Method and apparatus for managing components in an IT system
First Claim
Patent Images
1. A non-transitory computer-readable medium storing program instructions executable to:
- store a fingerprint specifying a plurality of attributes of a component of an information technology (IT) system;
automatically discover the existence of the component in the IT system using the fingerprint, wherein automatically discovering the existence of the component comprises;
receiving a plurality of event messages indicating a plurality of real-time events that occur in the IT system, wherein each event message matches a respective attribute specified by the fingerprint; and
determining that event messages matching each attribute of the plurality of attributes specified by the fingerprint have been received;
wherein the plurality of event messages includes a first event message indicating a first real-time event selected from the following real-time events;
a file creation, a file deletion, a file modification, a registry key creation, a registry key deletion, or a registry key modification.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for collecting information on components in an information technology (IT) system. This embodiment features discovering components in the IT system, determining at least one dependency between two or more of the discovered components, and tracking changes to the discovered components and the dependency between two or more of the discovered components. The discovery of components can be carried out using fingerprints of components, which can include key elements of the component that exist in a full model of all of the elements of the component.
-
Citations
20 Claims
-
1. A non-transitory computer-readable medium storing program instructions executable to:
-
store a fingerprint specifying a plurality of attributes of a component of an information technology (IT) system; automatically discover the existence of the component in the IT system using the fingerprint, wherein automatically discovering the existence of the component comprises; receiving a plurality of event messages indicating a plurality of real-time events that occur in the IT system, wherein each event message matches a respective attribute specified by the fingerprint; and determining that event messages matching each attribute of the plurality of attributes specified by the fingerprint have been received; wherein the plurality of event messages includes a first event message indicating a first real-time event selected from the following real-time events;
a file creation, a file deletion, a file modification, a registry key creation, a registry key deletion, or a registry key modification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
one or more processors; and memory storing program instructions; wherein the program instructions are executable by the one or more processors to; store a fingerprint specifying a plurality of attributes of a component of an information technology (IT) system; automatically discover the existence of the component in the IT system using the fingerprint, wherein automatically discovering the existence of the component comprises; receiving a plurality of event messages indicating a plurality of real-time events that occur in the IT system, wherein each event message matches a respective attribute specified by the fingerprint; and determining that event messages matching each attribute of the plurality of attributes specified by the fingerprint have been received; wherein the plurality of event messages includes a first event message indicating a first real-time event selected from the following real-time events;
a file creation, a file deletion, a file modification, a registry key creation, a registry key deletion, or a registry key modification. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method, comprising:
-
a computer system storing a fingerprint specifying a plurality of attributes of a component of an information technology (IT) system; automatically discovering the existence of the component in the IT system using the fingerprint, wherein automatically discovering the existence of the component comprises; receiving a plurality of event messages indicating a plurality of real-time events that occur in the IT system, wherein each event message matches a respective attribute specified by the fingerprint; and determining that event messages matching each attribute of the plurality of attributes specified by the fingerprint have been received; wherein the plurality of event messages includes a first event message indicating a first real-time event selected from the following real-time events;
a file creation, a file deletion, a file modification, a registry_key creation, a registry_key deletion, or a registry_key modification.
-
Specification