×

System and method for automated configuration of software installation package

  • US 8,839,234 B1
  • Filed: 03/27/2013
  • Issued: 09/16/2014
  • Est. Priority Date: 12/25/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system for automated configuration of a software application to be installed, via a software installation package provided over a computer network, onto a plurality of different user devices for a plurality of different users, the system comprising:

  • set of instructions executable by computing hardware and stored in a non-transitory storage medium that, when executed, cause the computing hardware to implement;

    a task manager module that obtains an initial software installation package, and communicates with a network attributes data store via the computer network to obtain information representing (a) associations between the plurality of users and the plurality of user devices, and (b) user attributes from which access privilege level information for individual users is determinable;

    a configurator module that custom-configures the initial software installation package for individual ones of the plurality of user devices based on the information representing (a) and (b), to produce a plurality of different specially-configured software installation packages, each one of which corresponds to one or more specific users and one or more specific user devices, wherein each specially-configured software installation package includes installation parameters that establish functionality for the software application based on the access privilege level of the corresponding one or more specific users;

    an authorization module that performs authentication of each user of each user device in response to an initiation of installation of the software application via execution of a corresponding specially-configured software installation package on each corresponding user device, and which either permits or prevents completion of the installation of the software application on that user device in response to a corresponding result of the authentication, wherein the authentication of each user of each user device is a distinct authentication operation from a local authentication operation performed by each user device to authenticate an authorized user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×