6.
- FIG. 22 is a diagram showing an example of a list screen displayed in S6.
- FIG. 23 is a block diagram of an information processing apparatus.
- FIG. 24 is a diagram showing a recording medium.
- FIG. 1 is a diagram for explaining the outline of the entire system including a patch cluster creation system to which the present invention is applied.
- an application target system 1 is a system to which Notch is applied.
- the target system 1 includes a file and usage frequency information database 2 (hereinafter simply referred to as “DB2”), a file and PKG (package) information database 3 (hereinafter simply referred to as “DB3” t), and applied patch information.
- DB2 file and usage frequency information database 2
- DB3 file and PKG (package) information database 3
- applied patch information There are four databases: database 4 (hereinafter simply referred to as “DB4”) and installation PKG information database 5 (hereinafter simply referred to as “DB5”!).
- the file is a file as a function, that is, a program file, a library, or a data file.
- a PKG is a group of files that make up a product (for example, a group of functions that make up an OS).
- DB2 is a database in which files used in the application target system 1 and information on the frequency of use thereof are stored.
- DB3 is a database that stores information about the files existing in the target system 1 and the PKGs to which they belong.
- DB4 is a database in which information about patches applied to the target system 1 is stored.
- DB5 is a database that stores information on PKGs installed on the target system 1. Note that the information stored in the DBs 2 to 5 is updated by the application target system 1.
- the Notch Web 6 exists on a communication network such as the Internet, and stores a patch storage device 7 that stores the latest released patches, and a notch information database 8 that stores information on the latest patches ( (Hereinafter referred to simply as “DB8”), and a server that provides the latest notches and information as necessary.
- DB8 the information about the patch includes the patch number (patch ID), the name of the PKG to be modified, the release date, Stores information such as failure events.
- the Notch cluster creation system 9 creates a cluster of patches to be applied to the application target system 1 based on information about the application target system 1 and the user policy (patch cluster creation process). ) Etc.
- this patch cluster creation process when all the information is imported to the target system 1, it is connected via the communication network and the patch Web6 is referred to, and DB8 is based on the imported information. To extract the information of all unapplied patches of applicable system 1.
- the policy entered by the user for example, to apply patches with frequently used functions, or to apply patches related to failure events of ⁇ panic, system down '', etc.
- Information on the patches that are actually applied to the target system 1 (recommended application patches) is also extracted.
- the recommended application patch is downloaded and acquired from the patch storage device 7, and a cluster of the recommended application patch is created.
- policies that can be input by the user in this process will be described.
- the patch of the function that is frequently used is applied, the patch of the function that is frequently used, and the patch of the function is applied (less frequently used, It is possible to enter one of the following: target patches for functions) and target all patches.
- target patches for functions all unapplied patches that can be applied to the target system 1 are set X and the patches with frequently used functions are set A
- the frequently used patches are expressed as shown in Fig. 2.
- a patch with a low function is shown in Figure 3.
- the user can extract patches of any one set of set X other than set A and set A by inputting the policy for (1) above.
- the patch with the failure event “panic, system down” is set C
- the patch with the failure event “hang, execution not finished” is set D
- the patch with the failure event “command abnormal” is set E
- failure If the patch with the event “Performance Abnormal” is set F
- the patch with the failure event “Security” is set G
- the notch of each failure event is shown in Figure 5.
- set X is a set of all unapplied patches that can be applied to target system 1.
- each of the sets C to G may or may not overlap.
- the user can select any one of the sets C, D, E, F, G, or a combination thereof (AND condition or OR condition) or a node X of the set X by inputting the policy for (3) above. Extraction of a stick becomes possible.
- the policy input for the above (1) to (3) is performed from a policy input screen displayed on a display device (not shown) provided in the Notch cluster creation system 9 or by a command. Is possible.
- FIG. 6, FIG. 7, and FIG. 8 are diagrams showing an example of the policy input screen.
- Figure 6 shows the policy input screen (policy setting 1 screen) for (1) above.
- Figure 7 shows the policy input screen (policy setting 2 screen) for (2) above.
