Methods and apparatus for pre-configuring software
First Claim
1. In a first computerized device, a computer implemented method of providing software to a second computerized device, the method comprising:
- deploying an agent to the second computerized device;
receiving at the first computerized device, from the agent operating on the second computerized device, configuration data specific to the second computerized device, the configuration data obtained by the agent operating on the second computerized device;
obtaining configuration data associated with at least one other computerized device in communication with the second computerized device, the configuration data, associated with the at least one other computerized device, necessary for creation of the software for the second computerized device;
requesting permission for access to obtain the configuration data from the second computerized device comprising requesting permission from a user operating the second computerized device;
notifying the user what configuration data will be obtained from the second computerized device; and
waiting to receive permission from the user prior to obtaining the configuration data from the configuration database;
wherein a security process on the second computerized device prevents malicious software from obtaining unauthorized configuration data;
creating software for the second computerized device utilizing the configuration data and the configuration data from the at least one other computerized device, the software customized based on the configuration data specific to the second computerized device, creating the software comprising;
identifying a plurality of components necessary to render the software operable on the second computerized device;
compiling the plurality of components to create a software deployable on the second computerized device, the software customized for the second computerized device; and
deploying the software to the second computerized device for operation on the second computerized device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, operating on a first computerized device, deploys an agent to a second computerized device. The agent, operating on the second computerized device, obtains the configuration data. The system receives, at the first computerized device, from the agent operating on the second computerized device, configuration data specific to the second computerized device. The system creates software for the second computerized device utilizing the configuration data. The software is customized based on the configuration data specific to the second computerized device. The system then deploys the software to the second computerized device for operation on the second computerized device.
-
Citations
20 Claims
-
1. In a first computerized device, a computer implemented method of providing software to a second computerized device, the method comprising:
-
deploying an agent to the second computerized device; receiving at the first computerized device, from the agent operating on the second computerized device, configuration data specific to the second computerized device, the configuration data obtained by the agent operating on the second computerized device; obtaining configuration data associated with at least one other computerized device in communication with the second computerized device, the configuration data, associated with the at least one other computerized device, necessary for creation of the software for the second computerized device; requesting permission for access to obtain the configuration data from the second computerized device comprising requesting permission from a user operating the second computerized device; notifying the user what configuration data will be obtained from the second computerized device; and waiting to receive permission from the user prior to obtaining the configuration data from the configuration database; wherein a security process on the second computerized device prevents malicious software from obtaining unauthorized configuration data; creating software for the second computerized device utilizing the configuration data and the configuration data from the at least one other computerized device, the software customized based on the configuration data specific to the second computerized device, creating the software comprising; identifying a plurality of components necessary to render the software operable on the second computerized device; compiling the plurality of components to create a software deployable on the second computerized device, the software customized for the second computerized device; and deploying the software to the second computerized device for operation on the second computerized device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computerized device comprising:
-
a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor and the communications interface; wherein the memory is encoded with a software configuring application that when executed on the processor is capable of configuring software on the computerized device by performing the operations of; deploying an agent to the second computerized device; receiving at the first computerized device, from the agent operating on the second computerized device, configuration data specific to the second computerized device, the configuration data obtained by the agent operating on the second computerized device; obtaining configuration data associated with at least one other computerized device in communication with the second computerized device, the configuration data, associated with the at least one other computerized device, necessary for creation of the software for the second computerized device; requesting permission for access to obtain the configuration data from the second computerized device comprising requesting permission from a user associated with the second computerized device; notifying the user what configuration data will be obtained from the second computerized device; preventing malicious software from obtaining unauthorized configuration data; and waiting to receive permission from the user prior to obtaining the configuration data; creating software for the second computerized device utilizing the configuration data and the configuration data from the at least one other computerized device, the software customized based on the configuration data specific to the second computerized device, creating the software comprising identifying a plurality of components necessary to render the software operable on the second computerized device; compiling the plurality of components to create a software deployable on the second computerized device, the software customized for the second computerized device; and deploying the software to the second computerized device for operation on the second computerized device. - View Dependent Claims (16, 17, 18)
-
-
19. A computer readable medium encoded with computer programming logic that when executed on a process in a computerized device configures software, the medium comprising:
-
instructions for deploying an agent to the second computerized device; instructions for receiving at the first computerized device, from the agent operating on the second computerized device, configuration data specific to the second computerized device, the configuration data obtained by the agent operating on the second computerized device; instructions for obtaining configuration data associated with at least one other computerized device in communication with the second computerized device, the configuration data, associated with the at least one other computerized device, necessary for creation of the software for the second computerized device; instructions for requesting permission for access to obtain the configuration data from the second computerized device comprising requesting permission from a user associated with the second computerized device; notifying the user what configuration data will be obtained from the second computerized device; instructions for preventing malicious software from obtaining unauthorized configuration data; and instructions for waiting to receive permission from the user prior to obtaining the configuration data from the configuration database; instructions for creating software for the second computerized device utilizing the configuration data and the configuration data from the at least one other computerized device, the software customized based on the configuration data specific to the second computerized device, creating the software comprising identifying a plurality of components necessary to render the software operable on the second computerized device; instructions for compiling the plurality of components to create a software deployable on the second computerized device, the software customized for the second computerized device; and instructions for deploying the software to the second computerized device for operation on the second computerized device.
-
-
20. In a first computerized device, a computer implemented method of providing software to a second computerized device, the method comprising:
-
deploying an agent to the second computerized device; receiving at the first computerized device, from the agent operating on the second computerized device, configuration data specific to the second computerized device, the configuration data obtained by the agent operating on the second computerized device; preventing malicious software from obtaining unauthorized configuration data; obtaining configuration data associated with at least one other computerized device in communication with the second computerized device, the configuration data, associated with the at least one other computerized device, necessary for creation of the software for the second computerized device; utilizing the configuration data from the at least one other computerized device to create pre-configured customized software for the second computerized device creating software for the second computerized device utilizing the configuration data and the configuration data from the at least one other computerized device, the software customized based on the configuration data specific to the second computerized device, creating the software comprising; identifying a plurality of components necessary to render the software operable on the second computerized device; compiling the plurality of components to create a software deployable on the second computerized device, the software customized for the second computerized device; and deploying the software to the second computerized device for operation on the second computerized device.
-
Specification