Methods and systems for enabling community-tested security features for legacy applications
First Claim
1. A computer-implemented method for enabling community-tested security features for legacy applications, the method comprising:
- identifying a legacy application that has yet to be updated to take advantage of at least one existing security feature provided by an operating system on which the legacy application is installed;
identifying a security-feature-enablement rule provided for the legacy application by a security vendor;
executing the security-feature-enablement rule provided by the security vendor to update the legacy application to take advantage of the existing security feature provided by the operating system, wherein executing the security-feature-enablement rule comprises injecting an instruction into the legacy application'"'"'s code that calls the existing security feature provided by the operating system;
automatically determining, using at least one module provided by the security vendor, health-impact information that identifies the impact of the security-feature-enablement rule on the health of the legacy application by;
performing a first health evaluation prior to executing the security-feature-enablement rule;
after executing the security-feature-enablement rule, performing a second health evaluation;
relaying the health-impact information that identifies the impact of the security-feature-enablement rule on the health of the legacy application to a server provided by the security vendor;
receiving an instruction from the server to disable the security-feature-enablement rule for the legacy application in response to a determination, based on the health-impact information, that the security-feature-enablement rule is likely to decrease at least one of performance and stability of the legacy application.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for enabling community-tested security features for legacy applications may include: 1) identifying a plurality of client systems, 2) identifying a legacy application on a client system within the plurality of client systems, 3) identifying a security-feature-enablement rule for the legacy application, 4) enabling at least one security feature for the legacy application by executing the security-feature-enablement rule, 5) determining the impact of the security-feature-enablement rule on the health of the legacy application, and then 6) relaying the impact of the security-feature-enablement rule on the health of the legacy application to a server. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for enabling community-tested security features for legacy applications, the method comprising:
-
identifying a legacy application that has yet to be updated to take advantage of at least one existing security feature provided by an operating system on which the legacy application is installed; identifying a security-feature-enablement rule provided for the legacy application by a security vendor; executing the security-feature-enablement rule provided by the security vendor to update the legacy application to take advantage of the existing security feature provided by the operating system, wherein executing the security-feature-enablement rule comprises injecting an instruction into the legacy application'"'"'s code that calls the existing security feature provided by the operating system; automatically determining, using at least one module provided by the security vendor, health-impact information that identifies the impact of the security-feature-enablement rule on the health of the legacy application by; performing a first health evaluation prior to executing the security-feature-enablement rule; after executing the security-feature-enablement rule, performing a second health evaluation; relaying the health-impact information that identifies the impact of the security-feature-enablement rule on the health of the legacy application to a server provided by the security vendor; receiving an instruction from the server to disable the security-feature-enablement rule for the legacy application in response to a determination, based on the health-impact information, that the security-feature-enablement rule is likely to decrease at least one of performance and stability of the legacy application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for enabling community-tested security features for legacy applications, the method comprising:
-
identifying a plurality of client systems; identifying a subset of the plurality of client systems that is designated to test security features for at least one legacy application that has yet to be updated to take advantage of at least one existing security feature provided by an operating system on which the legacy application is installed; transmitting a security-feature-enablement rule provided for the legacy application by a security vendor to at least one client system in the subset, wherein the security-feature-enablement rule injects an instruction into the legacy application'"'"'s code that calls the existing security feature provided by the operating system; receiving, from the client system in the subset, automatically generated health-impact information that identifies the impact of the security-feature-enablement rule on the health of the legacy application on the client system, the health-impact information comprising; a first health evaluation performed prior to executing the security-feature-enablement rule; a second health evaluation performed after executing the security-feature-enablement rule; determining, based on the automatically generated health-impact information, whether to roll out the security-feature-enablement rule to the plurality of client systems; transmitting an instruction to disable the security-feature-enablement rule for the legacy application in response to a determination, based on the health-impact information, that the security-feature-enablement rule is likely to decrease at least one of performance and stability of the legacy application. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system for enabling community-tested security features for legacy applications, the system comprising at least one central processing unit configured to execute a client module programmed to:
-
identify a legacy application that has yet to be updated to take advantage of at least one existing security feature provided by an operating system on which the legacy application is installed; identify a security-feature-enablement rule provided for the legacy application by a security vendor; execute the security-feature-enablement rule provided by the security vendor to update the legacy application to take advantage of the existing security feature provided by the operating system, wherein executing the security-feature-enablement rule comprises injecting an instruction into the legacy application'"'"'s code that calls the existing security feature provided by the operating system; automatically determine health-impact information that identifies the impact of the security-feature-enablement rule on the health of the legacy application by; performing a first health evaluation prior to executing the security-feature-enablement rule; after executing the security-feature-enablement rule, performing a second health evaluation; relay the health-impact information that identifies the impact of the security-feature-enablement rule on the health of the legacy application to a server provided by the security vendor; receive an instruction from the server to disable the security-feature-enablement rule for the legacy application in response to a determination, based on the health-impact information, that the security-feature-enablement rule is likely to decrease at least one of performance and stability of the legacy application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification