Automated verification of correctness of aspects of an information technology system
First Claim
1. A method for verifying correctness of an Information Technology (IT) structure instance D of an IT structure R of an IT system, said method comprising:
- providing information relating to the IT structure instance D, said IT instance D having resulted from deployment of the IT structure R;
generating a real IT structure RD from the information relating to the IT structure instance D;
comparing R and RD to determine whether RD differs from R; and
if said comparing determines that RD differs from R then indicating that said deployment was unsuccessful else indicating that said deployment was successful.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for verifying correctness of an Information Technology (IT) structure instance D of an IT structure R, a method for detecting an unauthorized change in an operating instance X of an IT structure R, a method for verifying conformance of an IT structure to an IT delivery environment, associated computer program products, and associated processes for integrating computing infrastructure. The method for verifying correctness of an IT structure instance D determines whether a reverse specification RD for D differs from R. The method for detecting an unauthorized change in an operating instance X of an IT structure R determines whether authorized changes in R have occurred. The method for verifying conformance of an IT structure to an IT delivery environment verifies compliance of the IT structure relating to: product standard compliance, compliance of software elements of the IT structure primitive composition, software application type compliance, and network traffic compliance.
92 Citations
42 Claims
-
1. A method for verifying correctness of an Information Technology (IT) structure instance D of an IT structure R of an IT system, said method comprising:
-
providing information relating to the IT structure instance D, said IT instance D having resulted from deployment of the IT structure R;
generating a real IT structure RD from the information relating to the IT structure instance D;
comparing R and RD to determine whether RD differs from R; and
if said comparing determines that RD differs from R then indicating that said deployment was unsuccessful else indicating that said deployment was successful. - View Dependent Claims (2, 3)
-
-
4. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code comprising an algorithm adapted to implement a method for verifying correctness of an Information Technology (IT) structure instance D of an IT structure R, said method comprising:
-
providing information relating to the IT structure instance D, said IT instance D having resulted from deployment of the IT structure R;
generating a real IT structure RD from the information relating to the IT structure instance D;
comparing R and RD to determine whether RD differs from R; and
if said comparing determines that RD differs from R then indicating that said deployment was unsuccessful else indicating that said deployment was successful. - View Dependent Claims (5, 6)
-
-
7. A process for integrating computing infrastructure, said process comprising integrating computer-readable code into a computing system, wherein the code in combination with the computing system is capable of performing a method for verifying correctness of an Information Technology (IT) structure instance D of an IT structure R, said method comprising:
-
providing information relating to the IT structure instance D, said IT instance D having resulted from deployment of the IT structure R;
generating a real IT structure RD from the information relating to the IT structure instance D;
comparing R and RD to determine whether RD differs from R; and
if said comparing determines that RD differs from R then indicating that said deployment was unsuccessful else indicating that said deployment was successful. - View Dependent Claims (8, 9)
-
-
10. A method for detecting an unauthorized change in an operating instance X of an Information Technology (IT) structure R of an IT system, said method comprising the steps of:
-
(a) determining if X is a correctly deployed instance of R; and
(b) if said determining determines that X is not a correctly deployed instance of R then signaling that X is not a correctly deployed instance of R and exiting said method, else (b1) delaying or not delaying for a pre-specified period of time followed by (b2) if R is determined to have acquired an authorized change since step (a) then exiting said method else looping back to step (a). - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code comprising an algorithm adapted to implement method for detecting an unauthorized change in an operating instance X of an Information Technology (IT) structure R of an IT system, said method comprising the steps of:
-
(a) determining if X is a correctly deployed instance of R; and
(b) if said determining determines that X is not a correctly deployed instance of R then signaling that X is not a correctly deployed instance of R and exiting said method, else (b1) delaying or not delaying for a pre-specified period of time followed by (b2) if R is determined to have acquired an authorized change since step (a) then exiting said method else looping back to step (a). - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A process for integrating computing infrastructure, said process comprising integrating computer-readable code into a computing system, wherein the code in combination with the computing system is capable of performing a method for detecting an unauthorized change in an operating instance X of an Information Technology (IT) structure R of an IT system, said method comprising the steps of:
-
(a) determining if X is a correctly deployed instance of R; and
(b) if said determining determines that X is not a correctly deployed instance of R then signaling that X is not a correctly deployed instance of R and exiting said method, else (b1) delaying or not delaying for a pre-specified period of time followed by (b2) if R is determined to have acquired an authorized change since step (a) then exiting said method else looping back to step (a). - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. A method for verifying conformance of an Information Technology (IT) structure of an IT system to an IT delivery environment, said method comprising:
-
verifying product standard compliance of the IT structure by verifying that a primitive composition of the IT structure does not comprise a non-abstract element that is not in conformance with all standards established for the IT delivery environment;
verifying compliance of software elements the primitive composition of the IT structure by verifying that the IT structure does not comprise a software element that is forbidden from being used in the IT delivery environment, and by further verifying that each software element of the IT structure required for use in the IT delivery environment satisfies all dependencies of said each software element required by the IT delivery environment;
verifying software application type compliance of the IT structure by verifying that the IT structure does not comprise a software application type that is forbidden by the IT delivery environment; and
verifying network traffic compliance of the IT structure by verifying that;
the IT structure does not use a protocol forbidden by the IT delivery environment, the IT structure does not comprise an interface on any port forbidden by the IT delivery environment from accessing external data flow into the IT delivery environment from outside of the IT delivery environment, and the IT structure does not comprise an interface on any port forbidden by the IT delivery environment from facilitating outward data flow from within the IT delivery environment to outside of the IT delivery environment. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code comprising an algorithm adapted to implement method for verifying conformance of an Information Technology (IT) structure of an IT system to an IT delivery environment, said method comprising:
-
verifying product standard compliance of the IT structure by verifying that a primitive composition of the IT structure does not comprise a non-abstract element that is not in conformance with all standards established for the IT delivery environment;
verifying compliance of software elements the primitive composition of the IT structure by verifying that the IT structure does not comprise a software element that is forbidden from being used in the IT delivery environment, and by further verifying that each software element of the IT structure required for use in the IT delivery environment satisfies all dependencies of said each software element required by the IT delivery environment;
verifying software application type compliance of the IT structure by verifying that the IT structure does not comprise a software application type that is forbidden by the IT delivery environment; and
verifying network traffic compliance of the IT structure by verifying that;
the IT structure does not use a protocol forbidden by the IT delivery environment, the IT structure does not comprise an interface on any port forbidden by the IT delivery environment from accessing external data flow into the IT delivery environment from outside of the IT delivery environment, and the IT structure does not comprise an interface on any port forbidden by the IT delivery environment from facilitating outward data flow from within the IT delivery environment to outside of the IT delivery environment. - View Dependent Claims (34, 35, 36, 37)
-
-
38. A process for integrating computing infrastructure, said process comprising integrating computer-readable code into a computing system, wherein the code in combination with the computing system is capable of performing a method for verifying conformance of an Information Technology (IT) structure of an IT system to an IT delivery environment, said method comprising:
-
verifying product standard compliance of the IT structure by verifying that a primitive composition of the IT structure does not comprise a non-abstract element that is not in conformance with all standards established for the IT delivery environment;
verifying compliance of software elements the primitive composition of the IT structure by verifying that the IT structure does not comprise a software element that is forbidden from being used in the IT delivery environment, and by further verifying that each software element of the IT structure required for use in the IT delivery environment satisfies all dependencies of said each software element required by the IT delivery environment;
verifying software application type compliance of the IT structure by verifying that the IT structure does not comprise a software application type that is forbidden by the IT delivery environment; and
verifying network traffic compliance of the IT structure by verifying that;
the IT structure does not use a protocol forbidden by the IT delivery environment, the IT structure does not comprise an interface on any port forbidden by the IT delivery environment from accessing external data flow into the IT delivery environment from outside of the IT delivery environment, and the IT structure does not comprise an interface on any port forbidden by the IT delivery environment from facilitating outward data flow from within the IT delivery environment to outside of the IT delivery environment. - View Dependent Claims (39, 40, 41, 42)
-
Specification