Uniquely identifying a crashed application and its environment
First Claim
1. In a client-server computing environment, a method for collecting data to identify an application whose executable file is stored in a directory on a client computer, the data being for transmission to a server computer via a network after the occurrence of a reporting event, comprising:
- generating an inventory of selected files stored in at least one directory on the client computer;
generating an inventory of system properties for the client computer; and
directing the client computer to transmit the inventory of selected files and the inventory of system properties to the server computer.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method for collecting information to uniquely identify an application on a client computer upon the occurrence of a reporting event, such as a crash. The method is implemented by providing a client computer having access to a network. In order to uniquely identify the application, the method generates an inventory of selected files stored in at least one directory, normally including the directory containing the application executable file. The method further generates an inventory of system properties for the client computer. The inventories are transmitted via the network to a server computer. Upon receipt by the server computer, the inventory information is compared with corresponding information in a database to determine whether the application can be uniquely identified. If the application can be identified, the user can be notified of a solution or other information in response to the reporting event. If no appropriate response can be found, the inventory data can be retained in the database for future reference.
-
Citations
50 Claims
-
1. In a client-server computing environment, a method for collecting data to identify an application whose executable file is stored in a directory on a client computer, the data being for transmission to a server computer via a network after the occurrence of a reporting event, comprising:
-
generating an inventory of selected files stored in at least one directory on the client computer;
generating an inventory of system properties for the client computer; and
directing the client computer to transmit the inventory of selected files and the inventory of system properties to the server computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. In a client-server computing environment, a method for collecting data to identify an application whose executable file is stored in a directory on a client computer, the data being for transmission to a server computer after the occurrence of a reporting event, comprising:
-
generating an inventory of selected files stored in the directory containing the application executable file;
generating an inventory of system properties for the client computer; and
preparing the inventory of selected files and the inventory of system properties for transmission to the server computer after the occurrence of the reporting event. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. In a client-server computing environment, a method for collecting data to identify an application whose executable file is stored in a directory on a client computer, the data being for transmission to a server computer after the occurrence of a reporting event, comprising:
-
generating an inventory of selected files stored in the directory containing the application executable file, wherein the selected files include executable files stored in the directory and wherein the inventory of selected files includes for each file included therein at least a file name, a file size and a checksum;
generating an inventory of system properties for the client computer; and
preparing the inventory of files and the inventory of system properties for transmission to the server computer in the Extensible Markup Language (XML) format after the occurrence of the reporting event. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. In a networked client-server computing environment having a server computer and a database containing application identification information, a method for identifying an application on a client computer after the occurrence of a reporting event, comprising:
-
receiving on the server computer an inventory of selected files stored in at least one directory on the client computer;
receiving on the server computer an inventory of system properties for the client computer; and
comparing data from the inventory of selected files and data from the inventory of system properties with corresponding data in the database to identify the application. - View Dependent Claims (41, 42, 43, 44, 45)
-
-
46. In a networked client-server computing environment having a server computer and a database containing application identification information, a method for identifying an application on a client computer after the occurrence of a reporting event, comprising:
-
receiving on the server computer an inventory of files stored in a directory on the client computer containing the application executable file wherein the inventory of files includes file properties for each file included therein and wherein the file properties include at least a file name, a file size and a checksum;
receiving on the server computer an inventory of system properties for the client computer;
comparing data from the inventory of files, including the file name, the file size and the checksum, and data from the inventory of system properties with corresponding data in the database to identify the application; and
determining, upon identification of the application, whether a response to the reporting event exists for the application and, if so, transmitting the response to the client computer.
-
-
47. In a networked client-server computing environment having a server and a plurality of databases each containing application identification information, a method for identifying an application on a client computer after the occurrence of a reporting event, comprising:
-
receiving on the server computer an inventory of files stored in a directory on the client computer containing the application executable file;
receiving on the server computer an inventory of system properties for the client computer; and
executing a search service that compares data from the inventory of files and data from the inventory of system properties with corresponding data in at least one of the plurality of databases to identify the application. - View Dependent Claims (48, 49, 50)
-
Specification