System and Method for Generating and Using Fingerprints for Integrity Management
First Claim
1. A method comprising:
- capturing a fingerprint of at least a portion of an information technology (IT) infrastructure;
comparing the fingerprint to captured data; and
preemptively predicting a problem in the IT infrastructure based on the fingerprint comparison.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method is provided for capturing and using problem fingerprints in an Information Technology (IT) infrastructure for integrity management. A fingerprint of the transaction topology in an IT infrastructure is automatically captured at various time intervals prior to the occurrence of an event leading to a problem, such as a failure, hard threshold violation, defined transaction violation or user-provided occurrence. The fingerprint provides an indication of the activity and operation of the IT infrastructure immediately preceding the problem event. The captured fingerprint is then used to monitor real-time data in the IT infrastructure operation and activity to look for activity that matches a captured fingerprint to provide an indication of a pending problems before the problems occur. When it is determined that there is sufficient probability a problem event will occur based upon real-time data matching a previously generated problem fingerprint, an alert is generated to provide sufficient notification prior to the occurrence of problem event.
-
Citations
36 Claims
-
1. A method comprising:
-
capturing a fingerprint of at least a portion of an information technology (IT) infrastructure; comparing the fingerprint to captured data; and preemptively predicting a problem in the IT infrastructure based on the fingerprint comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of capturing a fingerprint of a problem in information technology (IT) infrastructure, comprising:
-
identifying a problem; collecting information related to the problem; analyzing the collected information against a set of rules to determine if fingerprint creation criteria have been satisfied; assigning probability weights to the rules when the fingerprint creation criteria have been satisfied; creating a fingerprint utilizing the probability weighted rules. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A machine-readable medium having program instructions stored thereon executable by a processing unit for performing the steps of:
-
capturing a fingerprint of at least a portion of an information technology (IT) infrastructure; comparing the fingerprint to captured data; and preemptively predicting a problem in the IT infrastructure based on the fingerprint comparison. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A machine-readable medium having program instructions stored thereon executable by a processing unit for capturing a fingerprint of a problem in information technology (IT) infrastructure by performing the steps of:
-
identifying a problem; collecting information related to the problem; analyzing the collected information against a set of rules to determine if fingerprint creation criteria have been satisfied; assigning probability weights to the rules when the fingerprint creation criteria have been satisfied; creating a fingerprint utilizing the probability weighted rules. - View Dependent Claims (20, 21, 22, 23)
-
-
24. The machine-readable medium of claim 24, further comprising program instructions stored thereon for analyzing the collected information to determine if the fingerprint creation criteria have been satisfied by:
-
collecting a set of rules describing the probability of a symptom indicating a fingerprint for a given time cut; and determining if the number of rules in the collected set of rules meets a certain number defined to be sufficient to satisfy the fingerprint creation criteria.
-
-
25. A system comprising:
-
a fingerprint capturing module for capturing a fingerprint of at least a portion of an information technology (IT) infrastructure; a fingerprint comparison module for comparing the fingerprint to captured data; and a problem prediction module for preemptively predicting a problem in the IT infrastructure based on the fingerprint analysis. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A system of capturing a fingerprint of a problem in information technology (IT) infrastructure, comprising:
-
a problem identifying module for identifying a problem; an information collecting module for collecting information related to the problem; a fingerprint creation criteria module for analyzing the collected information against a set of rules to determine if fingerprint creation criteria have been satisfied; a probability weight module for assigning probability weights to the rules when the fingerprint creation criteria have been satisfied; a fingerprint creation module for creating a fingerprint utilizing the probability weighted rules. - View Dependent Claims (32, 33, 34, 35, 36)
-
Specification