Methods and systems for enabling community-tested security features for legacy applications
First Claim
1. A computer-implemented method for enabling community-tested security features for legacy applications, the method comprising:
- identifying a plurality of client systems;
identifying a subset of the plurality of client systems that is designated to test security features for legacy applications;
transmitting a security-feature-enablement rule to each client system in the subset that, when executed, enables a security feature available on the client system;
receiving, from each client system in the subset, health-impact information that identifies the impact, on the health of a legacy application on the client system, of executing the security-feature-enablement rule to enable the security feature;
identifying a health-impact score that quantifies the impact of the enabled security feature on the health of the legacy applications on the client systems within the subset;
determining, based on the health-impact score that quantifies the impact of the enabled security feature, whether to roll out the security-feature-enablement rule to the plurality of client systems at least in part by determining whether, on average, the security-feature-enablement rule negatively impacted the health of legacy applications on the client systems within the subset, the method being performed by a server-side computing device that comprises at least one processor.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for enabling community-tested security features for legacy applications may include: 1) identifying a plurality of client systems, 2) identifying a legacy application on a client system within the plurality of client systems, 3) identifying a security-feature-enablement rule for the legacy application, 4) enabling at least one security feature for the legacy application by executing the security-feature-enablement rule, 5) determining the impact of the security-feature-enablement rule on the health of the legacy application, and then 6) relaying the impact of the security-feature-enablement rule on the health of the legacy application to a server. Various other methods, systems, and computer-readable media are also disclosed.
9 Citations
20 Claims
-
1. A computer-implemented method for enabling community-tested security features for legacy applications, the method comprising:
-
identifying a plurality of client systems; identifying a subset of the plurality of client systems that is designated to test security features for legacy applications; transmitting a security-feature-enablement rule to each client system in the subset that, when executed, enables a security feature available on the client system; receiving, from each client system in the subset, health-impact information that identifies the impact, on the health of a legacy application on the client system, of executing the security-feature-enablement rule to enable the security feature; identifying a health-impact score that quantifies the impact of the enabled security feature on the health of the legacy applications on the client systems within the subset; determining, based on the health-impact score that quantifies the impact of the enabled security feature, whether to roll out the security-feature-enablement rule to the plurality of client systems at least in part by determining whether, on average, the security-feature-enablement rule negatively impacted the health of legacy applications on the client systems within the subset, the method being performed by a server-side computing device that comprises at least one processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for enabling community-tested security features for legacy applications, the system comprising:
-
at least one processor; a server module, stored in memory, that; identifies a plurality of client systems; identifies a subset of the plurality of client systems that is designated to test security features for legacy applications; transmits a security-feature-enablement rule to each client system in the subset that, when executed, enables a security feature available on the client system; receives, from each client system in the subset, health-impact information that identifies the impact, on the health of a legacy application on the client system, of executing the security-feature-enablement rule to enable the security feature; identifies a health-impact score that quantifies the impact of the enabled security feature on the health of the legacy applications on the client systems within the subset; determines, based on the health-impact score that quantifies the impact of the enabled security feature, whether to roll out the security-feature-enablement rule to the plurality of client systems at least in part by determining whether, on average, the security-feature-enablement rule negatively impacted the health of legacy applications on the client systems within the subset. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable-storage-medium containing instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify a plurality of client systems; identify a subset of the plurality of client systems that is designated to test security features for legacy applications; transmit a security-feature-enablement rule to each client system in the subset that, when executed, enables a security feature available on the client system; receive, from each client system in the subset, health-impact information that identifies the impact, on the health of a legacy application on the client system, of executing the security-feature-enablement rule to enable the security feature; identify a health-impact score that quantifies the impact of the enabled security feature on the health of the legacy applications on the client systems within the subset; determine, based on the health-impact score that quantifies the impact of the enabled security feature, whether to roll out the security-feature-enablement rule to the plurality of client systems at least in part by determining whether, on average, the security-feature-enablement rule negatively impacted the health of legacy applications on the client systems within the subset.
-
Specification