Certifying a software application based on identifying interface usage
First Claim
1. A method comprising:
- identifying, by a processor, a set of application interfaces used by a set of software applications provided by a first authenticated user to operate with an operating system;
determining a change to the set of application interfaces resulting from a change to the operating system;
searching a history database to identify at least one software application of the set of software applications that is affected by the change to the set of application interfaces;
identifying a remainder of the set of software applications in the history database that is not affected by the change to the set of application interfaces;
certifying the remainder of the set of software applications as compatible with the change to the operating system; and
providing access to a list of the certified set of software applications to a second authenticated user based on access permissions in a profile of support associated with the second authenticated user.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide a mechanism for certifying the compatibility of a software product by identifying the interfaces (API or ABI) used by that product. The source code or object code of a component is analyzed by a tool that traces which interfaces and data structures of an ABI/API are being utilized. For example, an ISV or IHV may be required to run the tool on their respective components in order to have that component certified with a particular version of an operating system and submit the results to a certification service. The certification service may collect this API/ABI information into an integrated database. The certification service may then use this database to analyze the impact of changes to an operating system at the binary interface level, proactively notify vendors prior to these changes, test compatibility and emulation libraries, and certify components are compatible with an operating system without the need of significant testing.
26 Citations
16 Claims
-
1. A method comprising:
-
identifying, by a processor, a set of application interfaces used by a set of software applications provided by a first authenticated user to operate with an operating system; determining a change to the set of application interfaces resulting from a change to the operating system; searching a history database to identify at least one software application of the set of software applications that is affected by the change to the set of application interfaces; identifying a remainder of the set of software applications in the history database that is not affected by the change to the set of application interfaces; certifying the remainder of the set of software applications as compatible with the change to the operating system; and providing access to a list of the certified set of software applications to a second authenticated user based on access permissions in a profile of support associated with the second authenticated user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising;
-
identifying, by a processor, a first version of an operating system that software components provided by a first authenticated user have been certified as compatible with; identifying a set of application interfaces used by the software components to operate with the first version of the operating system; determining changes to the set of application interfaces in response to an update to the operating system from the first version to a second version; searching a history database to identify at least one of the software components whose compatibility with the second version of the operating system is affected by the changes to the set of application interfaces; identifying a remainder of the software components in the history database whose compatibility with the second version of the operating system is not affected by the changes to the set of application interfaces; certifying the remainder of the software components as compatible with the second version of the operating system; and providing access to a list of the certified set of software components to a second authenticated user based on access permissions in a profile of support associated with the second authenticated user. - View Dependent Claims (8, 9, 10)
-
-
11. A system configured to collect information about application interfaces used by software applications to operate with an operating system, said system comprising:
-
a set of application interfaces used by the software applications provided by a first authenticated user to operate with the operating system; and a processor configured to determine a change to the set of application interfaces resulting from a change to the operating system, search a history database to identify at least one of the software applications whose compatibility with the change to the operating system is affected by the change to the set of application interfaces, identify a remainder of the software applications in the history database whose compatibility with the change to the operating system is not affected by the change to the set of application interfaces and certify the remainder of the software applications as compatible with the change to the operating system, and providing access to a list of the certified set of software applications to a second authenticated user based on access permissions in a profile of support associated with the second authenticated user. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification