Updating rescue software
First Claim
1. A method of updating rescue software that includes an operating system for managing execution of programs, the method comprising:
- (a) identifying a source where a software update to the rescue software may be obtained;
(b) determining whether the software update originates from a trusted entity; and
(c) if the software update originates from a trusted entity, applying the software update to the rescue software.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention causes rescue software to be updated when a secondary operating system is “booted” from a rescue disk. Aspects of the present invention may cause a computer to be “booted” using the rescue software when a user turns on a computer. Once the computer is booted using the rescue software, a source where a software update to the rescue software may be obtained is identified. Then, a determination is made regarding whether the software update originates from a trusted entity. In instances when the software update originates from a trusted entity, the rescue software is updated with one or more software updates.
47 Citations
20 Claims
-
1. A method of updating rescue software that includes an operating system for managing execution of programs, the method comprising:
-
(a) identifying a source where a software update to the rescue software may be obtained;
(b) determining whether the software update originates from a trusted entity; and
(c) if the software update originates from a trusted entity, applying the software update to the rescue software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A software system for updating rescue software that identifies malware on a computer, the rescue software comprising:
-
(a) an operating system for managing resources of the computer and executing application programs;
(b) a scan engine operative to search for data that is characteristic of malware;
(c) a signature database for storing signatures that uniquely identify malware; and
(d) an update routine operative to obtain malware signatures from a trusted entity and cause the signatures to be stored in the signature database. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable medium containing computer-readable instructions which, when executed in a computer, performs a method of updating rescue software that includes an operating system for managing execution of programs, the method comprising:
-
(a) identifying a source where a software update to the rescue software may be obtained;
(b) determining whether the software update originates from a trusted entity, including;
(i) assigning a digital signature to a component of the rescue software; and
(ii) determining whether a digital signature assigned to a component of the rescue software that is available from a trusted entity is valid;
(c) if the software update originates from the trusted entity, applying the software update to the rescue software; and
(d) conversely, if the software update does not originate from the trusted entity, preventing the software update from being applied to the rescue software. - View Dependent Claims (17, 18, 19, 20)
-
Specification