System and method for repairing a damaged application program
First Claim
1. A computer-implemented method, comprising:
- receiving a request to verify that a needed resource is available to an executable software program, the needed resource comprising at least one resource needed by the program;
determining whether the needed resource is available to the program, and if the needed resource is not available to the program, automatically initiating an installation procedure without manual termination of the program to make the needed resource available to the program.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for providing the ability to repair an installed application program if a resource needed by the application program becomes inadvertently deleted or otherwise unavailable to the application program. Briefly described, the present invention makes possible a system for verifying the existence of a resource needed to support a feature of the application program. The system may respond to a request from the application program to make use of the resource by first verifying the existence of the resource at an expected location. If the resource does not exist at the expected location, rather than returning an error to the application program, the system initiates an installation procedure for restoring the missing resource without interrupting the normal operation of the application program.
105 Citations
35 Claims
-
1. A computer-implemented method, comprising:
-
receiving a request to verify that a needed resource is available to an executable software program, the needed resource comprising at least one resource needed by the program;
determining whether the needed resource is available to the program, and if the needed resource is not available to the program, automatically initiating an installation procedure without manual termination of the program to make the needed resource available to the program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
12. In a computing environment, a system comprising:
-
an executable software program including a first set of executable code and a second set of executable code, the second set of executable code comprising at least one resource that is needed to provide functionality to the first set of executable code; and
an installer program connected for communication with the first executable software program to receive a request for installation information of the second set of executable code, the installer program configured to determine the installation information, and when the installation information indicates that the set of executable code is not installed, the installer program further configured to automatically install the second set of executable code to make the second set of executable code available to the first set of executable code.
-
-
21. A computer-readable medium having computer-executable instructions, comprising:
-
receiving a resource identifier comprising at least one argument from a first set of executable code, the resource identifier being associated with a second set of executable code including at least one resource that provides functionality to the first set of executable code;
accessing a database based on the resource identifier to retrieve an expected location of at least part of the second set of executable code; and
verifying the existence of the at least part of the second set of executable code at the expected location, and if verification is positive, passing the expected location to the first set of executable code. - View Dependent Claims (22, 23, 24, 25, 27, 28, 29)
-
-
26. In a computing environment, a system comprising,
executable code having a feature, the feature comprising a component including a key file which supports the feature; - and
an installer for repairing the executable code if the key file becomes unavailable to the executable code, the installer;
(a) receiving from the executable code a request for a path to the key file;
(b) identifying an expected location for the key file in the computing environment;
(c) attempting to verify the existence of the key file at the expected location in the computing environment; and
(d) in response to a failure to verify the existence of the key file at the expected location, automatically initiating an installation of the key file to the expected location without manual termination of the executable code.
- and
-
30. In a computer system, a method comprising,
receiving a call, the call including a resource identifier; - and
in response to receiving the call;
1) determining if a resource corresponding to the resource identifier exists at an expected location, and if the resource does not exist at the expected location, automatically initiating an installation of the resource to the expected location; and
2) returning information corresponding to the existence of the resource at the expected location. - View Dependent Claims (31, 32, 33, 34, 35)
- and
Specification