- Figure 8 shows the policy input screen (policy setting 3 screen) for (3) above.
- a policy can be input and set by checking a desired check box using an input device (not shown) provided in the patch cluster creation system 9.
- the files used in the applicable system 1 and their frequency of use within the past predetermined period from the present stored in DB2 Information information about files and their PKGs stored in DB3 that are stored in DB3, information about patches applied to target system 1 stored in DB4, and information stored in DB5 PKG information installed in the target system 1 is imported.
- the information stored in DB2 is updated based on the result of the investigation by the application target system 1 once every fixed period (for example, every day). For details, once every fixed period, check the access history (usage history) of all files existing in the target system 1 and the files used at the time of the investigation, and update based on the investigation results. Is done.
- the patch Web6 is referred to, and the latest patch information stored in DB8 and the imported DB5 information (application target system) Information on all patches to be applied to the target system 1 is extracted from the information of the PKG installed in the system 1), and the imported DB4 information (applied to the target system 1) is extracted from the extracted information. The information on all unapplied patches in the target system 1 is extracted, except for the information on applied patches according to the patch information).
- the information shown in Fig. 11 is stored in DB8 as the latest patch information, and the PKGs installed in the target system 1 from the imported DB5 information are PkgC and PkgD.
- the patch information extracted from DB8 as the information of all patches to be applied to the target system 1 is the patch No. Patch2, Patch3, Patch4, Patch5, Patch6 including PkgC or PkgD information. It becomes information of.
- the patch information that is finally extracted as information on all unapplied patches in the target system 1 is patch information for patch 2, patch 4, patch 5, patch 6, excluding Patch 3, and information on previous patches. It becomes.
- DB8 includes model information and OS version information for each patch.
- information on notch dependencies is included, and it is possible to extract information on all unapplied patches by taking into account such information.
- a file that is accessed more than 6 times is defined as a frequently used file.
- the imported DB2 information is shown in Fig. 10, and the imported DB3 information is shown in Fig. 10.
- Filel is extracted as a frequently used file with the information power of the imported DB2, and from the DB3 information shown in Fig. 12, the name of the PKG to which File 1 belongs is extracted. PkgC is extracted.
- the information power of all the unapplied patches that have been extracted For example, the information power of all the unapplied patches that have been extracted. Patch information about the patch number s Patch2, Patch4, Patch5, and Patch6 in the DB8 information shown in Figure 11. If the name of the PKG to which Pkg belongs is PkgC, the notch information extracted as a frequently used function patch is the patch information for the patch numbers Patch2, Patch5, and Patch6 that include the PkgC information.
- the input user policy is, for example, If a patch that has been released for 3 months is to be applied, information on the patch that has passed 3 months from the release date is extracted from the extracted information on all unapplied patches.
- the information power of the extracted unapplied patches As described above, the patch number powers Patch2, Patch4, Patch5, and Patch6 in the DB 8 information shown in FIG. Assuming that the current date is October 20, 2005, the patch information extracted as a patch three months after the release will be the patch information for patch numbers Patch2, Patch5, and Patch6.
- the input user policy is, for example, to apply a patch whose failure event is "command abnormal"
- it is extracted. Therefore, the information of the patch whose failure event is “command abnormal” is extracted from the information of all unapplied patches.
- the information power of all the unapplied patches that have been extracted As described above, the information on the patches for the patch number powers Patch2, Patch4, Patch5, and Patch6 in the DB8 information shown in FIG. Then, the patch information that is extracted as a “command abnormal” notch for the failure event is the patch information for the patch numbers SPatch2 and Patch5.
- FIG. 13 is a flowchart illustrating an example of patch cluster creation processing.
- FIGS. 14 to 22 are examples of screens displayed on a display device (not shown) of the patch cluster creation system 9 during the processing.
- information about the target system 1 (stored in DB2 to DB5) Information) is imported to the patch cluster creation system 9 and the execution of the notch cluster creation process is started, the imported DB5 information (PKG information installed in the target system 1) and the notch Web6 Based on the DB8 information (latest patch information), all patch information applicable to the target system 1 is extracted, and the imported DB4 information (applied to the target system 1) is extracted from that.
