Systems and methods for shielding an identified vulnerability
First Claim
Patent Images
1. A method comprising:
- identifying a vulnerability in at least one of a plurality of features of an application module; and
forming a communication for receipt by a plurality of clients to shield execution of the application module from the identified vulnerability, wherein the communication describes that the at least one said feature is to be disabled from execution in conjunction with the application module.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for shielding a vulnerability in an application through disablement of one or more features. In an implementation, a method includes identifying a vulnerability in at least one of a plurality of features for an application module. A communication is formed for receipt by a plurality of clients to shield execution of the application module from the identified vulnerability. The communication describes that the at least one feature is to be disabled from execution in conjunction with the application module.
-
Citations
20 Claims
-
1. A method comprising:
-
identifying a vulnerability in at least one of a plurality of features of an application module; and
forming a communication for receipt by a plurality of clients to shield execution of the application module from the identified vulnerability, wherein the communication describes that the at least one said feature is to be disabled from execution in conjunction with the application module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
determining that a vulnerability exists in at least one of a plurality of features for a particular version of an application module; and
forming a communication for transfer over a network to each of a plurality of clients having the particular version of the application module, wherein the communication describes a feature to be disabled that shields execution of the application module from the vulnerability. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
receiving a communication at a client from over a network which identifies at least one of a plurality of features to be disabled from execution in conjunction with an application module due to an identified vulnerability; and
examining a policy which describes a relative degree of compliance that the client is to utilize in response to the communication. - View Dependent Claims (17, 18, 19, 20)
-
Specification