METHOD, SYSTEM AND DEVICE FOR VALIDATING REPAIR FILES AND REPAIRING CORRUPT SOFTWARE
First Claim
1. A computing device comprising:
- at least one processor;
memory coupled to the at least one processor;
a network adapter coupled to the memory and the at least one processor;
a component repair service configured to determine, based on a comparison of a hash of a file of a component to a cryptographically secure hash of an uncorrupt version of the file, that the file is corrupt, where the file is stored on another device that is separate from the computing device; and
the component repair service further configured to overwrite the corrupt file with the uncorrupt version of the file resulting in the component being repaired.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for repairing corrupt software components of a computer system. Corrupt software is detected and repaired utilizing an automated component repair service. Repair files are downloaded from an external storage location and used to repair the corruption. The downloaded files are preferably the smallest amount of data necessary to repair the identified corruption. The process of repairing corrupt files is used in conjunction with a software updating service to resolve problems that occur when corrupt software is updated by allowing a corrupt component to be repaired and then uninstalled such that an updated component can be properly installed.
-
Citations
20 Claims
-
1. A computing device comprising:
-
at least one processor; memory coupled to the at least one processor; a network adapter coupled to the memory and the at least one processor; a component repair service configured to determine, based on a comparison of a hash of a file of a component to a cryptographically secure hash of an uncorrupt version of the file, that the file is corrupt, where the file is stored on another device that is separate from the computing device; and the component repair service further configured to overwrite the corrupt file with the uncorrupt version of the file resulting in the component being repaired. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method performed on a computing device, the method comprising:
-
determining, by the computing device based on a comparison of a hash of a file of a component to a cryptographically secure hash of an uncorrupted version of the file, that the file is corrupt, where the file is stored on another device that is separate from the computing device; and overwriting, by the computing device, the corrupt file with the uncorrupt version of the file resulting in the component being repaired. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one memory device that comprises computer-executable instructions that, based on execution by a computing device, configure the computing device to perform actions comprising:
-
determining, based on a comparison of a hash of a file of a component to a cryptographically secure hash of an uncorrupted version of the file, that the file is corrupt, where the file is stored on another device that is separate from the computing device; downloading, in response to the determining that the file is corrupt, the uncorrupt version of the file; and overwriting the corrupt file with the downloaded version of the file resulting in the component being repaired. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification