Package compatibility
First Claim
Patent Images
1. A method for providing computing device package compatibility, comprising:
- defining, via a computing device, a first package to be opened by the computing device, the first package having information including;
package functionality information;
a second package that includes installation content; and
a protection mechanism;
determining using the package functionality information, by the computing device, whether the protection mechanism can be utilized by the computing device; and
identifying using the protection mechanism, by the computing device, whether the second package has been modified if it is determined that the protection mechanism can be utilized.
2 Assignments
0 Petitions
Accused Products
Abstract
One method embodiment includes defining a first package to be opened by a computing device. The method includes associating installation content to be installed on the computing device with the first package. The first package includes a second package that includes the installation content to be installed and the first package includes package functionality information to determine whether a particular package functionality can be utilized by the computing device.
-
Citations
25 Claims
-
1. A method for providing computing device package compatibility, comprising:
-
defining, via a computing device, a first package to be opened by the computing device, the first package having information including; package functionality information; a second package that includes installation content; and a protection mechanism; determining using the package functionality information, by the computing device, whether the protection mechanism can be utilized by the computing device; and identifying using the protection mechanism, by the computing device, whether the second package has been modified if it is determined that the protection mechanism can be utilized. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computing device readable medium having executable instructions thereon for causing a device to perform a method, comprising:
-
defining a first package to be opened by a computing device, the first package having information including; package functionality information; a second package that includes installation content; and security information; determining using the package functionality information, by the computing device, whether the security information can be utilized by the computing device; and identifying using the security information, by the computing device, whether the second package has been modified if it is determined that the security information can be utilized. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computing device package structure embodied on a non-transitory computing device readable medium having executable instructions stored thereon, comprising:
-
a first package including; package functionality information; a second package that includes installation content; and security information; wherein the executable instructions when executed by a computing device cause the computing device to; determine, using the package functionality information, whether the security information can be utilized by the computing device; and analyze the security information to determine whether the installation content has been modified if it is determined that the security information can be utilized. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. An executable instruction set installer embodied on a non-transitory computing device readable medium having executable instructions stored thereon, comprising:
a first set of executable instructions executable on a computing device to cause the computing device to; retrieve a first package having package functionality information and security information from a memory location; determine, using the package functionality information, whether the computing device has executable instructions to utilize the security information; determine whether the first package has been modified if it is determined that the computing device has executable instructions to utilize the security information; and determine, using the security information, whether a second package within the first package has been modified if it is determined that the computing device has executable instructions to utilize the security information. - View Dependent Claims (21, 22, 23, 24, 25)
Specification