- the information on all unapplied patches is extracted, except for the information on applied patches according to the information on the already applied patches), and stored in the unapplied patch database (not shown) provided in the patch cluster creation system 9 (S1).
- S1 information on all extracted unapplied patches is displayed as a list.
- FIG. 14 is an example of a list screen of all unapplied patches displayed in S1.
- XXX indicates the node name of the target system 1 (the same applies to other list screens).
- this list screen shows the patch ID (patch number), patch summary (such as PKG to be modified), release date, and failure event.
- This list screen also includes a “Next” button and a “Cancel” button, and the user can move the process to the next S2 by pressing the “Next” button. ing.
- the patch cluster creation process itself can be terminated by pressing the “Cancel” button (the same applies to other list screens and policy input screens).
- the policy input screen (policy setting 0 screen) that allows the user to input the definition of frequently used functions. ) And the frequency of use according to the input to the policy input screen!
- the definition of the function and the imported DB2 information (file and usage frequency information) Extract the file information, and extract the PKG information of frequently used functions from the imported DB3 information (file and PKG information), and this is provided in the patch cluster creation system 9 Store in a frequently used PKG database (not shown) (S2).
- This policy input screen is also provided with a “skip” button and a “cancel” button, and the user can skip the process to S5 by pressing the “skip” button.
- the user inputs the desired number of days and number of times, the "0 K” button is pressed, and when the processing of S2 is completed, it is subsequently stored in the unapplied patch database at S1. Based on information on all unapplied patches and information on frequently used functions stored in the PKG database that is frequently used in S2, information on frequently used patches and frequently used functions is used. A list of all unapplied patches is displayed so that it can be distinguished from information on patches with no function (S3).
- FIG. 16 is an example of a list screen of all unapplied patches displayed in S3.
- This list screen also has a “Next” button and a “Back” button. The user moves the process to S4 by pressing the “Next” button and presses the “Back” button. By doing so, it is possible to return the processing to S2. Therefore, when the user presses the “return” button, the policy input screen shown in FIG. 15 is displayed again, and the user can start over from the definition of the frequently used function.
- FIG. 17 is an example of a policy input screen (policy setting 1 screen) displayed in S4.
- this policy input screen the user checks the check box of one of the check boxes and presses the “OK” button, so that the policy input for the above (1) is performed. It is possible.
- This policy input screen also has a “Cancel” button.
- FIG. 18 is an example of the list screen displayed in S4. As shown in the figure, only the information on notches of frequently used functions in the list screen shown in FIG. 16 is displayed as a list.
- This list screen also includes a “Next” button, a “ ⁇ ” button, and a “Cancel” button, and the user moves the process to S5 by pressing the “Next” button, The process can be shifted to S7 by pressing the “ ⁇ ” button.
- the policy input screen (policy setting 2 screen) that allows the user to input the policy for the above (2) is displayed, and the unextracted in S4 is displayed according to the input to the policy input screen. Further, information on specific unapplied patches is extracted from the information on applied patches and displayed as a list (S5).
- FIG. 19 is an example of the policy input screen (policy setting 2 screen) displayed in S5.
- this policy input screen the user can check the check box and press the “OK” button to input the policy for (2) above. It has become.
- this policy entry screen when a patch that has been released for a certain period since it was released is to be applied, the user can enter that period for each day.
- This policy input screen also has a “Cancel” button.
- patches that are 30 days after release are targeted for application, so on this policy entry screen, “30” is entered as a certain period that can be entered on a daily basis, The check box for “Target patches for which 30 days have passed since activation” is checked and the “ ⁇ ” button is pressed. Then, from the information on unapplied patches extracted in S4, information on patches that have been released for 30 days has been extracted. It is displayed as a list.
- FIG. 20 is an example of the list screen displayed in S5. As shown in the figure, only information on patches that have passed 30 days since they were released on the list screen shown in Fig. 18 is displayed as a list. However, in this example, the current date is January 26, 2006.
