Shared resource dependencies
First Claim
1. A computer-implemented method for sharing resource dependencies on a data processing system, comprising:
- installing a second application bundle including a second application and an embedded second resource on the data processing system, wherein the data processing system includes a first application bundle including a first application and an associated first resource;
determining a second identifier for the second resource;
determining whether the second identifier including a signature file matches a first identifier including a signature file of the first resource;
determining whether the first resource is identical to the second resource if the first identifier matches the second identifier, wherein determining whether the first resource is identical to the second resource if the first identifier matches the second identifier is based on a comparison of additional signature files of the first resource and additional signature files of the second resource; and
removing the second resource from the data processing system if the first resource is identical to the second resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein are methods for sharing resource dependencies between applications stored on a system. For example, in at least certain embodiments, a computer-implemented method for sharing resource dependencies includes installing or initiating installation of multiple application bundles having one or more applications and respective resources on the system. Next, an installer determines identifiers (e.g., hash signatures) for first and second resources and determines whether the resources are identical if an identifier for the first resource matches an identifier for the second resource. Then, a link is created from the second application bundle to the first resource of the first application bundle if the first resource is identical to the second resource. The second resource may be removed from the system if it has been installed. Alternatively, installation of the second resource is terminated if it has not been installed on the system.
21 Citations
25 Claims
-
1. A computer-implemented method for sharing resource dependencies on a data processing system, comprising:
-
installing a second application bundle including a second application and an embedded second resource on the data processing system, wherein the data processing system includes a first application bundle including a first application and an associated first resource; determining a second identifier for the second resource; determining whether the second identifier including a signature file matches a first identifier including a signature file of the first resource; determining whether the first resource is identical to the second resource if the first identifier matches the second identifier, wherein determining whether the first resource is identical to the second resource if the first identifier matches the second identifier is based on a comparison of additional signature files of the first resource and additional signature files of the second resource; and removing the second resource from the data processing system if the first resource is identical to the second resource. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer readable medium containing executable computer program instructions which when executed by a computing system cause said system to perform a method, the method comprising:
-
installing a second application bundle including a second application and an embedded second resource on the data processing system, wherein the data processing system includes a first application bundle including a first application and an embedded first resource; determining a second identifier for the second resource; determining whether the second identifier including a signature file matches a first identifier including a signature file of the first resource; determining whether the first resource is identical to the second resource if the first identifier matches the second identifier, wherein determining whether the first resource is identical to the second resource if the first identifier matches the second identifier is based on a comparison of additional signature files of the first resource and additional signature files of the second resource; and removing the second resource from the data processing system if the first resource is identical to the second resource. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A data processing system, comprising:
-
a non-transitory storage unit to store a first application bundle including a first application and an associated first resource; a processing system coupled to the non-transitory storage unit; a cache memory coupled to the processing system; and one or more programs, wherein the one or more programs are configured to be executed by the processing system, the programs including; instructions to install a second application bundle including a second application and an associated second resource on the storage unit; instructions to determine a second identifier for the second resource; instructions to determine whether the second identifier matches a first identifier of the first resource; instructions to determine whether the second identifier including a signature file matches a first identifier including a signature file of the first resource; instructions to determine whether the first resource is identical to the second resource if the first identifier matches the second identifier, wherein determining whether the first resource is identical to the second resource if the first identifier matches the second identifier is based on a comparison of additional signature files of the first resource and additional signature files of the second resource; and instructions to remove the second resource from the storage unit if the first resource is identical to the second resource. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-implemented method for shared framework dependencies on a data processing system, comprising:
-
initiating installation of a second application and an associated second framework on the data processing system, wherein the data processing system includes a first application and an associated first framework; determining a second identifier for the second framework; determining whether the second identifier including a signature file for the second framework matches a first identifier including a signature file of the first framework; and determining whether the first framework is identical to the second framework if the first identifier matches the second identifier, wherein determining whether the first framework is identical to the second framework if the first identifier matches the second identifier is based on a comparison of additional signature files of the first framework and additional signature files of the second framework, wherein the first framework provides support for a plurality of different applications. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A non-transitory computer readable medium containing executable computer program instructions which when executed by a computing system cause said system to perform a method, the method comprising:
-
initiating installation of a second application and an associated second framework on the data processing system, wherein the data processing system includes a first application and an associated first framework; determining a second identifier for the second framework; determining whether the second identifier including a signature file for the second framework matches a first identifier including a signature file of the first framework; and determining whether the first framework is identical to the second framework if the first identifier matches the second identifier, wherein determining whether the first framework is identical to the second framework if the first identifier matches the second identifier is based on a comparison of additional signature files of the first framework and additional signature files of the second framework, wherein the first framework provides support for a plurality of different applications. - View Dependent Claims (22, 23, 24, 25)
-
Specification