Method and apparatus for doing electronic asset inventory from backup tapes
First Claim
1. A method of automatically discovering assets on one or more networks connecting computing devices comprising:
- executing an automatic asset discovery program on a computer to compare fingerprints to one or more sources of data so as to conduct an automated inventory of assets;
designating as one or more sources of data backup tapes or backup disk drive images or both which contain data against which said fingerprints can be compared.
9 Assignments
0 Petitions
Accused Products
Abstract
A system to conduct automatic asset discovery inventory of a company'"'"'s computing assets from backup images stored on a backup system. In more complex embodiments, user interface tools are provided to provide a choice of sources of data from which to conduct said inventory discovery. The user can choose between backup images, the actual computing systems and other nodes on one more networks of a company or third party software. If third party software is chosen, data gathered by the software about the network topology and attributes of systems on the network is gathered and converted to an intermediate data format. This intermediate data format is then converted to a data format understood by said automatic asset discovery system and then fingerprints stored in said automatic asset discovery system are compared to said data and conclusions drawn about the attributes of the network and systems on it. These conclusions are then stored in a repository along with conclusions drawn from comparison of fingerprints to said backup images and/or said computing systems themselves.
149 Citations
53 Claims
-
1. A method of automatically discovering assets on one or more networks connecting computing devices comprising:
-
executing an automatic asset discovery program on a computer to compare fingerprints to one or more sources of data so as to conduct an automated inventory of assets;
designating as one or more sources of data backup tapes or backup disk drive images or both which contain data against which said fingerprints can be compared. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A process for using a computer to automatically discovery the existence and type of assets in an organization, comprising the steps of:
-
using one or more network fingerprints to determine the existence of one or more networks and gather information about any discovered networks to determine the type and attributes thereof including the valid addresses on each discovered network, and make an entry in element and data tables recording the attributes of each discovered network;
using the valid addresses of each discovered network and one or more network interface card fingerprints, discovering all the network interface cards that exist on each discovered network and the attributes of each and making an entry in said element and data tables for each found network interface card;
for each network interface card found, accessing backup disk drive images and using fingerprints to examine each file system stored on the backup images for the computing systems coupled to each network interface card found, and using said fingerprints to determine the type of operating system installed and the hardware and software configuration of the computer upon which the operating system is installed.
-
-
8. A method of automatically discovering assets on one or more networks connecting computing devices, comprising:
-
A) executing an automatic asset discovery program on a computer;
B) accessing a backup system which stores backup images of the hard disks of at least some of said computing systems on said one or more networks, and using said automatic asset discovery program to compare data in said backup images to fingerprints stored in said automatic asset discovery program and draw conclusions therefrom as to the software and/or hardware configuration of at least some of said computing system which has a backup image stored on said backup system. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of doing an inventory to automatically discovering assets on one or more networks connecting computing devices and the hardware and/or software configuration thereof, comprising:
-
A) presenting user interface tools to a user of an automatic asset discovery program that provides a choice of source of data to be compared to fingerprints used by said automatic asset discovery program in order to determine hardware and/or software configuration of one or more nodes on a network, said choices including;
backup images of hard disks stored on a backup system;
one or more nodes on a network including actual computing systems;
a combination of backup images and one or more nodes on a network; and
/or one or more third party programs each of which is capable of gathering data of interest;
B) receiving a user choice of a source of data against which said fingerprints will be compared;
C) executing an automatic asset discovery program on a computer to carry out an appropriate search or gathering process to obtain data from the user designated source, said search or gathering process comprising;
1) if actual computing devices and/or nodes on a network are selected as a source of data, using said automatic asset discovery program to compare at least some of said fingerprints to data in said actual computing devices and/or nodes to ascertain the hardware and/or software configuration thereof and recording the configuration so discovered in a repository for every actual computing device and/or node so examined;
2) if backup images are designated as the source of data, accessing said backup system and comparing at least some of said fingerprints stored in an automatic asset discovery program to data in backup images; and
3) if one or more third party applications is selected as the source of data, accessing data gathered by said third party application(s) and stored in a repository, and converting said data to an intermediate data format so as to preserve its semantic meaning and then converting said intermediate format data to a predetermined data format of said automatic asset discovery program and comparing at least some of said fingerprints stored in said automatic asset discovery program to said data in said predetermined data format and drawing conclusions about the attributes of systems from which said data was gathered and storing said conclusions in a repository;
D) presenting user interface tools to allow an operator to indicate if further discovery is needed, and determining if any further discovery is needed from operator inputs and responding thereto by repeating steps A, B, C and D, until said operator indicates no further discovery is desired. - View Dependent Claims (21)
-
-
22. A method of doing an inventory to automatically discovering assets on one or more networks connecting computing devices and the hardware and/or software configuration thereof, comprising:
-
A) probing one or more networks to determine active computing systems thereon;
B) accessing a backup system storing backup images of the hard disks of at least some of said active computing systems on said one or more networks and determining if there are more active computing systems than there are backup images and creating a list of which active computing systems do not have backup images;
C) presenting user interface tools to a user of an automatic asset discovery program that provides a choice of source of data to be compared to fingerprints used by said automatic asset discovery program in order to determine hardware and/or software configuration of one or more nodes on a network, said choices including;
backup images of hard disks stored on a backup system, or, one or more nodes on a network including actual computing systems;
D) receiving a user choice of a source of data against which said fingerprints will be compared;
E) executing an automatic asset discovery program on a computer to carry out an appropriate search or gathering process to obtain data from the user designated source, said search or gathering process comprising;
1) if actual computing devices and/or nodes on a network are selected as a source of data, using said automatic asset discovery program to compare at least some of said fingerprints to data in said actual computing devices and/or nodes to ascertain the hardware and/or software configuration thereof and recording the configuration so discovered in a repository for every actual computing device and/or node so examined;
2) if backup images are designated as the source of data, accessing said backup system and comparing at least some of said fingerprints stored in an automatic asset discovery program to data in backup images;
F) presenting user interface tools to allow an operator to indicate if further discovery is needed, and determining if any further discovery is needed from operator inputs and responding thereto by repeating steps C, D, E and F until said operator indicates no further discovery is desired.
-
-
23. A method of doing an inventory to automatically discovering assets on one or more networks connecting computing devices and the hardware and/or software configuration thereof, comprising:
-
A) probing one or more networks to determine active computing systems thereon;
B) accessing a backup system storing backup images of the hard disks of at least some of said active computing systems on said one or more networks and determining if there are more active computing systems than there are backup images and creating a list of which active computing systems do not have backup images;
C) accessing said backup system and comparing at least some of said fingerprints stored in an automatic asset discovery program to data in backup images; and
D) if there are more active computing systems than backup images, optionally continuing discovery by comparing at least some of said fingerprints to said active computing system discovered during performance of step A) which do not have backup images. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A process comprising:
-
A) accessing a backup system having backup images of nonvolatile memories of at least some of said computing systems and searching backup images stored thereon using fingerprints to ascertain the software and/or hardware configuration of each computing system whose backup image is stored;
B) storing conclusions regarding software and/or hardware configurations in a repository;
C) determining if additional discovery needs to be performed;
D) if additional discovery is to be performed, accessing one or more active computing systems on said network and searching each system so accessed using fingerprints to ascertain the software and/or hardware configuration thereof, and repeating step D to store the conclusions developed in this step E; and
E) if no additional discovery is to be performed, ending said process. - View Dependent Claims (29, 30)
-
-
31. A computer-readable medium containing computer-readable instructions which can control a computer to perform the following process:
-
executing an automatic asset discovery program on a computer to compare fingerprints to one or more sources of data so as to conduct an automated inventory of assets;
designating as one or more sources of data backup tapes or backup disk drive images or both which contain data against which said fingerprints can be compared. - View Dependent Claims (32, 33, 34, 35, 36)
-
-
37. A computer-readable medium containing computer-readable instructions which can control a computer to perform the following process:
-
using one or more network fingerprints to determine the existence of one or more networks and gather information about any discovered networks to determine the type and attributes thereof including the valid addresses on each discovered network, and make an entry in element and data tables recording the attributes of each discovered network;
using the valid addresses of each discovered network and one or more network interface card fingerprints, discovering all the network interface cards that exist on each discovered network and the attributes of each and making an entry in said element and data tables for each found network interface card;
for each network interface card found, accessing backup disk drive images and using fingerprints to examine each file system stored on the backup images for the computing systems coupled to each network interface card found, and using said fingerprints to determine the type of operating system installed and the hardware and software configuration of the computer upon which the operating system is installed.
-
-
38. A computer-readable medium containing computer-readable instructions which can control a computer to perform the following process:
-
A) executing an automatic asset discovery program on a computer;
B) accessing a backup system which stores backup images of the hard disks of at least some of said computing systems on said one or more networks, and using said automatic asset discovery program to compare data in said backup images to fingerprints stored in said automatic asset discovery program and draw conclusions therefrom as to the software and/or hardware configuration of at least some of said computing system which has a backup image stored on said backup system. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A computer-readable medium storing computer-readable instructions which, when executed by a computer, cause said computer to perform the following steps:
-
A) probing one or more networks to determine active computing systems thereon;
B) accessing a backup system storing backup images of the hard disks of at least some of said active computing systems on said one or more networks and determining if there are more active computing systems than there are backup images and creating a list of which active computing systems do not have backup images;
C) accessing said backup system and comparing at least some of said fingerprints stored in an automatic asset discovery program to data in backup images; and
D) if there are more active computing systems than backup images, optionally continuing discovery by comparing at least some of said fingerprints to said active computing system discovered during performance of step A) which do not have backup images.
-
Specification