Method and system for on-demand installation of software implementations
First Claim
1. In a computer system in a network, a method comprising, receiving a request corresponding to a software implementation, determining whether the software implementation is locally installed on the computer system, and if not locally installed, managing access to the software implementation by determining from deployment information independent of the request and associated with a policy recipient corresponding to the computer system whether the policy recipient is entitled to install software implementation, and if so, automatically installing the software implementation from a centralized store based on the deployment information.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for installing software implementations such as applications and COM classes as they are needed from an external source, such as a centralized network store. When a software implementation is needed, the system and method first look to the local system (e.g., registry) for that software implementation, and if found, returns the information such as a local path needed to use the software implementation. If the implementation is not found locally, the present invention dynamically looks to a centralized class store of a network, to locate the needed implementation. When located, the implementation is downloaded and locally installed in a manner that is essentially transparent to the user. Software implementations such as application products may be divided into features and components to improve on-demand installation thereof.
-
Citations
44 Claims
- 1. In a computer system in a network, a method comprising, receiving a request corresponding to a software implementation, determining whether the software implementation is locally installed on the computer system, and if not locally installed, managing access to the software implementation by determining from deployment information independent of the request and associated with a policy recipient corresponding to the computer system whether the policy recipient is entitled to install software implementation, and if so, automatically installing the software implementation from a centralized store based on the deployment information.
-
22. In a computer system in a network, a system comprising:
-
a mechanism for providing an installation request corresponding to a software implementation; and
an installer having an interface for receiving the installation request, the installer;
determining whether the software implementation is locally installed on the computer system, and when the software implementation is not locally installed on the computer system the installer;
managing access to the software implementation by a policy recipient associated with the computer system, including determining from deployment information independent of the installation request and associated with the policy recipient whether the policy recipient is entitled to access the software implementation, and if so, automatically installing the software implementation from a source external to the computer system. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 40)
-
-
38. In a computer network, a method comprising:
-
in a computer system having a policy recipient associated therewith, receiving a request corresponding to a requested software implementation;
determining that the requested software implementation is not installed on the computer system;
managing the computer system independent of the request, including accessing a class store that is associated with the policy recipient and contains software implementation deployment information for the policy recipient, to determine whether the requested software implementation has an association present therein that indicates that the policy recipient is entitled to install the requested software implementation; and
a) if so, automatically installing the software implementation from a network source external to the computer system in response to the request; and
b) if not, providing data that corresponds to the requested software implementation not being deployable to this policy recipient. - View Dependent Claims (39)
-
-
41. In a computer system in a network, a system comprising:
-
a database in the computer system containing information about installed states of executable software code;
a policy container associated with a policy recipient that corresponds to the computer system, the policy container including deployment information for managing the deployment of executable software code to the policy recipient; and
an operating system mechanism that;
1) receives a request corresponding to launching requested executable software code; and
2) accesses the database to determine whether the requested executable software code is installed, and a) if installed, launches the requested executable software code;
orb) if not installed, accesses the policy container to determine whether the policy recipient associated with the computer system is entitled to deploy the requested executable software code, and if so, automatically installs the executable software code from a network source and launches the executable software code. - View Dependent Claims (42, 43, 44)
-
Specification