Method of managing a software item on a managed computer system
First Claim
Patent Images
1. A managed computer system, connectable to a management computer system that manages at least one current software item on the managed computer system, the managed computer system including:
- a processor executing instructions for;
an inventory module to receive a request from the management computer system to generate a software inventory list that includes current software items on the managed computer system, and software inventory list to be communicated to the management computer system; and
an uninstall module to selectively disable an unauthorized software item by using an uninstall package, associated with the unauthorized software item and received from the management computer system, the uninstall package being one of a plurality of uninstall packages available at the management computer system;
wherein the unauthorized software item is identified by a user interface configured to;
display software items in a display window; and
receive an allow input from a user to identify if a software item is authorized on the managed computer system, and receive a disallow input from a user to identify if a software item is unauthorized on the managed computer system.
14 Assignments
0 Petitions
Accused Products
Abstract
A method and system is provided of managing a current software item on a managed computer system connectable to a management computer system via a computer network. The method includes identifying, using an agent application, the current software item on the managed computer system, identifying if the current software item is an unauthorized software item; and selectively disabling the unauthorized software item.
-
Citations
18 Claims
-
1. A managed computer system, connectable to a management computer system that manages at least one current software item on the managed computer system, the managed computer system including:
-
a processor executing instructions for; an inventory module to receive a request from the management computer system to generate a software inventory list that includes current software items on the managed computer system, and software inventory list to be communicated to the management computer system; and an uninstall module to selectively disable an unauthorized software item by using an uninstall package, associated with the unauthorized software item and received from the management computer system, the uninstall package being one of a plurality of uninstall packages available at the management computer system; wherein the unauthorized software item is identified by a user interface configured to; display software items in a display window; and receive an allow input from a user to identify if a software item is authorized on the managed computer system, and receive a disallow input from a user to identify if a software item is unauthorized on the managed computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system comprising:
-
a processor operable to execute software; memory operable to store software; a software reference list stored in the memory and identifying one or more unauthorized software items; a comparator component executing on the processing resources and operable to compare one or more current software item identifiers retrieved from a managed computer system with the software reference list to identify that the one or more current software items are unauthorized software items for the managed computer system; an uninstall component operable to automatically, in response to detecting by the comparator component of one or more unauthorized software items, communicate an uninstall package to the managed computer system for uninstalling the unauthorized software item, the uninstall package operable to selectively disable an unauthorized software item; and a user interface is configured to; display software items in a display window; and receive an allow input from a user to identify if a software item is authorized on the managed device, and receive a disallow input from a user to identify if a software item is unauthorized on the managed device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of managing software items on a managed computer system, the method comprising:
-
displaying software items in a display window; receiving an allow input from a user to identify if a software item is authorized on the managed computer system; receiving a disallow input from a user to identify if a software item is unauthorized on the managed computer system; creating a software reference list from at least the software items having an allow input; retrieving from the managed computer system a plurality of current software item identifiers that identify current software items on the managed computer system; comparing the current software item identifiers with the software reference list to identify one or more unauthorized software items;
communicating an uninstall package to the managed computer system to uninstall the one or more unauthorized software items; andselectively disabling the one or more unauthorized software items by using the uninstall package. - View Dependent Claims (18)
-
Specification