US20010014968A1 - Automatic upgrade of software - Google Patents

Automatic upgrade of software Download PDF

Info

Publication number
US20010014968A1
US20010014968A1 US09/119,824 US11982498A US2001014968A1 US 20010014968 A1 US20010014968 A1 US 20010014968A1 US 11982498 A US11982498 A US 11982498A US 2001014968 A1 US2001014968 A1 US 2001014968A1
Authority
US
United States
Prior art keywords
upgrade
operating system
software component
computer system
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/119,824
Other versions
US6418555B2 (en
Inventor
Mannan A. Mohammed
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to US09/119,824 priority Critical patent/US6418555B2/en
Assigned to INTEL CORPORATION reassignment INTEL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOHAMMED, MANNAN A.
Publication of US20010014968A1 publication Critical patent/US20010014968A1/en
Application granted granted Critical
Publication of US6418555B2 publication Critical patent/US6418555B2/en
Adjusted expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Definitions

  • the invention relates to the automatic upgrade of software in a computer system.
  • Windows operating systems that provide an environment in a computer system in which application programs can run.
  • One family of operating systems includes the different versions of the Windows operating systems provided by Microsoft Corporation.
  • Windows operating systems that are currently available include Windows 95, Windows 98, and Windows NT.
  • Examples of other common operating systems used include the Unix operating system and the OS/2 operating system.
  • the invention features a system including a program executable in the system to automatically upgrade a software component if an operating system has been upgraded.
  • FIG. 1 is a block diagram of software levels in a computer system.
  • FIG. 2 is a flow diagram of a background module according to an embodiment of the invention that detects an operating system upgrade.
  • FIGS. 3 A- 3 C are a more detailed flow diagram of the background module of FIG. 1.
  • FIG. 4 is a flow diagram of an upgrade module according to an embodiment of the invention invoked by the background module to upgrade software when an operating system upgrade occurs.
  • FIG. 5 is a block diagram of an example computer system incorporating an embodiment of the invention.
  • FIG. 6 is a block diagram of an example digital imaging system that includes the computer system of FIG. 5.
  • FIG. 7 illustrates an example, generic installation file.
  • an upgrade program 160 may be loaded in a computer system 14 (which may be a stand-alone computer or some other system, such as a digital imaging system) that is configured to detect an operating system 152 upgrade and to upgrade software components to work with the new operating system.
  • upgrading a software component includes replacing the software component, updating the component, or both.
  • the upgrade program 160 includes a detection module 154 running in the background and an upgrade module 156 that upgrades software components when an operating system upgrade is detected.
  • the detection module 154 may be configured to detect an operating system upgrade each time the system is booted and to invoke the upgrade module if an operating system upgrade is detected.
  • the upgrade program 162 may also alternatively be configured as one module that runs in the system 14 to perform the detection and upgrade tasks.
  • one or more application programs 150 and device drivers 158 may be running in the system 14 .
  • the device drivers 158 may act as the interface between one or more input/output (I/O) controllers 162 and the operating system 152 .
  • a database 166 (such as the registry in the Windows operating system) may also be used with the operating system 152 to store configuration settings for components in the computer system 14 .
  • the detection module 154 may be a service daemon that is invoked every time the system is started.
  • the service daemon may be registered with the operating system 152 .
  • the upgrade module 156 may be a self-extracting executable that has various components of software (such as different versions of device drivers, dynamic link library or DLL files, installation files such as “INF” files, and so forth) embedded in it.
  • the software components may be separately stored in one or more storage media in the computer system 14 .
  • the upgrade module 156 may also be implemented as a dynamic link library file.
  • the detection module 154 determines (at 102 ) the version of the current operating system 152 , referred to as the current OS platform.
  • the detection module checks (at 104 ) the operating system version (software OS platform) under which the currently installed software components were loaded. A comparison of the current OS platform and the software OS platform is then made (at 106 ). If the current OS platform is the same as the software OS platform (indicating an operating system upgrade has not occurred), the detection module 154 exits without performing a software upgrade.
  • the detection module 154 detects that the software OS platform is different than the current OS platform (indicating that an operating system upgrade has occurred)
  • an upgrade command is issued (at 108 ) to invoke the upgrade module 156 .
  • software components include device drivers, DLL files, installation files and other low-level software components.
  • target components One or more of these target components may have to be upgraded when the operating system is upgraded to ensure that the device drivers and other software modules will work in the new operating system. It is to be understood, however, that the software upgrade process described may be applied to any number of software components that may be loaded in the system.
  • the detection module 154 waits until the upgrade has completed (step 110 ), at which point the detection module 154 may optionally cause the computer system 14 to reboot (at 112 ) so that the device drivers or other software modules for the newly installed operating system can be reloaded.
  • certain setup steps are performed which include updating entries in the registry 166 .
  • One registry entry update that may be performed during installation of the upgrade program is the creation of certain keys including a special upgrade key under which several entries may be set.
  • the entries may include a Platform entry, a Restart entry, and a Command entry.
  • the Platform entry may have a value that indicates the software OS platform for which the currently installed software components are configured.
  • the Restart entry may have a value that indicates whether a reboot should be automatically performed after software upgrade occurs.
  • the Command entry may specify the command line to invoke when an operating system upgrade is detected.
  • the Platform entry may be one of several values to represent the several possible operating systems that may be loaded in the system, including a value representing Windows 95, a value representing Windows 98, and a value representing Windows NT.
  • the Restart entry has a value that may indicate whether a hidden restart is to be performed (the computer will reboot the computer without warning the user), a value that advises and the user to restart the computer, and a value that forces the user to restart the system after issuing a message.
  • the Command entry holds the command line executable in the Windows operating system which may include a command to invoke the upgrade module 156 .
  • the detection module 154 first retrieves the current version of the operating system (current OS platform) and stores the value in a parameter NewPlatform (step 306 ).
  • the method that may be used to retrieve the current OS platform is GetVersionEx(&osVersionlnfo).
  • the detection module 154 retrieves a value representing the operating system platform (software OS platform, which may be stored in the operating system registry) under which software was loaded and stores the retrieved value into a parameter OrigPlatform (step 308 ).
  • the software OS platform registry entry may not be present, since it is possible for a user to install application software (in a host system) without associated device drivers being loaded.
  • an application program may be used in conjunction with a peripheral device (e.g., a digital camera). If the peripheral device is not plugged into the host system when the application program is installed into the host system, the necessary drivers may not be loaded.
  • the detection module 154 checks (at 312 ) the current OS platform value, NewPlatform. The target components corresponding to the new platform are then loaded (at 314 ) in the appropriate locations to properly set up the corresponding device drivers and other software modules.
  • INF files special initialization or installation files
  • An INF file may include such information as the vendor ID and device ID of an associated device driver.
  • Other configuration information that may be stored in the INF file include preference and parameters settings of the device driver.
  • the appropriate INF files may be copied to a preselected directory (e.g., Windows ⁇ INF) and corresponding registry entries may be updated.
  • a preselected directory e.g., Windows ⁇ INF
  • FIG. 7 An exemplary, generic INF file is illustrated in FIG. 7.
  • the OS platform registry entry is present (as determined at 310 ), then a check is performed (at 316 ) to compare the values of NewPlatform and OrigPlatform. If the values are equal, that indicates that the current OS platform is the same operating system under which components in the system 14 software were loaded. Consequently, the loaded software components are likely to be compatible with the current OS platform, with at least one exception. If the user upgrades the operating system but then uninstalls the new operating system back to the original operating system, the values of NewPlatform and OrigPlatform may be the same but the incorrect version of the target components may be loaded in the preselected directory. When the new operating system is uninstalled, the registry entries are typically restored back to the settings of the original operating system, but the target components may not be updated. To ensure that the correct target components are residing in the preselected directory, blocks 312 and 314 are performed to update the target components of the current OS platform.
  • the detection module 154 in the illustrated embodiment next checks (at 318 ) to determine when the last software upgrade was attempted. This may be done by looking at a specified parameter (LastPrompt) that contains the date and time that the user was last prompted to upgrade the software in response to an operating system upgrade.
  • the detection module 154 may be prompted by the detection module 154 whether to upgrade or not software components loaded in the system 14 to work with the new operating system. The user may refuse, in which event the detection module 154 may periodically prompt the user to upgrade. A predetermined length of time (e.g., one week) between prompts may be set.
  • the detection module 154 exits. However, if this is the first time through the upgrade process (user has not previously been notified of an operating system upgrade), or if the time since the last prompt is greater than the predetermined period, the detection module 154 in the illustrated embodiment then prompts the user to accept or decline (at 322 ) the upgrade of the loaded software because an operating system upgrade has been detected. If the user declines the software upgrade, the detection module 154 updates the value of LastPrompt (at 324 ) and exits.
  • the detection module 154 may display certain messages (at 325 ) to indicate that the upgrade process is taking place.
  • the upgraded software components are associated with a peripheral device, such as a digital camera, the user may be prompted to disconnect the peripheral device from the host computer system before the software upgrade takes place.
  • unplugging of the peripheral device is required because, while the peripheral device remains plugged in, the associated device drivers are loaded and running in the operating system. This may cause the device drivers to be locked by the operating system, which may prevent upgrade of associated components.
  • the upgrade program 160 allows the user to make the decision of whether to perform the software upgrade or not.
  • user interaction may be bypassed and automatic software upgrade may be performed by the upgrade program.
  • the detection module 154 next retrieves (at 326 ) the command line, which may be stored in the Command entry of the operating system registry 166 that is used to invoke the upgrade module 156 .
  • the detection module 154 also appends (at 328 ) two arguments to the command line: OrigPlatform and NewPlatform.
  • the upgrade module 156 is thus invoked to perform the software upgrade.
  • the detection module 154 at this point may optionally indicate to the user that the upgrade process is occurring while it waits (at 330 ) for the upgrade process to complete or time out due to a failure. At that time, the detection module 154 retrieves (at 332 ) the registry entry for the software OS platform and loads it into OrigPlatform. Next, the detection module compares (at 334 ) the parameters OrigPlatform and NewPlatform. If they remain unequal, then the software OS platform registry entry has not changed because the upgrade process has failed. The detection module 154 then exits. However, if OrigPlatform and NewPlatform contain the same value (as determined at 334 ), then the software upgrade was successful.
  • the detection module 154 next retrieves (at 336 ) the Restart entry from the registry.
  • the Restart entry may have three possible values: 0 to force the user to restart but displaying a message to indicate that the system is about to restart; 1 to prompt the user to restart the user may agree or decline; and 3 to perform a hidden restart (in which the user is not notified).
  • the detection module displays (at 340 ) the dialog box indicating to the user that the system should be rebooted and giving the user the option to do so. If the restart value is equal to 2 (as determined at 342 ), then a hidden restart is performed. However, if the restart value is 0, then a message box is displayed (at 344 ) to the user before the system is automatically started.
  • the upgrade module determines (at 202 ) the type of upgrade to be performed as indicated by Table 1 below.
  • Table 1 Software OS Platform Current OS Platform Upgrade 1.
  • the first column indicates the software OS Platform (the platform under which the current software components were loaded), the second column indicates the current OS Platform (the currently running operating system, which may be newly installed), and the third column indicates the upgrade to be performed.
  • the software OS Platform is Windows 95 while the current OS Platform is Windows 98, then the software may be upgraded to be compatible with Windows 98.
  • the software OS Platform is Windows 95 and the current OS Platform is Windows NT, then the software is upgraded to be compatible with either Windows 98 or Windows NT, since certain software components that are compatible with Windows 98 may be compatible with Windows NT, and vice versa.
  • Rows 3 and 4 represent the cases where the Windows 98 and Windows NT operating systems are changed back to the Windows 95 operating system, respectively. In all other cases, according to one embodiment, no upgrade is required.
  • the upgrade module 156 determines (at 204 ) if an upgrade is required. If not, the upgrade module 156 exits. If an upgrade is required, then the target components are updated or replaced. Blocks 206 - 220 described below illustrate one embodiment of what is performed during the upgrade.
  • the device drivers, dynamic link library (DLL) files, and other low-level software components for the different versions of operation systems are already loaded in the computer system 14 .
  • different versions of device drivers, DLL Files, and other components that are compatible with different operating systems may all be kept in the computer system without adversely affecting operation.
  • these components are already available and thus only certain components need be upgraded, such as replacing and updating one or more INF files and updating the registry entries.
  • unused versions of software components may be maintained in the system but stored in a compressed format to maximize system storage capacity.
  • the current one or more INF files that need to be upgraded may be copied (at 206 ) to a temporary location.
  • the upgrade module 156 finds (at 208 ) the location and name of the INF files associated with the currently installed operating system.
  • Custom information stored in the original INF files (labeled as “localizable settings” in FIG. 7) may be copied (at 210 ) to corresponding new INF files.
  • the registry entries may be updated next (at 212 ) by deleting all entries associated with the software components that are to be upgraded. This may be done, for example, by invoking an uninstall routine associated with the software components that are to be upgraded. The uninstall routine may automatically remove the old registry entries.
  • the upgrade module 156 may delete (at 214 ) several types of information, including the old INF files as well as certain keys stored in the registry associated with the old device drivers.
  • the system INF database associated with the device drivers may also be deleted.
  • the system INF database is created by the operating system 152 and may include information from all the active INF files stored in the system.
  • the system INF database location is retrieved (at 218 ) from the registry 166 .
  • the platform type entry in the registry 166 is then set (at 218 ) to the value of the newly loaded operating system, in this case NewPlatform.
  • the upgrade module 156 creates (at 220 ) a new INF database from the information in the new INF files. Once the new INF database is created, the new version of the device drivers and other modules have been successfully set up. When the computer is restarted, the new device drivers are loaded into the operating system based on information in the new INF database.
  • a computer 14 may include a microprocessor 80 that runs the upgrade program 16 according to embodiments of the invention.
  • the system memory 88 , the microprocessor 80 , and a bridge/system controller circuitry 84 are all coupled to a host bus 82 .
  • the bridge circuitry 84 provides an interface from the host bus 82 to a downstream bus 99 that is coupled to an I/O controller 90 and a network interface card at 92 , as examples.
  • the computer 14 may also have, as examples a CD-ROM or DVD-ROM drive 100 , a floppy disk drive 94 , and/or a hard disk drive 96 .
  • the upgrade program 16 may be stored on a suitable mass storage medium such as the CD-ROM or DVD-ROM drive 100 , the floppy disk drive 194 , or the hard disk drive 96 . During execution, the program 16 or portions of the program 16 may be loaded into the system memory 88 for execution by the microprocessor 80 .
  • the computer system 14 may be used in a digital imaging system 10 that may include a digital camera 12 used to capture optical images 11 .
  • the camera 12 transmits streams of data representing the images to a computer 14 over a communication link 15 (which may be a serial link, for example) through a port of the computer system 14 .
  • Application programs may be loaded in the computer 14 that are used to process images captured by the digital camera 12 and transmitted to the computer 14 . These application programs may be associated with device drivers that act as the interface to the computer port that connects to the digital camera 12 .

