Legacy system support
First Claim
1. A method, comprising:
- gathering information with respect to inputs, outputs, and internal function of a legacy process by monitoring the legacy process during operation of the legacy process, the legacy process implemented by a legacy system of hardware components and software components;
storing the information in a memory in communication with a processing device;
defining from the gathered information a set of rules describing at least part of the behavior of the legacy system, wherein behavior is the sum of the responses of the legacy system to the set of possible legacy system inputs;
testing a rule from the set of rules by first applying known valid inputs to the legacy process and verifying that the legacy system responds as predicted by the rule, and second applying known invalid inputs to the legacy process and verifying that the legacy system responds as predicted by the rule.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for adapting a legacy system to a new environment includes a method of learning the behavior of a legacy system and a method for replacing a legacy system.
Learning the behavior of a legacy system includes gathering information with respect to inputs, outputs, and internal function of the legacy system; defining from the gathered information a set of behavioral rules describing the legacy system; and testing the rules by applying known inputs to the legacy system and verifying that the legacy system responds as predicted by the rules.
Replacing a legacy system includes monitoring legacy system responses to legacy system inputs; defining a set of rules describing behavior of the legacy system based on the responses to the inputs; comparing actual legacy system responses to responses predicted by the set of rules; and using the set of rules to create a replacement system that mimics the legacy system.
-
Citations
25 Claims
-
1. A method, comprising:
-
gathering information with respect to inputs, outputs, and internal function of a legacy process by monitoring the legacy process during operation of the legacy process, the legacy process implemented by a legacy system of hardware components and software components; storing the information in a memory in communication with a processing device; defining from the gathered information a set of rules describing at least part of the behavior of the legacy system, wherein behavior is the sum of the responses of the legacy system to the set of possible legacy system inputs; testing a rule from the set of rules by first applying known valid inputs to the legacy process and verifying that the legacy system responds as predicted by the rule, and second applying known invalid inputs to the legacy process and verifying that the legacy system responds as predicted by the rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
monitoring legacy system responses to legacy system inputs, performing the monitoring at least in part by a processor executing instructions from a tangible computer readable medium; defining a set of rules describing behavior of the legacy system based on the legacy system responses to the inputs, wherein behavior is the sum of the responses of the legacy system to the set of possible legacy system inputs; comparing actual and predicted legacy system responses to the inputs, the predicted legacy system responses being predicted by the set of rules; and creating a replacement system for the legacy system using the set of rules if the actual and predicted legacy system responses are substantially equivalent. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a memory storing a set of rules, the rules describing the behavior of a legacy system; and a processor in communication with the memory executing instructions tangibly embodied on a computer readable medium to implement at least in part a monitor gathering data with respect to inputs, outputs, and internal actions of the legacy system; a rule checker that validates the set of rules by confirming that the actual responses of the legacy system to inputs of the legacy system are substantially equivalent to the responses predicted by the rules, the rule checker also checking that the inputs to and outputs from the legacy system are in a valid format; a translator that translates modern format inputs into legacy format inputs that may be recognized by the legacy system; and a bypasser that allows direct access to memory in the legacy system. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification