×

Integrated fingerprinting in configuration audit and management

  • US 8,051,298 B1
  • Filed: 11/29/2005
  • Issued: 11/01/2011
  • Est. Priority Date: 11/29/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for identifying whether applications are active in a computing system of an enterprise, the method comprising:

  • defining and storing, by a computer device, a first plurality of fingerprints associated with a plurality of internal applications, wherein each of the first plurality of fingerprints comprises an identification code, a version number, and a build number, and wherein the plurality of internal applications are created by development staff within the enterprise;

    defining and storing, by the computer device, a second plurality of fingerprints associated with a plurality of third party applications, wherein the second plurality of fingerprints comprise directory structures, files associated with the plurality of third party applications, times of last modification of one or more data stores associated with the plurality of third party applications, and types of modification of data in one or more data stores associated with the plurality of third party applications;

    determining whether applications are internal applications or third party applications;

    in response to determining that the applications are internal applications, searching, by the computer device, the computing system for fingerprints of the first plurality of fingerprints associated with the applications;

    identifying the applications as active when the fingerprints of the first plurality of fingerprints are found;

    in response to determining that the applications are third party applications, searching, by the computer device, the computing system for fingerprints of the second plurality of fingerprints associated with the applications, wherein the searching for the fingerprints of the second plurality of fingerprints comprises;

    searching a plurality of directory structures of the computing system for the directory structures in the fingerprints of the second plurality of fingerprints;

    searching a plurality of files of the computing system for the files associated with the applications in the fingerprints of the second plurality of fingerprints;

    searching memory of the computing system for the data in the fingerprints of the second plurality of fingerprints in a predefined threshold number of searches, wherein the predefined threshold number of searches is greater than one;

    searching one or more data stores of the computing system associated with the applications for the times of last modification in the fingerprints of the second plurality of fingerprints; and

    searching one or more data stores of the computing system associated with the applications for the types of modification of data in the fingerprints of the second plurality of fingerprints; and

    identifying the applications as active when a plurality of;

    one or more of the directory structures in the fingerprints of the second plurality of fingerprints is found, one or more of the files in the fingerprints of the second plurality of fingerprints is found, one or more of the data in the fingerprints of the second plurality of fingerprints is found in one of the predefined threshold number of searches, one or more of the times of last modification in the fingerprints of the second plurality of fingerprints is found, and one or more of the types of modification of data in the fingerprints of the second plurality of fingerprints is found.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×