Abstract

A computer system includes an operating, a software component, and a program executable in the system to automatically upgrade the software component if it detects that the operating system has been upgraded from a previous version. The program may include a detection module that monitors for an operating system upgrade and an upgrade module that upgrades the software component if an operating system upgrade has been detected.

Description

    BACKGROUND
  • The invention relates to the automatic upgrade of software in a computer system. [0001]
  • Many different types of operating systems exist that provide an environment in a computer system in which application programs can run. One family of operating systems includes the different versions of the Windows operating systems provided by Microsoft Corporation. Windows operating systems that are currently available include Windows 95, Windows 98, and Windows NT. Examples of other common operating systems used include the Unix operating system and the OS/2 operating system. [0002]
  • When users upgrade their operating systems from one version to another (such as from Windows 95 to Windows 98 or from Windows 95 to Windows NT), many software components that were installed in the computer system under the original operating system may not work with the newly loaded operating system. Thus, the user may need to manually remove the original software components and reinstall new versions of the software components or otherwise manually perform other tasks to make the software components work with the newly loaded operating system. [0003]
  • With some operating systems, many high level application programs may be able to run without recompilation on different versions of the operating systems. In the Windows operating system, for example, such application programs are typically the user-mode or Ring 3 applications. However, certain other software components in a system, such as kernel mode or Ring 0 routines or modules (which include device drivers, dynamic link libraries, and so forth) are rarely compatible between different versions of operating systems. Thus, when a user migrates from one operating system to another, such low level software components may need to be re-installed manually in the system by the user. To do so, the user typically needs to find the diskette or CD-ROM on which such software components are stored and to manually load the components into the system. [0004]
  • Thus, there exists a need in which software components are automatically upgraded when a system migrates from one operating system to another. [0005]
  • SUMMARY
  • In general, the invention according to one embodiment features a system including a program executable in the system to automatically upgrade a software component if an operating system has been upgraded. [0006]
  • Other features will become apparent from the following description and from the claims. [0007]
  • BRIEF DESCRIPTION OF THE DRAWING
  • FIG. 1 is a block diagram of software levels in a computer system. [0008]
  • FIG. 2 is a flow diagram of a background module according to an embodiment of the invention that detects an operating system upgrade. [0009]
  • FIGS. [0010] 3A-3C are a more detailed flow diagram of the background module of FIG. 1.
  • FIG. 4 is a flow diagram of an upgrade module according to an embodiment of the invention invoked by the background module to upgrade software when an operating system upgrade occurs. [0011]
  • FIG. 5 is a block diagram of an example computer system incorporating an embodiment of the invention. [0012]
  • FIG. 6 is a block diagram of an example digital imaging system that includes the computer system of FIG. 5. [0013]
  • FIG. 7 illustrates an example, generic installation file. [0014]
  • DETAILED DESCRIPTION
  • Referring to FIG. 1, according to some embodiments of the invention, an [0015] upgrade program 160 may be loaded in a computer system 14 (which may be a stand-alone computer or some other system, such as a digital imaging system) that is configured to detect an operating system 152 upgrade and to upgrade software components to work with the new operating system. In this description, upgrading a software component includes replacing the software component, updating the component, or both.
  • In one embodiment, the [0016] upgrade program 160 includes a detection module 154 running in the background and an upgrade module 156 that upgrades software components when an operating system upgrade is detected. The detection module 154 may be configured to detect an operating system upgrade each time the system is booted and to invoke the upgrade module if an operating system upgrade is detected. The upgrade program 162 may also alternatively be configured as one module that runs in the system 14 to perform the detection and upgrade tasks.
  • In addition, one or [0017] more application programs 150 and device drivers 158 may be running in the system 14. The device drivers 158 may act as the interface between one or more input/output (I/O) controllers 162 and the operating system 152. A database 166 (such as the registry in the Windows operating system) may also be used with the operating system 152 to store configuration settings for components in the computer system 14.
  • The following description is provided for software upgrades performed in Windows operating systems. However, it is contemplated that embodiments of the invention may be applied to software upgrades involving other types of operating systems, such as the Unix operating system and the OS/2 operating system. [0018]
  • In one embodiment, the [0019] detection module 154 may be a service daemon that is invoked every time the system is started. The service daemon may be registered with the operating system 152. The upgrade module 156 may be a self-extracting executable that has various components of software (such as different versions of device drivers, dynamic link library or DLL files, installation files such as “INF” files, and so forth) embedded in it. Alternatively, the software components may be separately stored in one or more storage media in the computer system 14. The upgrade module 156 may also be implemented as a dynamic link library file.
  • Referring to FIG. 2, a general flow of the [0020] detection module 154 is illustrated. On system startup, the detection module 154 determines (at 102) the version of the current operating system 152, referred to as the current OS platform. Next, the detection module checks (at 104) the operating system version (software OS platform) under which the currently installed software components were loaded. A comparison of the current OS platform and the software OS platform is then made (at 106). If the current OS platform is the same as the software OS platform (indicating an operating system upgrade has not occurred), the detection module 154 exits without performing a software upgrade.
  • However, if the [0021] detection module 154 detects that the software OS platform is different than the current OS platform (indicating that an operating system upgrade has occurred), then an upgrade command is issued (at 108) to invoke the upgrade module 156. Examples of some software components that may be upgraded include device drivers, DLL files, installation files and other low-level software components. In the ensuing description, such software components are referred to collectively as “target components.” One or more of these target components may have to be upgraded when the operating system is upgraded to ensure that the device drivers and other software modules will work in the new operating system. It is to be understood, however, that the software upgrade process described may be applied to any number of software components that may be loaded in the system.
  • The [0022] detection module 154 waits until the upgrade has completed (step 110), at which point the detection module 154 may optionally cause the computer system 14 to reboot (at 112) so that the device drivers or other software modules for the newly installed operating system can be reloaded.
  • In one embodiment, when the [0023] detection module 154 is initially installed into the system, certain setup steps are performed which include updating entries in the registry 166. One registry entry update that may be performed during installation of the upgrade program is the creation of certain keys including a special upgrade key under which several entries may be set. The entries may include a Platform entry, a Restart entry, and a Command entry. The Platform entry may have a value that indicates the software OS platform for which the currently installed software components are configured. The Restart entry may have a value that indicates whether a reboot should be automatically performed after software upgrade occurs. The Command entry may specify the command line to invoke when an operating system upgrade is detected.
  • According to one embodiment, the Platform entry may be one of several values to represent the several possible operating systems that may be loaded in the system, including a value representing Windows 95, a value representing Windows 98, and a value representing Windows NT. The Restart entry has a value that may indicate whether a hidden restart is to be performed (the computer will reboot the computer without warning the user), a value that advises and the user to restart the computer, and a value that forces the user to restart the system after issuing a message. The Command entry holds the command line executable in the Windows operating system which may include a command to invoke the [0024] upgrade module 156.
  • Referring to FIGS. [0025] 3A-3C, a more detailed flow diagram of the detection module 154 according to one embodiment is illustrated. The detection module 154 first retrieves the current version of the operating system (current OS platform) and stores the value in a parameter NewPlatform (step 306). In the Windows operating system, the method that may be used to retrieve the current OS platform is GetVersionEx(&osVersionlnfo). Next, the detection module 154 retrieves a value representing the operating system platform (software OS platform, which may be stored in the operating system registry) under which software was loaded and stores the retrieved value into a parameter OrigPlatform (step 308).
  • The software OS platform registry entry may not be present, since it is possible for a user to install application software (in a host system) without associated device drivers being loaded. For example, an application program may be used in conjunction with a peripheral device (e.g., a digital camera). If the peripheral device is not plugged into the host system when the application program is installed into the host system, the necessary drivers may not be loaded. Thus, if the platform registry entry is not present (as determined at [0026] 310), the detection module 154 checks (at 312) the current OS platform value, NewPlatform. The target components corresponding to the new platform are then loaded (at 314) in the appropriate locations to properly set up the corresponding device drivers and other software modules.
  • Under the Windows operating systems, special initialization or installation files (referred to as “INF files”) may be created to install programs (including applications and device drivers) in the system. An INF file may include such information as the vendor ID and device ID of an associated device driver. Other configuration information that may be stored in the INF file include preference and parameters settings of the device driver. To properly set up the device driver, the appropriate INF files, may be copied to a preselected directory (e.g., Windows\INF) and corresponding registry entries may be updated. An exemplary, generic INF file is illustrated in FIG. 7. [0027]
  • If the OS platform registry entry is present (as determined at [0028] 310), then a check is performed (at 316) to compare the values of NewPlatform and OrigPlatform. If the values are equal, that indicates that the current OS platform is the same operating system under which components in the system 14 software were loaded. Consequently, the loaded software components are likely to be compatible with the current OS platform, with at least one exception. If the user upgrades the operating system but then uninstalls the new operating system back to the original operating system, the values of NewPlatform and OrigPlatform may be the same but the incorrect version of the target components may be loaded in the preselected directory. When the new operating system is uninstalled, the registry entries are typically restored back to the settings of the original operating system, but the target components may not be updated. To ensure that the correct target components are residing in the preselected directory, blocks 312 and 314 are performed to update the target components of the current OS platform.
  • If the values of NewPlatform and OrigPlatform are determined (at [0029] 316) to be not equal, indicating that an operating system upgrade has occurred, the detection module 154 in the illustrated embodiment next checks (at 318) to determine when the last software upgrade was attempted. This may be done by looking at a specified parameter (LastPrompt) that contains the date and time that the user was last prompted to upgrade the software in response to an operating system upgrade. When the operating system is upgraded, the user may be prompted by the detection module 154 whether to upgrade or not software components loaded in the system 14 to work with the new operating system. The user may refuse, in which event the detection module 154 may periodically prompt the user to upgrade. A predetermined length of time (e.g., one week) between prompts may be set.
  • If the user has previously been prompted for a software upgrade and the user declined, but the time from the last upgrade is less than the predetermined period (as determined at [0030] 320), then the detection module 154 exits. However, if this is the first time through the upgrade process (user has not previously been notified of an operating system upgrade), or if the time since the last prompt is greater than the predetermined period, the detection module 154 in the illustrated embodiment then prompts the user to accept or decline (at 322) the upgrade of the loaded software because an operating system upgrade has been detected. If the user declines the software upgrade, the detection module 154 updates the value of LastPrompt (at 324) and exits. However, if the user accepts the upgrade (at 322), the detection module 154 may display certain messages (at 325) to indicate that the upgrade process is taking place. As another example, if the upgraded software components are associated with a peripheral device, such as a digital camera, the user may be prompted to disconnect the peripheral device from the host computer system before the software upgrade takes place.
  • In some embodiments, unplugging of the peripheral device is required because, while the peripheral device remains plugged in, the associated device drivers are loaded and running in the operating system. This may cause the device drivers to be locked by the operating system, which may prevent upgrade of associated components. [0031]
  • In the illustrated embodiment, the [0032] upgrade program 160 allows the user to make the decision of whether to perform the software upgrade or not. In an alternative embodiment, user interaction may be bypassed and automatic software upgrade may be performed by the upgrade program.
  • Proceeding with the upgrade process, the [0033] detection module 154 next retrieves (at 326) the command line, which may be stored in the Command entry of the operating system registry 166 that is used to invoke the upgrade module 156. The detection module 154 also appends (at 328) two arguments to the command line: OrigPlatform and NewPlatform. The upgrade module 156 is thus invoked to perform the software upgrade.
  • The [0034] detection module 154 at this point may optionally indicate to the user that the upgrade process is occurring while it waits (at 330) for the upgrade process to complete or time out due to a failure. At that time, the detection module 154 retrieves (at 332) the registry entry for the software OS platform and loads it into OrigPlatform. Next, the detection module compares (at 334) the parameters OrigPlatform and NewPlatform. If they remain unequal, then the software OS platform registry entry has not changed because the upgrade process has failed. The detection module 154 then exits. However, if OrigPlatform and NewPlatform contain the same value (as determined at 334), then the software upgrade was successful. The detection module 154 next retrieves (at 336) the Restart entry from the registry. In one example, the Restart entry may have three possible values: 0 to force the user to restart but displaying a message to indicate that the system is about to restart; 1 to prompt the user to restart the user may agree or decline; and 3 to perform a hidden restart (in which the user is not notified).
  • Thus, if the Restart entry contains the [0035] value 1, the detection module displays (at 340) the dialog box indicating to the user that the system should be rebooted and giving the user the option to do so. If the restart value is equal to 2 (as determined at 342), then a hidden restart is performed. However, if the restart value is 0, then a message box is displayed (at 344) to the user before the system is automatically started.
  • Referring to FIG. 4, steps of the [0036] upgrade module 156 are illustrated. First, the upgrade module determines (at 202) the type of upgrade to be performed as indicated by Table 1 below.
    TABLE 1
    Software OS
    Platform Current OS Platform Upgrade
    1. Windows 95 Windows 98 Windows 98
    2. Windows 95 Windows NT Windows 98 or
    Windows NT
    3. Windows 98 Windows 95 Windows 95
    4. Windows NT Windows 95 Windows 95
    5. All Other All Other No Change
  • In Table 1, the first column indicates the software OS Platform (the platform under which the current software components were loaded), the second column indicates the current OS Platform (the currently running operating system, which may be newly installed), and the third column indicates the upgrade to be performed. For example, in [0037] row 1, if the software OS Platform is Windows 95 while the current OS Platform is Windows 98, then the software may be upgraded to be compatible with Windows 98. As another example, in row 2, if the software OS Platform is Windows 95 and the current OS Platform is Windows NT, then the software is upgraded to be compatible with either Windows 98 or Windows NT, since certain software components that are compatible with Windows 98 may be compatible with Windows NT, and vice versa. Rows 3 and 4 represent the cases where the Windows 98 and Windows NT operating systems are changed back to the Windows 95 operating system, respectively. In all other cases, according to one embodiment, no upgrade is required.
  • Based on the values of NewPlatform and OrigPlatform, the [0038] upgrade module 156 determines (at 204) if an upgrade is required. If not, the upgrade module 156 exits. If an upgrade is required, then the target components are updated or replaced. Blocks 206-220 described below illustrate one embodiment of what is performed during the upgrade.
  • In the illustrated embodiment of the [0039] upgrade module 156 according to FIG. 4, the device drivers, dynamic link library (DLL) files, and other low-level software components for the different versions of operation systems (e.g., Window 95, Windows 98, and Windows NT) are already loaded in the computer system 14. With some operating systems, different versions of device drivers, DLL Files, and other components that are compatible with different operating systems may all be kept in the computer system without adversely affecting operation. Thus, when an operating system upgrade occurs, these components are already available and thus only certain components need be upgraded, such as replacing and updating one or more INF files and updating the registry entries.
  • Alternatively, it may be desirable to only keep one version of the software components in the system, in which case old versions are removed and new versions are added during the software upgrade. In yet another alternative embodiment, unused versions of software components may be maintained in the system but stored in a compressed format to maximize system storage capacity. [0040]
  • Referring again to the illustrated embodiment of FIG. 4, the current one or more INF files that need to be upgraded may be copied (at [0041] 206) to a temporary location. Next, the upgrade module 156 finds (at 208) the location and name of the INF files associated with the currently installed operating system. Custom information stored in the original INF files (labeled as “localizable settings” in FIG. 7) may be copied (at 210) to corresponding new INF files. The registry entries may be updated next (at 212) by deleting all entries associated with the software components that are to be upgraded. This may be done, for example, by invoking an uninstall routine associated with the software components that are to be upgraded. The uninstall routine may automatically remove the old registry entries.
  • Next, the [0042] upgrade module 156 may delete (at 214) several types of information, including the old INF files as well as certain keys stored in the registry associated with the old device drivers. The system INF database associated with the device drivers may also be deleted. The system INF database is created by the operating system 152 and may include information from all the active INF files stored in the system.
  • Next, the system INF database location is retrieved (at [0043] 218) from the registry 166. The platform type entry in the registry 166 is then set (at 218) to the value of the newly loaded operating system, in this case NewPlatform. Next, the upgrade module 156 creates (at 220) a new INF database from the information in the new INF files. Once the new INF database is created, the new version of the device drivers and other modules have been successfully set up. When the computer is restarted, the new device drivers are loaded into the operating system based on information in the new INF database.
  • After the software upgrade is performed, the user is able to use the loaded software with the new operating system. One advantage offered by embodiments of the invention is that during the entire upgrade process, the user is never prompted for a CD-ROM or a floppy diskette containing a new version of the software. As a result, use of the software in the [0044] computer system 14 even when an operating system is upgraded is made more convenient. A further advantage offered by embodiments of the invention is that automatic detection of an operating system upgrade and automatic upgrade of software components are performed.
  • Referring to FIG. 5, in some embodiments, a [0045] computer 14 may include a microprocessor 80 that runs the upgrade program 16 according to embodiments of the invention. The system memory 88, the microprocessor 80, and a bridge/system controller circuitry 84 are all coupled to a host bus 82. The bridge circuitry 84 provides an interface from the host bus 82 to a downstream bus 99 that is coupled to an I/O controller 90 and a network interface card at 92, as examples. The computer 14 may also have, as examples a CD-ROM or DVD-ROM drive 100, a floppy disk drive 94, and/or a hard disk drive 96.
  • According to some embodiments, the [0046] upgrade program 16 may be stored on a suitable mass storage medium such as the CD-ROM or DVD-ROM drive 100, the floppy disk drive 194, or the hard disk drive 96. During execution, the program 16 or portions of the program 16 may be loaded into the system memory 88 for execution by the microprocessor 80.
  • Referring to FIG. 6, in some embodiments, the [0047] computer system 14 may be used in a digital imaging system 10 that may include a digital camera 12 used to capture optical images 11. The camera 12 transmits streams of data representing the images to a computer 14 over a communication link 15 (which may be a serial link, for example) through a port of the computer system 14. Application programs may be loaded in the computer 14 that are used to process images captured by the digital camera 12 and transmitted to the computer 14. These application programs may be associated with device drivers that act as the interface to the computer port that connects to the digital camera 12.
  • Other embodiments are also within the scope with the following claims. Although embodiments of the invention have been described in connection with the Windows operating system, the automatic upgrade process described can also be applied to other types of operating systems. [0048]
  • While the present invention has been described with respect to a limited number of embodiments, those skilled in the art will appreciate numerous modifications and variations therefrom. It is intended that the appended claims cover all such modifications and variations as fall within the true spirit and scope of the present invention. [0049]
  • What is claimed is: [0050]

Claims (26)

1. A computer system, comprising:
an operating system;
a software component; and
a program executable in the computer system to detect if the operating system has been upgraded from a previous version and to automatically upgrade the software component if so.
2. The computer system of
claim 1
, wherein the program includes a detection module that monitors for an operating system upgrade.
3. The computer system of
claim 2
, wherein the detection module is invoked at each system startup.
4. The computer system of
claim 1
, wherein the program includes an upgrade module that upgrades the software component if an operating system upgrade has been detected.
5. The computer system of
claim 4
, wherein the program includes a detection module to detect an operating system upgrade, the detection module invoking the upgrade module if the operating system upgrade is detected.
6. The computer system of
claim 1
, wherein the program includes a service daemon that detects an operating system upgrade.
7. The computer system of
claim 1
, wherein the program includes a dynamic link library file.
8. The computer system of
claim 1
, wherein the software component includes a device driver.
9. The computer system of
claim 1
wherein the operating system includes a Windows operating system.
10. The computer system of
claim 9
, wherein the software component includes an INF file.
11. The computer system of
claim 1
, wherein the software component includes an installation file associated with the software component.
12. The computer system of
claim 1
1, wherein the program is executable to copy an installation file associated with the upgraded operating system to a preselected directory.
13. An article comprising a storage medium containing a program executable in a computer system running an operating system, the program comprising:
a first module running in the computer system to detect if the operating system has been upgraded from a previous version; and
a second module invoked by the first module to automatically upgrade at least a software component if the first module detects an operating system upgrade.
14. The article of
claim 13
, wherein the first module runs in the background.
15. The article of
claim 13
, wherein the second module upgrades low-level software components when an operating upgrade is detected.
16. The article of
claim 15
, wherein the low-level software component includes a device driver.
17. The article of
claim 15
, wherein the low-level software component includes an INF file.
18. The article of
claim 17
, wherein the low-level software component includes an installation file associated with the software component that is copied to a preselected location.
19. The article of
claim 13
, wherein the operating system includes a Windows operating system.
20. A method of upgrading software in a computer system comprising:
running a first module to detect an operating system upgrade; and
automatically upgrading at least one predetermined software component in response to detection of the operating system upgrade.
21. The method of
claim 20
, wherein the at least one software component includes one or more files associated with one or more device drivers.
22. The method of
claim 20
, wherein the files include installation files.
23. The method of
claim 20
, wherein the installation files include INF files.
24. The method of
claim 20
, wherein the software component includes an operating system registry.
25. The method of
claim 20
, further comprising:
the first module invoking an upgrade module to upgrade the predetermined software component.
26. The method of
claim 20
, further comprising:
retrieving information already stored in the computer system to upgrade the software component.
US09/119,824 1998-07-21 1998-07-21 Automatic upgrade of software Expired - Lifetime US6418555B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/119,824 US6418555B2 (en) 1998-07-21 1998-07-21 Automatic upgrade of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/119,824 US6418555B2 (en) 1998-07-21 1998-07-21 Automatic upgrade of software

Publications (2)

Publication Number Publication Date
US20010014968A1 true US20010014968A1 (en) 2001-08-16
US6418555B2 US6418555B2 (en) 2002-07-09

Family

ID=22386618

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/119,824 Expired - Lifetime US6418555B2 (en) 1998-07-21 1998-07-21 Automatic upgrade of software

Country Status (1)

Country Link
US (1) US6418555B2 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6389591B1 (en) * 1998-09-03 2002-05-14 Microsoft Corporation Method and apparatus for determining preferred controls for an upgradable operating system
US6400471B1 (en) * 1999-02-11 2002-06-04 Flashpoint Technology, Inc. Flexible architecture for image processing
US20030097427A1 (en) * 2001-11-21 2003-05-22 Parry Travis J. Multiple device configuration and upgrade for imaging devices
US20040010786A1 (en) * 2002-07-11 2004-01-15 Microsoft Corporation System and method for automatically upgrading a software application
US20040221146A1 (en) * 2003-04-30 2004-11-04 International Business Machines Corporation Build time dynamic installation of drivers on cloned systems
US20050149923A1 (en) * 2002-05-28 2005-07-07 Sheng Lee System update protocol
US6931440B1 (en) * 1999-04-21 2005-08-16 Emc Corporation Method and apparatus for dynamically determining whether access to a resource connected to a computer has changed and determining how to access the resource with a new identifier
US7013455B1 (en) * 2000-10-19 2006-03-14 International Business Machines Corporation System for automatically altering environment variable to run proper executable file by removing references to all except one duplicate file in the path sequence
EP1659489A1 (en) * 2004-11-19 2006-05-24 VEGA Grieshaber KG System and method for determining a version mismatch between a device driver and a device software in a process control system
US7107329B1 (en) * 1999-05-21 2006-09-12 Lucent Technologies Inc. In networks of interconnected router nodes for routing data traffic, a method of and system for imperceptibly upgrading router node software and the like without traffic interruption
US20070028216A1 (en) * 2005-07-28 2007-02-01 Boss Gregory J Systems and methods for embedded application test suites
CN100345112C (en) * 2005-11-25 2007-10-24 中国科学院软件研究所 Member extending method for operating system
US20100083246A1 (en) * 2008-09-29 2010-04-01 Synopsys, Inc. System and method for verifying delivered software
US8102457B1 (en) 1997-07-09 2012-01-24 Flashpoint Technology, Inc. Method and apparatus for correcting aspect ratio in a camera graphical user interface
US8127232B2 (en) 1998-12-31 2012-02-28 Flashpoint Technology, Inc. Method and apparatus for editing heterogeneous media objects in a digital imaging device
US20130185708A1 (en) * 2012-01-13 2013-07-18 Oracle International Corporation Determining compatibility of an application with different versions of an operating system
US8677188B2 (en) 2007-06-20 2014-03-18 Microsoft Corporation Web page error reporting
US8874970B2 (en) * 2004-03-31 2014-10-28 Microsoft Corporation System and method of preventing a web browser plug-in module from generating a failure
US9224145B1 (en) 2006-08-30 2015-12-29 Qurio Holdings, Inc. Venue based digital rights using capture device with digital watermarking capability
US20160099955A1 (en) * 2014-10-02 2016-04-07 AVAST Software s.r.o. Cloud based reputation system for browser extensions and toolbars
US10089378B2 (en) * 2006-01-30 2018-10-02 Adobe Systems Incorporated Automatic asset versioning
CN109983442A (en) * 2016-11-14 2019-07-05 标致雪铁龙汽车股份有限公司 System and method for Emergency Maintenance vehicle computer
CN110377312A (en) * 2019-07-19 2019-10-25 北京小米移动软件有限公司 A kind of method for upgrading software, device and medium
TWI697776B (en) * 2018-04-12 2020-07-01 宏碁股份有限公司 Computer system, updating method thereof and computer program product
CN113296822A (en) * 2021-05-27 2021-08-24 北京思特奇信息技术股份有限公司 Dynamic library-based database system online upgrading method and system
CN114675861A (en) * 2022-04-07 2022-06-28 无锡市恒通电器有限公司 System software safety upgrading method of single-phase electric energy meter based on real-time operating system
CN116009912A (en) * 2022-12-26 2023-04-25 郑州云智信安安全技术有限公司 Construction method for automatically generating upgrade package aiming at private network environment

Families Citing this family (120)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6453334B1 (en) 1997-06-16 2002-09-17 Streamtheory, Inc. Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching
US7080371B1 (en) * 1998-03-03 2006-07-18 Siebel Systems, Inc. Method, system, apparatus and program product for distribution and instantiation of software upgrades
US7185332B1 (en) 1998-03-25 2007-02-27 Symantec Corporation Multi-tiered incremental software updating
US6725260B1 (en) * 1998-09-11 2004-04-20 L.V. Partners, L.P. Method and apparatus for configuring configurable equipment with configuration information received from a remote location
US6704864B1 (en) 1999-08-19 2004-03-09 L.V. Partners, L.P. Automatic configuration of equipment software
US6823388B1 (en) 1998-09-11 2004-11-23 L.V. Parners, L.P. Method and apparatus for accessing a remote location with an optical reader having a programmable memory system
US7379901B1 (en) 1998-09-11 2008-05-27 Lv Partners, L.P. Accessing a vendor web site using personal account information retrieved from a credit card company web site
PT1003313E (en) * 1998-09-11 2005-04-29 Two Way Media Ltd SUPPLY OF INTERACTIVE APPLICATIONS
US6868433B1 (en) 1998-09-11 2005-03-15 L.V. Partners, L.P. Input device having positional and scanning capabilities
US6636896B1 (en) 1998-09-11 2003-10-21 Lv Partners, L.P. Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet
US7392945B1 (en) 1998-09-11 2008-07-01 Lv Partners, L.P. Portable scanner for enabling automatic commerce transactions
US7440993B1 (en) 1998-09-11 2008-10-21 Lv Partners, L.P. Method and apparatus for launching a web browser in response to scanning of product information
US7386600B1 (en) 1998-09-11 2008-06-10 Lv Partners, L.P. Launching a web site using a personal device
US7191247B1 (en) 1998-09-11 2007-03-13 Lv Partners, Lp Method for connecting a wireless device to a remote location on a network
US6745234B1 (en) 1998-09-11 2004-06-01 Digital:Convergence Corporation Method and apparatus for accessing a remote location by scanning an optical code
US6671060B1 (en) * 1998-10-26 2003-12-30 Hewlett-Packard Development Company, L.P. Image forming system and method of operating an image forming system
US6832371B1 (en) * 1999-01-04 2004-12-14 Microsoft Corporation Method for automatically updating a computer registry
US6889376B1 (en) * 1999-05-12 2005-05-03 Treetop Ventures, Llc Method for migrating from one computer to another
US6742025B2 (en) * 1999-09-30 2004-05-25 International Business Machines Corp. System and method for server managed modification of operating system data stored within a network device
US6490723B1 (en) * 1999-11-30 2002-12-03 Dell Products L.P. Method and system for installing files in a computing system
US7401113B1 (en) * 1999-12-09 2008-07-15 Microsoft Corporations Printer driver identification for a remote printer
US6681392B1 (en) * 1999-12-15 2004-01-20 Lexmark International, Inc. Method and apparatus for remote peripheral software installation
ES2299546T3 (en) * 2000-02-08 2008-06-01 Ricoh Company, Ltd. DEVICE MANAGEMENT SYSTEM.
US6721949B1 (en) * 2000-03-27 2004-04-13 General Instrument Corporation Kernel abstraction layer for digital television set-top box firmware
US7526775B2 (en) * 2000-05-17 2009-04-28 Aol Llc, A Delaware Limited Liability Company Component installation tool
US7219332B2 (en) * 2000-07-07 2007-05-15 Microsoft Corporation Configuring software components(merge) with transformation component using configurable and non-configurable data elements
JP2002041292A (en) * 2000-07-13 2002-02-08 Internatl Business Mach Corp <Ibm> Computer recovery device
US6981252B1 (en) * 2000-07-14 2005-12-27 Symantec Corporation Method and apparatus for automatically uninstalling software on a network
US7103891B1 (en) * 2000-10-12 2006-09-05 Adaptec, Inc. Method and apparatus for establishing a profile table for host bus adapters
US6907597B1 (en) * 2000-10-13 2005-06-14 Ati International Srl Method and apparatus for constructing an executable program in memory
US20080021936A1 (en) * 2000-10-26 2008-01-24 Reynolds Mark L Tools and techniques for original digital files
US8250570B2 (en) * 2000-10-31 2012-08-21 Hewlett-Packard Development Company, L.P. Automated provisioning framework for internet site servers
US7124289B1 (en) 2000-10-31 2006-10-17 Opsware Inc. Automated provisioning framework for internet site servers
US20020082818A1 (en) 2000-10-31 2002-06-27 Glenn Ferguson Data model for automated server configuration
US7043524B2 (en) * 2000-11-06 2006-05-09 Omnishift Technologies, Inc. Network caching system for streamed applications
US6959320B2 (en) * 2000-11-06 2005-10-25 Endeavors Technology, Inc. Client-side performance optimization system for streamed applications
US20020083183A1 (en) * 2000-11-06 2002-06-27 Sanjay Pujare Conventionally coded application conversion system for streamed delivery and execution
US7062567B2 (en) 2000-11-06 2006-06-13 Endeavors Technology, Inc. Intelligent network streaming and execution system for conventionally coded applications
US8831995B2 (en) 2000-11-06 2014-09-09 Numecent Holdings, Inc. Optimized server for streamed applications
US6918113B2 (en) * 2000-11-06 2005-07-12 Endeavors Technology, Inc. Client installation and execution system for streamed applications
US7107330B1 (en) * 2000-11-09 2006-09-12 International Business Machines Corporation Data processing system and method for distributing a device driver to a plurality of client computer systems each executing different operating systems
US6981277B1 (en) * 2000-11-10 2005-12-27 International Business Machines Corporation Apparatus and method for conducting non-authentication task using workstation authentication system
US7451196B1 (en) 2000-12-15 2008-11-11 Stream Theory, Inc. Method and system for executing a software application in a virtual environment
US7647411B1 (en) 2001-02-26 2010-01-12 Symantec Corporation System and method for controlling distribution of network communications
WO2002069108A2 (en) 2001-02-26 2002-09-06 Eprivacy Group, Inc. System and method for controlling distribution of network communications
US7343415B2 (en) * 2001-03-29 2008-03-11 3M Innovative Properties Company Display of software notes indicating that content from a content provider site is available for display
US20020143900A1 (en) * 2001-03-29 2002-10-03 Kenner Martin A. Content recipient access to software notes posted at content provider site
US20020143618A1 (en) * 2001-03-29 2002-10-03 Kenner Martin A. Payment based content recipient access to software notes posted at content provider site
US7743147B2 (en) * 2001-04-20 2010-06-22 Hewlett-Packard Development Company, L.P. Automated provisioning of computing networks using a network database data model
US6889058B2 (en) * 2001-04-20 2005-05-03 Sony Corporation Set up logic for dual interface wireless IP communication device
FR2824646B1 (en) * 2001-05-09 2003-08-15 Canal Plus Technologies METHOD FOR SELECTING AN EXECUTABLE SOFTWARE IMAGE
KR100440950B1 (en) * 2001-06-30 2004-07-21 삼성전자주식회사 Method for upgrading software in network environment and network device thereof
US20030037325A1 (en) * 2001-08-17 2003-02-20 Hargrove David C. System and methods for automatically installing a correct software version from media containing multiple software versions
US7506097B2 (en) * 2001-09-25 2009-03-17 Caterpillar, Inc. Method and apparatus for installing data in a memory on a work machine
US6925640B2 (en) * 2001-10-12 2005-08-02 Sun Microsystems, Inc. Method and apparatus for extending a program element in a dynamically typed programming language
US6968183B2 (en) * 2001-11-02 2005-11-22 Telefonaktiebolaget Lm Ericsson (Publ) Determining a multi-module dependent parameter at a telecommunication node
US20030149970A1 (en) * 2002-01-23 2003-08-07 Vedvyas Shanbhogue Portable software for rolling upgrades
US20040015835A1 (en) * 2002-01-24 2004-01-22 Sasank Kotnur Dynamic distribution and integration of computer code objects
US6976252B2 (en) * 2002-05-17 2005-12-13 Hewlett-Packard Development Company, L.P. Systems and methods for driver installation
US7249174B2 (en) 2002-06-12 2007-07-24 Bladelogic, Inc. Method and system for executing and undoing distributed server change operations
AU2002368019A1 (en) * 2002-06-18 2003-12-31 Computer Associates Think, Inc. Methods and systems for managing enterprise assets
US7565419B1 (en) 2002-11-22 2009-07-21 Symantec Operating Corporation Conflict resolution in a peer to peer network
US7752618B2 (en) * 2002-12-05 2010-07-06 Samsung Electronics Co., Ltd. Apparatus and method for remote DLL linking of software upgrades for a wireless mobile station
US7475026B2 (en) * 2002-12-06 2009-01-06 Dell Products L.P. Method for information handling system consumables automated ordering
US8516470B1 (en) 2002-12-16 2013-08-20 Symantec Corporation Version upgrade via viral infection
JP3966179B2 (en) * 2003-01-06 2007-08-29 ブラザー工業株式会社 Driver software setting system, computer, driver software setting method, and program
JP4602644B2 (en) * 2003-03-28 2010-12-22 株式会社エヌ・ティ・ティ・ドコモ Communication terminal device and application program
DE10314449A1 (en) * 2003-03-31 2004-10-14 Robert Bosch Gmbh Sensor arrangement for force measurement
US7373519B1 (en) 2003-04-09 2008-05-13 Symantec Corporation Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis
US20040225282A1 (en) * 2003-05-09 2004-11-11 Ness Anton P. Method and articles for assuring appropriate surgery
JP4168338B2 (en) * 2003-09-18 2008-10-22 ブラザー工業株式会社 Installation program, computer-readable recording medium, and installation method
US8713544B1 (en) 2003-11-25 2014-04-29 Symantec Corporation Universal data-driven computer proxy
US20040133809A1 (en) * 2003-12-16 2004-07-08 Dahl Nathaniel H. Method and system for automatically determining compatible and suitable hardware upgrades for computer hardware
US7694295B2 (en) * 2003-12-16 2010-04-06 Hewlett-Packard Development Company, L.P. Displaying a vendor provided information screen in response to a log-in experience
JP4021407B2 (en) * 2003-12-16 2007-12-12 シャープ株式会社 Information processing device
US7467378B1 (en) * 2004-02-09 2008-12-16 Symantec Corporation System state rollback after modification failure
US20050192817A1 (en) * 2004-02-26 2005-09-01 Dustin Sorenson System and method for information handling system consumable automatic ordering
US7536672B1 (en) * 2004-03-05 2009-05-19 Adobe Systems Incorporated Management of user interaction history with software applications
US7802262B1 (en) 2004-03-05 2010-09-21 Adobe Systems Incorporated System and method for communicating state and title information between a browser and a rich internet application with browser forward and back button support
US7934210B1 (en) 2004-03-26 2011-04-26 Adobe Systems Incorporated System and method for updating one or more programs and their environment
US7788662B2 (en) * 2004-07-28 2010-08-31 Microsoft Corporation Automatic upgrade of pluggable components
US7840615B2 (en) * 2004-08-05 2010-11-23 Siemens Enterprise Communications, Inc. Systems and methods for interoperation of directory services
US20060070089A1 (en) * 2004-08-20 2006-03-30 Shahid Shoaib Method and apparatus for dynamic replacement of device drivers in the operating system (OS) kernel
US20060048136A1 (en) * 2004-08-25 2006-03-02 Vries Jeff D Interception-based resource detection system
US7600006B2 (en) 2004-08-31 2009-10-06 Inter-Tel, Inc Peer-to-peer distribution of firmware
JP2006079155A (en) * 2004-09-07 2006-03-23 Hitachi Ltd Information processor
US7765531B2 (en) * 2004-10-06 2010-07-27 Hewlett-Packard Development Company, L.P. Systems and methods for handling multiple static query modules for distinct environments
US7240162B2 (en) 2004-10-22 2007-07-03 Stream Theory, Inc. System and method for predictive streaming
JP2008527468A (en) * 2004-11-13 2008-07-24 ストリーム セオリー,インコーポレイテッド Hybrid local / remote streaming
US7774753B1 (en) 2004-11-18 2010-08-10 Adobe Systems Incorporated System and method for communicating data among two or more programs
KR101075676B1 (en) * 2004-11-20 2011-10-21 삼성전자주식회사 Software download apparatus and method for mobile terminal equipment
TWI273453B (en) * 2004-12-10 2007-02-11 Hon Hai Prec Ind Co Ltd An system and method for automatically updating software
US9716609B2 (en) 2005-03-23 2017-07-25 Numecent Holdings, Inc. System and method for tracking changes to files in streaming applications
US8024523B2 (en) 2007-11-07 2011-09-20 Endeavors Technologies, Inc. Opportunistic block transmission with time constraints
US20060218165A1 (en) * 2005-03-23 2006-09-28 Vries Jeffrey De Explicit overlay integration rules
US8001458B1 (en) 2005-11-14 2011-08-16 Adobe Systems Incorporated System and method for communicating state and title information between a browser and a rich Internet application
US7444503B2 (en) * 2006-01-11 2008-10-28 Sun Microsystems, Inc Method and apparatus for delivering device drivers
US7865441B2 (en) * 2006-03-01 2011-01-04 International Business Machines Corporation Switching between multiple versions of a software program
JP4810282B2 (en) * 2006-03-31 2011-11-09 キヤノン株式会社 Module installation method, module installation device, and program
US8533700B1 (en) * 2006-04-11 2013-09-10 Open Invention Networks, Llc Workstation uptime, maintenance, and reboot service
US8255357B1 (en) * 2006-04-24 2012-08-28 Sprint Communications Company L.P. Systems and methods of configuration management for enterprise software
US7873957B2 (en) * 2006-07-27 2011-01-18 Microsoft Corporation Minimizing user disruption during modification operations
US20080127161A1 (en) * 2006-10-16 2008-05-29 Microsoft Corporation Environment state changes to alter functionality
US8261345B2 (en) 2006-10-23 2012-09-04 Endeavors Technologies, Inc. Rule-based application access management
GB2443846B (en) * 2006-11-15 2011-12-07 Joseph Timothy Poole Computing system
US8949297B2 (en) 2006-12-27 2015-02-03 Ebay Inc. Content switch management
US7577591B2 (en) * 2007-01-22 2009-08-18 Dell Products L.P. System and method for generating a product order from a product sample
US20080189722A1 (en) * 2007-02-02 2008-08-07 Microsoft Corporation Generic Device Driver Replacement
US8230417B1 (en) 2007-06-08 2012-07-24 Adobe Systems Incorporated Combined application and execution environment install
US7660539B2 (en) * 2007-07-11 2010-02-09 Dell Products, L.P. Printer consumable ordering direct from printer
US8448161B2 (en) * 2007-07-30 2013-05-21 Adobe Systems Incorporated Application tracking for application execution environment
US8375381B1 (en) 2007-07-30 2013-02-12 Adobe Systems Incorporated Management user interface for application execution environment
US7930273B1 (en) 2007-07-30 2011-04-19 Adobe Systems Incorporated Version management for application execution environment
US20090075641A1 (en) * 2007-09-18 2009-03-19 Metropcs Wireless, Inc. Automated over-the-air firmware update for a wireless phone
US8892738B2 (en) 2007-11-07 2014-11-18 Numecent Holdings, Inc. Deriving component statistics for a stream enabled application
US9026623B2 (en) * 2008-01-31 2015-05-05 Microsoft Technology Licensing, Llc Layered architectures for remote dynamic administration of distributed client configurations
US20090254898A1 (en) * 2008-04-08 2009-10-08 Microsoft Corporation Converting a device from one system to another
US10079716B2 (en) 2009-03-04 2018-09-18 Amazon Technologies, Inc. User controlled environment updates in server cluster
US8595714B1 (en) * 2009-03-04 2013-11-26 Amazon Technologies, Inc. User controlled environment updates in server cluster
US8984186B2 (en) * 2012-08-29 2015-03-17 Google Inc. Augmenting capabilities of a host device

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787246A (en) * 1994-05-27 1998-07-28 Microsoft Corporation System for configuring devices for a computer system
US5548759A (en) * 1994-07-05 1996-08-20 Microsoft Corporation System for storing executable code within a resource data section of an executable file
US5668992A (en) * 1994-08-01 1997-09-16 International Business Machines Corporation Self-configuring computer system
US5742829A (en) * 1995-03-10 1998-04-21 Microsoft Corporation Automatic software installation on heterogeneous networked client computer systems
US5974474A (en) * 1996-03-15 1999-10-26 Novell, Inc. System for automatic hardware identification and configuration where instance values are unique within the computer system and resource requirement conflicts are resolved by modifying resource settings
US5870610A (en) * 1996-06-28 1999-02-09 Siemens Business Communication Systems, Inc. Autoconfigurable method and system having automated downloading
US5826090A (en) * 1997-03-17 1998-10-20 International Business Machines Corporation Loadable hardware support
US6119186A (en) * 1997-05-30 2000-09-12 Texas Instruments Incorporated Computer system with environmental manager for detecting and responding to changing environmental conditions
US5951684A (en) * 1997-12-23 1999-09-14 Samsung Electronics Co., Ltd. Method of booting a computer system with identifying a CD-ROM disk drive of the system and a method of loading a device driver
US6178468B1 (en) * 1998-06-19 2001-01-23 Hewlett-Packard Company Real time supply PF plug-and-play installation resources

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8970761B2 (en) 1997-07-09 2015-03-03 Flashpoint Technology, Inc. Method and apparatus for correcting aspect ratio in a camera graphical user interface
US8102457B1 (en) 1997-07-09 2012-01-24 Flashpoint Technology, Inc. Method and apparatus for correcting aspect ratio in a camera graphical user interface
US6389591B1 (en) * 1998-09-03 2002-05-14 Microsoft Corporation Method and apparatus for determining preferred controls for an upgradable operating system
US8972867B1 (en) 1998-12-31 2015-03-03 Flashpoint Technology, Inc. Method and apparatus for editing heterogeneous media objects in a digital imaging device
US8127232B2 (en) 1998-12-31 2012-02-28 Flashpoint Technology, Inc. Method and apparatus for editing heterogeneous media objects in a digital imaging device
US6400471B1 (en) * 1999-02-11 2002-06-04 Flashpoint Technology, Inc. Flexible architecture for image processing
US6931440B1 (en) * 1999-04-21 2005-08-16 Emc Corporation Method and apparatus for dynamically determining whether access to a resource connected to a computer has changed and determining how to access the resource with a new identifier
US7107329B1 (en) * 1999-05-21 2006-09-12 Lucent Technologies Inc. In networks of interconnected router nodes for routing data traffic, a method of and system for imperceptibly upgrading router node software and the like without traffic interruption
US7013455B1 (en) * 2000-10-19 2006-03-14 International Business Machines Corporation System for automatically altering environment variable to run proper executable file by removing references to all except one duplicate file in the path sequence
US20030097427A1 (en) * 2001-11-21 2003-05-22 Parry Travis J. Multiple device configuration and upgrade for imaging devices
US20050149923A1 (en) * 2002-05-28 2005-07-07 Sheng Lee System update protocol
US20040010786A1 (en) * 2002-07-11 2004-01-15 Microsoft Corporation System and method for automatically upgrading a software application
US20040221146A1 (en) * 2003-04-30 2004-11-04 International Business Machines Corporation Build time dynamic installation of drivers on cloned systems
US8874970B2 (en) * 2004-03-31 2014-10-28 Microsoft Corporation System and method of preventing a web browser plug-in module from generating a failure
EP1659489A1 (en) * 2004-11-19 2006-05-24 VEGA Grieshaber KG System and method for determining a version mismatch between a device driver and a device software in a process control system
US20060130073A1 (en) * 2004-11-19 2006-06-15 Fridolin Faist System configuration and process in a control system for identifying nonequivalent functionality between the software of a device and the assigned device driver
US20070028216A1 (en) * 2005-07-28 2007-02-01 Boss Gregory J Systems and methods for embedded application test suites
CN100345112C (en) * 2005-11-25 2007-10-24 中国科学院软件研究所 Member extending method for operating system
US10089378B2 (en) * 2006-01-30 2018-10-02 Adobe Systems Incorporated Automatic asset versioning
US9224145B1 (en) 2006-08-30 2015-12-29 Qurio Holdings, Inc. Venue based digital rights using capture device with digital watermarking capability
US9384119B2 (en) 2007-06-20 2016-07-05 Microsoft Technology Licensing, Llc Web page error reporting
US8677188B2 (en) 2007-06-20 2014-03-18 Microsoft Corporation Web page error reporting
US20100083246A1 (en) * 2008-09-29 2010-04-01 Synopsys, Inc. System and method for verifying delivered software
US9015702B2 (en) * 2012-01-13 2015-04-21 Vasanth Bhat Determining compatibility of an application with different versions of an operating system
US20130185708A1 (en) * 2012-01-13 2013-07-18 Oracle International Corporation Determining compatibility of an application with different versions of an operating system
US20160099955A1 (en) * 2014-10-02 2016-04-07 AVAST Software s.r.o. Cloud based reputation system for browser extensions and toolbars
US10498746B2 (en) * 2014-10-02 2019-12-03 AVAST Software s.r.o. Cloud based reputation system for browser extensions and toolbars
CN109983442A (en) * 2016-11-14 2019-07-05 标致雪铁龙汽车股份有限公司 System and method for Emergency Maintenance vehicle computer
TWI697776B (en) * 2018-04-12 2020-07-01 宏碁股份有限公司 Computer system, updating method thereof and computer program product
CN110377312A (en) * 2019-07-19 2019-10-25 北京小米移动软件有限公司 A kind of method for upgrading software, device and medium
CN113296822A (en) * 2021-05-27 2021-08-24 北京思特奇信息技术股份有限公司 Dynamic library-based database system online upgrading method and system
CN114675861A (en) * 2022-04-07 2022-06-28 无锡市恒通电器有限公司 System software safety upgrading method of single-phase electric energy meter based on real-time operating system
CN116009912A (en) * 2022-12-26 2023-04-25 郑州云智信安安全技术有限公司 Construction method for automatically generating upgrade package aiming at private network environment

Also Published As

Publication number Publication date
US6418555B2 (en) 2002-07-09

Similar Documents

Publication Publication Date Title
US6418555B2 (en) Automatic upgrade of software
US6928579B2 (en) Crash recovery system
US9213534B2 (en) Method for restoring software applications on desktop computers
US7650531B2 (en) System and method for automatically restoring hard drives on failure
US6374363B1 (en) Method for generating a footprint image file for an intelligent backup and restoring system
US6289426B1 (en) Drive preparation methods for intelligent backup systems
US6532535B1 (en) Method for managing primary and secondary storage devices in an intelligent backup and restoring system
US7334157B1 (en) Restore of data to a computer system having different hardware
US6684229B1 (en) Method of generating a database for use in an intelligent backup and restoring system
US6922831B1 (en) Method and system for providing software utilizing a restore medium and a network
US5745669A (en) System and method for recovering PC configurations
US6804774B1 (en) Software image transition aid comprising building a disk image based on identified hardware
US6978363B2 (en) System and method to enable a legacy BIOS system to boot from a disk that includes EFI GPT partitions
US6374366B1 (en) Automated drive repair systems and methods
US20140337608A1 (en) Method and system for booting and automatically updating software, and recovering from update error, and computer readable recording medium storing method
US7000231B1 (en) Method of manufacturing operating system master template, method of manufacturing a computer entity and product resulting therefrom, and method of producing a production version of an operating system
US20040123285A1 (en) Self-healing version and configuration model for an application server
US20080005611A1 (en) Providing A Restore Operating System With New Or Updated Software Components
US6859924B1 (en) System restore apparatus and method employing virtual restore disk
KR20030011552A (en) Method and system for creating and employing an operating system having selected functionality
US5892953A (en) Corrective service facility
US5968170A (en) Primary swap size increase on a UNIX based computer system
US6119212A (en) Root size decrease on a UNIX based computer system
US6205561B1 (en) Tracking and managing failure-susceptible operations in a computer system
US6275930B1 (en) Method, computer, and article of manufacturing for fault tolerant booting

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: INTEL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOHAMMED, MANNAN A.;REEL/FRAME:009339/0893

Effective date: 19980716

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 12