Abstract:
Systems and methods are provided that prevent faulty drivers from being loaded and/or can prevent faulty drivers from being installed. Thus, instability of a computer system can be mitigated. Additionally, the occurrence of data corruption, system halting and the like can be reduced. A requested driver is compared to a list of faulty drivers from a faulty driver database. If the requested driver is in the list of faulty drivers, the requested driver is deemed faulty or defective, and is prevented from being loaded. Additionally, if the requested driver is in the list of faulty drivers, the requested driver can be prevented from being installed. Otherwise, the requested driver is operable and can be installed and/or loaded.
Abstract:
A system to manage software component replacement is presented. The system comprises a component that identifies a unique identifier associated with a software component. The system also includes an upgrade component that applies an upgrade policy as a function of a comparison of the unique identifier with an identifier associated with software to replace. Methods for using the presented system are also provided.
Abstract:
Systems and methods are provided that prevent faulty drivers from being loaded and/or can prevent faulty drivers from being installed. Thus, instability of a computer system can be mitigated. Additionally, the occurrence of data corruption, system halting and the like can be reduced. A requested driver is compared to a list of faulty drivers from a faulty driver database. If the requested driver is in the list of faulty drivers, the requested driver is deemed faulty or defective, and is prevented from being loaded. Additionally, if the requested driver is in the list of faulty drivers, the requested driver can be prevented from being installed. Otherwise, the requested driver is operable and can be installed and/or loaded.
Abstract:
A method for synchronization of a digital watermark generates a digital watermark based on feature extraction and a key generator. The synchronization method is adapted for both temporal and spatial synchronization. Statistical features of the watermarked signal along with key generators are used to compute keys used to detect embedded digital watermarks that vary over time or space. For spatial synchronization, spatial redundancy is used to detect geometric distortion of a signal in which the watermark is embedded using an autocorrelation method to detect peaks caused by the redundancy of the watermark structure. These peaks are then analyzed with a histogram method to detect rotation and scaling of the host media signal. The spatial synchronization process is applied to watermarks for both intra-coded frames of video (I-frames) as well as still images.
Abstract:
Described is processing a manifest associated with a software component (such as for installation purposes) to determine whether the manifest has errors, and if so, providing a corrected manifest. To process the manifest, an identifier associated with the manifest is used to consult a correction data store to determine whether the manifest is known to require correction. The identifier may be generated via a hash (e.g., of the manifest contents) if one is not appropriately associated with the manifest. If the manifest is known to require correction, a corrected manifest is used, such as from a substitute corrected manifest, or a set of deltas that modify the manifest into the corrected manifest. The substitute manifest or deltas may be in the data store or obtained via a link. A corrected manifest may also be provided by evaluating the manifest for rule violations, and fixing any rule violations that are found.
Abstract:
Described is processing a manifest associated with a software component (such as for installation purposes) to determine whether the manifest has errors, and if so, providing a corrected manifest. To process the manifest, an identifier associated with the manifest is used to consult a correction data store to determine whether the manifest is known to require correction. The identifier may be generated via a hash (e.g., of the manifest contents) if one is not appropriately associated with the manifest. If the manifest is known to require correction, a corrected manifest is used, such as from a substitute corrected manifest, or a set of deltas that modify the manifest into the corrected manifest. The substitute manifest or deltas may be in the data store or obtained via a link. A corrected manifest may also be provided by evaluating the manifest for rule violations, and fixing any rule violations that are found.
Abstract:
The subject invention relates to enabling device drivers that support additional functionality that can be enabled to an operating system. A hardware manufacture can claim support for additional functionality in their device drivers, and such functionality can be verified and tagged during driver signing. When a device driver passes a corresponding test, the driver is digitally signed and the signature can include attributes indicating support for that functionality (e.g., features and applications). The systems and methods employ a querying mechanism that can search a device driver package for attributes and expose such attributes. The search can expose both trusted attributes and untrusted device driver properties. Exposed trusted attributes can be selectively enabled to provide corresponding features and/or applications. This can facilitate enabling aspects of hardware when corresponding drivers support such functionality and mitigate enabling an unsupported feature and/or an application. Untrusted properties can be manually enabled, for example, for testing purposes.
Abstract:
Systems and methods are disclosed that facilitate refining a list of candidate driver packages for a detected plug-and-play device. A device can be detected and a hardware ID there for can be determined and compared to hardware IDs in a data store to determine a preliminary list of driver packages that match the hardware device ID. The driver packages can be tagged with additional rich targeting criteria that must be satisfied in order for the driver package to be retained in the candidate list. If additional criteria in the driver packages are not satisfied, then the driver package can be excised from the candidate list to refine driver package compatibility with a computer to which the device is connected.