- This list screen also includes a “Next” button, an “OK” button, and a “Cancel” button, and the user moves the process to S6 by pressing the “Next” button. “By pressing the OKJ button, it is possible to move the process to S7.
- the policy input screen (policy setting 3 screen) that allows the user to input the policy for the above (3) is displayed, and the unextracted in S5 is displayed according to the input to the policy input screen.
- Information on specific unapplied patches is further extracted from the information on applied patches and displayed as a list (S6).
- FIG. 21 is an example of the policy input screen (policy setting 3 screen) displayed in S6.
- this policy entry screen As shown in the figure, on this policy input screen, the user can check the check box of any one check box and press the “OK” button, or “AND condition” or “OR condition”. Check one of the check boxes and check two or more check boxes (except for “All failure events”) and check “3” by pressing the “0” button.
- This policy entry screen also includes a “Cancel” button.
- FIG. 22 is an example of the list screen displayed in S6. As shown in the figure, only information on patches whose failure event is “Security” on the list screen shown in FIG. 20 is displayed as a list.
- the policy input screen also includes a “ ⁇ ” button and a “Cancel” button. Button is also provided, and the user can move the process to S7 by pressing the “OK” button.
- the unapplied patch is subsequently transferred from the patch storage device 7 of the patch Web6 according to the information of the unapplied patch extracted in S6. Download and acquire it, and create a cluster of the unapplied patches (S7). The created cluster is then applied to the target system 1 that is the target node.
- the state input to each policy input screen may be retained, and when the policy input screen is displayed at the next execution, the retained state may be displayed. It is pretty.
- the user by giving the user hints (information) for patch application such as notifications of frequently used functions, patch release dates, failure events, etc., the user can You can easily decide what policy you want to select patches for, so you don't have to worry about selecting patches.
- the information about the application target system 1 has been transferred to the patch cluster creation system 9.
- a communication network between the notch cluster creation system 9 and the application target system 1 is used. It is also possible for the notch cluster creation system 9 to access each DB of the application target system 1 and acquire information as needed during processing.
- the definition of frequently used functions can be arbitrarily set by the user. However, it is also possible to set this in a fixed manner in advance. Further, in this embodiment, in S2, the notch cluster creation system 9 defines functions that are frequently used in accordance with user input, and extracts information on files with frequently used functions. Force For example, it is possible for the system 1 to apply these. In this case, information on the frequently used function file extracted by the application target system 1 is imported as DB2 information transferred to the Notch cluster creation system 9.
- each of the application target system 1, the patch Web 6, and the patch cluster creation system 9 shown in FIG. 1 is configured using, for example, an information processing apparatus (computer) as shown in FIG. .
- the information processing apparatus shown in the figure includes a CPU (Central Processing Unit) 11, a memory 12 2, an input device 13, an output device 14, an external storage device 15, a medium drive device 16, and a network connection device 17. They are connected to each other by bus 18.
- CPU Central Processing Unit
- the memory 12 includes, for example, ROM (read only memory), RAM (random access memory), and the like, and stores programs and data used for processing.
- the CPU 11 performs necessary processing by executing a program using the memory 12. For example, in the case of an information processing apparatus as the patch cluster creation system 9, the above-described patch cluster creation processing is performed.
- the input device 13 is, for example, a keyboard, a pointing device, a touch panel, and the like, and is used for inputting instructions and information from the user.
- the output device 14 is, for example, a display. A printer or the like, which is used to output inquiries to the user and processing results.
- an information processing apparatus as the patch cluster creation system 9 it is used to display the above-described policy input screens and list screens.
- the external storage device 15 is, for example, a magnetic disk device, an optical disk device, a magneto-optical disk device, a tape device, or the like.
- the information processing apparatus stores the program and data in the external storage device 15 and loads them into the memory 12 for use as required. Further, when the information processing apparatus is the application target system 1, it is also used as DB2 to DB5. In the case of an information processing device as Notch Web 6, it is also used as DB 8 and patch storage device 7. Further, in the case of an information processing device as the notch cluster creation system 9, it is also used as a database of unapplied patches, a frequently used package, or a KG database.
- the medium driving device 16 drives the portable recording medium 19 and accesses the recorded contents.
- the portable recording medium 19 is an arbitrary computer-readable recording medium such as a memory card, a flexible disk, a CD-ROM (compact disk read only memory), an optical disk, and a magneto-optical disk.
- the user stores the program and data in the portable recording medium 19 and loads them into the memory 12 for use as necessary.
- the network connection device 17 is connected to an arbitrary communication network such as a LAN (local area network) or the Internet, and performs data conversion accompanying communication.
- the information processing apparatus receives the program and data as necessary from the external apparatus power via the network connection apparatus 17 and loads them into the memory 12 for use.
- FIG. 24 shows a computer-readable recording medium capable of supplying a program and data to the information processing apparatus shown in FIG.
- the program and data stored in the database 22 of the portable recording medium 19 N server 21 are loaded into the memory 12 of the information processing device 23.
- the server 21 generates a transport signal for transporting the program and data, and transmits the transport signal to the information processing device 23 via an arbitrary transmission medium on the network.
- the CPU 11 executes the program using the data and performs necessary processing.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2006/304742 WO2007105274A1 (ja) | 2006-03-10 | 2006-03-10 | 適用パッチ選別装置及び適用パッチ選別方法 |
KR1020087021648A KR100963550B1 (ko) | 2006-03-10 | 2006-03-10 | 적용 패치 선별 장치 및 적용 패치 선별 방법 |
JP2008504928A JP5018768B2 (ja) | 2006-03-10 | 2006-03-10 | 適用パッチ選別装置及び適用パッチ選別方法 |
EP06728910A EP2003557A4 (en) | 2006-03-10 | 2006-03-10 | DEVICE AND METHOD FOR SELECTING APPLICABLE CORRECTIONS |
CN2006800537763A CN101401072B (zh) | 2006-03-10 | 2006-03-10 | 应用补丁筛选装置以及应用补丁筛选方法 |
US12/197,026 US8171465B2 (en) | 2006-03-10 | 2008-08-22 | Applicable patch selection device and applicable patch selection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2006/304742 WO2007105274A1 (ja) | 2006-03-10 | 2006-03-10 | 適用パッチ選別装置及び適用パッチ選別方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/197,026 Continuation US8171465B2 (en) | 2006-03-10 | 2008-08-22 | Applicable patch selection device and applicable patch selection method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007105274A1 true WO2007105274A1 (ja) | 2007-09-20 |
Family
ID=38509124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/304742 WO2007105274A1 (ja) | 2006-03-10 | 2006-03-10 | 適用パッチ選別装置及び適用パッチ選別方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US8171465B2 (ja) |
EP (1) | EP2003557A4 (ja) |
JP (1) | JP5018768B2 (ja) |
KR (1) | KR100963550B1 (ja) |
CN (1) | CN101401072B (ja) |
WO (1) | WO2007105274A1 (ja) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010198358A (ja) * | 2009-02-25 | 2010-09-09 | Brother Ind Ltd | プログラム |
CN102156650A (zh) * | 2011-03-02 | 2011-08-17 | 奇智软件(北京)有限公司 | 一种实现补丁自动分析的方法及装置 |
DE102013210439A1 (de) | 2012-07-03 | 2014-01-09 | Fujitsu Ltd. | Patch-Bestimmungsprogramm, Patch-Bestimmungsverfahren, Informationsverarbeitungsvorrichtung, und computerlesbares Aufzeichnungsmedium |
JP2014038370A (ja) * | 2012-08-10 | 2014-02-27 | Sony Computer Entertainment Inc | 情報処理システム、情報処理方法、プログラム及び情報記憶媒体 |
JP2014067243A (ja) * | 2012-09-26 | 2014-04-17 | Azbil Corp | 不具合診断システム、品質管理装置、不具合診断装置および不具合診断方法 |
JP2015125454A (ja) * | 2013-12-25 | 2015-07-06 | 日本電気株式会社 | プログラム配信装置及びプログラム配信方法、プログラム配信システム、並びにコンピュータ・プログラム |
EP2927808A1 (en) | 2014-04-02 | 2015-10-07 | Fujitsu Limited | Application determination method, application determination device |
US10031866B2 (en) | 2012-08-10 | 2018-07-24 | Sony Interactive Entertainment Inc. | Information processing system, information processing device, information processing method, program and information storage medium for setting download permissions or settings |
JP2019040400A (ja) * | 2017-08-25 | 2019-03-14 | 富士通株式会社 | インストール制御プログラム、インストール制御方法、および情報処理装置 |
JP2019164498A (ja) * | 2018-03-19 | 2019-09-26 | 株式会社リコー | 機器管理装置、機器管理方法、機器管理プログラム及び機器管理システム |
WO2024162236A1 (ja) * | 2023-02-01 | 2024-08-08 | 株式会社日立ハイテク | パッチ管理装置、及びパッチ管理方法 |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090204946A1 (en) * | 2008-02-12 | 2009-08-13 | International Business Machines Corporation | Intelligent software code updater |
JP5152206B2 (ja) * | 2008-02-21 | 2013-02-27 | 富士通株式会社 | パッチ候補選択装置、パッチ候補選択プログラムおよびパッチ候補選択方法 |
US8667114B2 (en) * | 2011-02-15 | 2014-03-04 | Seiko Epson Corporation | Program update management server and program update management method |
CN103955380A (zh) * | 2011-03-02 | 2014-07-30 | 北京奇虎科技有限公司 | 补丁处理方法 |
CN103955377A (zh) * | 2011-03-02 | 2014-07-30 | 北京奇虎科技有限公司 | 一种实现补丁自动分析的方法及装置 |
US8776058B2 (en) | 2011-12-11 | 2014-07-08 | International Business Machines Corporation | Dynamic generation of VM instance at time of invocation |
CN102541596A (zh) * | 2011-12-22 | 2012-07-04 | 中标软件有限公司 | 一种操作系统升级方法及装置 |
JP6102378B2 (ja) * | 2013-03-15 | 2017-03-29 | 株式会社リコー | サーバ、情報処理システムおよびプログラム |
US9626176B2 (en) | 2013-09-13 | 2017-04-18 | Microsoft Technology Licensing, Llc | Update installer with technical impact analysis |
US9830142B2 (en) * | 2013-09-13 | 2017-11-28 | Microsoft Technology Licensing, Llc | Automatic installation of selected updates in multiple environments |
US10026064B2 (en) | 2013-09-13 | 2018-07-17 | Microsoft Technology Licensing, Llc | Automatically recommending updates based on stored lifecycle information |
US9665359B2 (en) | 2013-09-13 | 2017-05-30 | Microsoft Technology Licensing, Llc | Automatically resolving conflicts after installation of selected updates in a computer system |
US9098375B2 (en) * | 2013-12-23 | 2015-08-04 | Verizon Patent And Licensing Inc. | Automatic management of software patch installation |
US11243755B1 (en) | 2016-06-22 | 2022-02-08 | Amazon Technologies, Inc. | Resource aware patching service |
JP6433468B2 (ja) * | 2016-09-28 | 2018-12-05 | 本田技研工業株式会社 | プログラム作成支援方法 |
CN106843922B (zh) * | 2016-12-13 | 2020-08-04 | 青岛海信移动通信技术股份有限公司 | 一种程序的更新方法和装置 |
US10417017B2 (en) * | 2017-03-21 | 2019-09-17 | International Business Machines Corporation | Determining candidate patches for a computer software |
WO2023236125A1 (en) * | 2022-06-09 | 2023-12-14 | Huawei Technologies Co., Ltd. | Application live-patch control for consumer device malware detection |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2871433B2 (ja) | 1993-11-30 | 1999-03-17 | 日本電気株式会社 | パッチ方式 |
JP2003216430A (ja) * | 2002-01-18 | 2003-07-31 | Nec Corp | ソフトウェア自動更新システムおよび端末 |
JP2003233512A (ja) * | 2002-02-13 | 2003-08-22 | Nec Corp | 保守機能付きクライアント監視システム及び監視サーバ及びプログラム並びにクライアント監視・保守方法 |
JP2005099967A (ja) * | 2003-09-24 | 2005-04-14 | Hitachi Ltd | 予防保守方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3269522B2 (ja) * | 1998-03-23 | 2002-03-25 | 日本電気株式会社 | 遠隔保守方式 |
JP2002051363A (ja) * | 2000-08-04 | 2002-02-15 | Ntt Comware Corp | パッチファイル投入状態監視装置およびパッチファイル投入状態監視方法 |
AU2001294677A1 (en) * | 2000-09-22 | 2002-04-02 | Patchlink.Com Corporation | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US6976251B2 (en) * | 2001-05-30 | 2005-12-13 | International Business Machines Corporation | Intelligent update agent |
WO2003010658A2 (en) * | 2001-07-26 | 2003-02-06 | Kyocera Wireless Corporation | System and method for organizing field upgradable wireless communication device software |
JP2003085317A (ja) * | 2001-09-13 | 2003-03-20 | Hitachi Ltd | 予防保守サービス管理システム及び管理方法 |
JP2003296132A (ja) * | 2002-03-29 | 2003-10-17 | Mitsubishi Electric Corp | パッチ適用システム及びパッチ適用方法及びパッチ適用プログラム |
CA2465151A1 (en) * | 2003-04-16 | 2004-10-16 | Novadigm, Inc. | Method and system for patch management |
-
2006
- 2006-03-10 JP JP2008504928A patent/JP5018768B2/ja not_active Expired - Fee Related
- 2006-03-10 KR KR1020087021648A patent/KR100963550B1/ko not_active IP Right Cessation
- 2006-03-10 EP EP06728910A patent/EP2003557A4/en not_active Withdrawn
- 2006-03-10 WO PCT/JP2006/304742 patent/WO2007105274A1/ja active Application Filing
- 2006-03-10 CN CN2006800537763A patent/CN101401072B/zh not_active Expired - Fee Related
-
2008
- 2008-08-22 US US12/197,026 patent/US8171465B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2871433B2 (ja) | 1993-11-30 | 1999-03-17 | 日本電気株式会社 | パッチ方式 |
JP2003216430A (ja) * | 2002-01-18 | 2003-07-31 | Nec Corp | ソフトウェア自動更新システムおよび端末 |
JP2003233512A (ja) * | 2002-02-13 | 2003-08-22 | Nec Corp | 保守機能付きクライアント監視システム及び監視サーバ及びプログラム並びにクライアント監視・保守方法 |
JP2005099967A (ja) * | 2003-09-24 | 2005-04-14 | Hitachi Ltd | 予防保守方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2003557A4 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010198358A (ja) * | 2009-02-25 | 2010-09-09 | Brother Ind Ltd | プログラム |
CN102156650A (zh) * | 2011-03-02 | 2011-08-17 | 奇智软件(北京)有限公司 | 一种实现补丁自动分析的方法及装置 |
CN102156650B (zh) * | 2011-03-02 | 2014-06-25 | 奇智软件(北京)有限公司 | 一种实现补丁自动分析的方法及装置 |
DE102013210439A1 (de) | 2012-07-03 | 2014-01-09 | Fujitsu Ltd. | Patch-Bestimmungsprogramm, Patch-Bestimmungsverfahren, Informationsverarbeitungsvorrichtung, und computerlesbares Aufzeichnungsmedium |
US10031866B2 (en) | 2012-08-10 | 2018-07-24 | Sony Interactive Entertainment Inc. | Information processing system, information processing device, information processing method, program and information storage medium for setting download permissions or settings |
JP2014038370A (ja) * | 2012-08-10 | 2014-02-27 | Sony Computer Entertainment Inc | 情報処理システム、情報処理方法、プログラム及び情報記憶媒体 |
JP2014067243A (ja) * | 2012-09-26 | 2014-04-17 | Azbil Corp | 不具合診断システム、品質管理装置、不具合診断装置および不具合診断方法 |
JP2015125454A (ja) * | 2013-12-25 | 2015-07-06 | 日本電気株式会社 | プログラム配信装置及びプログラム配信方法、プログラム配信システム、並びにコンピュータ・プログラム |
US9201645B2 (en) | 2013-12-25 | 2015-12-01 | Nec Corporation | Program distribution device, program distribution method, program distribution system, and storage medium |
JP2015197841A (ja) * | 2014-04-02 | 2015-11-09 | 富士通株式会社 | 適用判定プログラム、適用判定方法、及び適用判定装置 |
EP2927808A1 (en) | 2014-04-02 | 2015-10-07 | Fujitsu Limited | Application determination method, application determination device |
JP2019040400A (ja) * | 2017-08-25 | 2019-03-14 | 富士通株式会社 | インストール制御プログラム、インストール制御方法、および情報処理装置 |
JP2019164498A (ja) * | 2018-03-19 | 2019-09-26 | 株式会社リコー | 機器管理装置、機器管理方法、機器管理プログラム及び機器管理システム |
JP7087506B2 (ja) | 2018-03-19 | 2022-06-21 | 株式会社リコー | 機器管理装置、機器管理方法、機器管理プログラム及び機器管理システム |
WO2024162236A1 (ja) * | 2023-02-01 | 2024-08-08 | 株式会社日立ハイテク | パッチ管理装置、及びパッチ管理方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101401072A (zh) | 2009-04-01 |
KR100963550B1 (ko) | 2010-06-15 |
JPWO2007105274A1 (ja) | 2009-07-23 |
EP2003557A9 (en) | 2009-04-08 |
US8171465B2 (en) | 2012-05-01 |
EP2003557A4 (en) | 2010-04-21 |
CN101401072B (zh) | 2010-12-15 |
EP2003557A2 (en) | 2008-12-17 |
JP5018768B2 (ja) | 2012-09-05 |
US20080313626A1 (en) | 2008-12-18 |
KR20080091394A (ko) | 2008-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007105274A1 (ja) | 適用パッチ選別装置及び適用パッチ選別方法 | |
US10430204B2 (en) | System and method for cloud provisioning and application deployment | |
EP2471014B1 (en) | Remote data collection systems and methods | |
US8584119B2 (en) | Multi-scenerio software deployment | |
KR101278743B1 (ko) | 서버 팜에서의 솔루션 배치 | |
US20050234931A1 (en) | Managing client configuration data | |
US20160019041A1 (en) | System and method for deploying software into a computing environment | |
US20140096123A1 (en) | Updating software objects | |
US8640098B2 (en) | Offline configuration and download approach | |
US20090222811A1 (en) | Systems and methods for managing software patches | |
CN106681956A (zh) | 一种大规模计算机集群的操作方法及装置 | |
US20080244563A1 (en) | Dynamic configuration environment for setup | |
US20090013321A1 (en) | Managing virtual computers | |
US20150264198A1 (en) | Automatic installation system and method, information processing apparatus, and image forming apparatus | |
US20100088286A1 (en) | Deployment manager for master data management | |
US10963227B2 (en) | Technique for transforming a standard messaging component to a customized component | |
US20140123130A1 (en) | Deployment of a solution artifact to a client application | |
CN113342387A (zh) | 一种软件自动升级方法、更新客户端及更新服务器 | |
US8719388B2 (en) | Method for installing a web package within a manufacturing executing system | |
JP2007080167A (ja) | ソフトウェア資源配信システムと方法およびプログラム | |
JP2013145504A (ja) | 配信サーバ、監視装置、画像処理装置、および配信サーバの制御方法、およびプログラム | |
JP4621709B2 (ja) | バージョン管理システム及びプログラムバージョン管理方法 | |
KR20230067257A (ko) | Ai 모델 서빙 시스템 및 방법 | |
JP2003330719A (ja) | アプリケーションのバージョン/リリースコントロール方法及びシステム、クライアントpcにインストールするアプリケーションのバージョン/リリースコントロールを行なうためのコンピュータソフトウエアプログラム | |
JP4410224B2 (ja) | プログラムのバージョン管理システムおよび方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 06728910 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008504928 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006728910 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020087021648 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200680053776.3 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |