Integrated fingerprinting in configuration audit and management
First Claim
1. A computer implemented method for identifying whether applications are active in a computing system of an enterprise, the method comprising:
- defining and storing, by a computer device, a first plurality of fingerprints associated with a plurality of internal applications, wherein each of the first plurality of fingerprints comprises an identification code, a version number, and a build number, and wherein the plurality of internal applications are created by development staff within the enterprise;
defining and storing, by the computer device, a second plurality of fingerprints associated with a plurality of third party applications, wherein the second plurality of fingerprints comprise directory structures, files associated with the plurality of third party applications, times of last modification of one or more data stores associated with the plurality of third party applications, and types of modification of data in one or more data stores associated with the plurality of third party applications;
determining whether applications are internal applications or third party applications;
in response to determining that the applications are internal applications, searching, by the computer device, the computing system for fingerprints of the first plurality of fingerprints associated with the applications;
identifying the applications as active when the fingerprints of the first plurality of fingerprints are found;
in response to determining that the applications are third party applications, searching, by the computer device, the computing system for fingerprints of the second plurality of fingerprints associated with the applications, wherein the searching for the fingerprints of the second plurality of fingerprints comprises;
searching a plurality of directory structures of the computing system for the directory structures in the fingerprints of the second plurality of fingerprints;
searching a plurality of files of the computing system for the files associated with the applications in the fingerprints of the second plurality of fingerprints;
searching memory of the computing system for the data in the fingerprints of the second plurality of fingerprints in a predefined threshold number of searches, wherein the predefined threshold number of searches is greater than one;
searching one or more data stores of the computing system associated with the applications for the times of last modification in the fingerprints of the second plurality of fingerprints; and
searching one or more data stores of the computing system associated with the applications for the types of modification of data in the fingerprints of the second plurality of fingerprints; and
identifying the applications as active when a plurality of;
one or more of the directory structures in the fingerprints of the second plurality of fingerprints is found, one or more of the files in the fingerprints of the second plurality of fingerprints is found, one or more of the data in the fingerprints of the second plurality of fingerprints is found in one of the predefined threshold number of searches, one or more of the times of last modification in the fingerprints of the second plurality of fingerprints is found, and one or more of the types of modification of data in the fingerprints of the second plurality of fingerprints is found.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and computer implemented method for identifying active applications in an enterprise computing system is provided. The method includes defining a plurality of fingerprints for an application. A first fingerprint is related to a directory structure associated with the application. A second fingerprint is related to checking memory of at least some of the enterprise computing systems for data related to the application. The method includes searching the enterprise computing system for at least one fingerprint. The method includes when a fingerprint is found, identifying the application associated with the fingerprint as active.
71 Citations
20 Claims
-
1. A computer implemented method for identifying whether applications are active in a computing system of an enterprise, the method comprising:
-
defining and storing, by a computer device, a first plurality of fingerprints associated with a plurality of internal applications, wherein each of the first plurality of fingerprints comprises an identification code, a version number, and a build number, and wherein the plurality of internal applications are created by development staff within the enterprise; defining and storing, by the computer device, a second plurality of fingerprints associated with a plurality of third party applications, wherein the second plurality of fingerprints comprise directory structures, files associated with the plurality of third party applications, times of last modification of one or more data stores associated with the plurality of third party applications, and types of modification of data in one or more data stores associated with the plurality of third party applications; determining whether applications are internal applications or third party applications; in response to determining that the applications are internal applications, searching, by the computer device, the computing system for fingerprints of the first plurality of fingerprints associated with the applications; identifying the applications as active when the fingerprints of the first plurality of fingerprints are found; in response to determining that the applications are third party applications, searching, by the computer device, the computing system for fingerprints of the second plurality of fingerprints associated with the applications, wherein the searching for the fingerprints of the second plurality of fingerprints comprises; searching a plurality of directory structures of the computing system for the directory structures in the fingerprints of the second plurality of fingerprints; searching a plurality of files of the computing system for the files associated with the applications in the fingerprints of the second plurality of fingerprints; searching memory of the computing system for the data in the fingerprints of the second plurality of fingerprints in a predefined threshold number of searches, wherein the predefined threshold number of searches is greater than one; searching one or more data stores of the computing system associated with the applications for the times of last modification in the fingerprints of the second plurality of fingerprints; and searching one or more data stores of the computing system associated with the applications for the types of modification of data in the fingerprints of the second plurality of fingerprints; and identifying the applications as active when a plurality of;
one or more of the directory structures in the fingerprints of the second plurality of fingerprints is found, one or more of the files in the fingerprints of the second plurality of fingerprints is found, one or more of the data in the fingerprints of the second plurality of fingerprints is found in one of the predefined threshold number of searches, one or more of the times of last modification in the fingerprints of the second plurality of fingerprints is found, and one or more of the types of modification of data in the fingerprints of the second plurality of fingerprints is found. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system for identifying whether applications are active in a computing system of an enterprise, the system comprising:
-
at least one processor; and a memory storing computer executable instructions that, when executed, cause the at least one processor to; define and store a first plurality of fingerprints associated with a plurality of internal applications, wherein each of the first plurality of fingerprints comprises an identification code, a version number, and a build number, and wherein the plurality of internal applications are created by development staff within the enterprise; define and store a second plurality of fingerprints associated with a plurality of third party applications, wherein the second plurality of fingerprints comprise directory structures, files associated with the plurality of third party applications, times of last modification of one or more data stores associated with the plurality of third party applications, and types of modification of data in one or more data stores associated with the plurality of third party applications; determine whether applications are internal applications or third party applications; in response to determining that the applications are internal applications, search the computing system for fingerprints of the first plurality of fingerprints associated with the applications; identify the applications as active when the fingerprints of the first plurality of fingerprints are found; in response to determining that the applications are third party applications, search the computing system for fingerprints of the second plurality of fingerprints associated with the applications, wherein the search for the fingerprints of the second plurality of fingerprints further configures the at least one processor to; search a plurality of directory structures of the computing system for the directory structures in the fingerprints of the second plurality of fingerprints; search a plurality of files of the computing system for the files associated with the applications in the fingerprints of the second plurality of fingerprints; search memory of the computing system for the data in the fingerprints of the second plurality of fingerprints in a predefined threshold number of searches, wherein the predefined threshold number of searches is greater than one; search one or more data stores of the computing system associated with the applications for the times of last modification in the fingerprints of the second plurality of fingerprints; and search one or more data stores of the computing system associated with the applications for the types of modification of data in the fingerprints of the second plurality of fingerprints, and identify the applications as active when a plurality of;
one or more of the directory structures in the fingerprints of the second plurality of fingerprints is found, one or more of the files in the fingerprints of the second plurality of fingerprints is found, one or more of the data in the fingerprints of the second plurality of fingerprints is found in one of the predefined threshold number of searches, one or more of the times of last modification in the fingerprints of the second plurality of fingerprints is found, and one or more of the types of modification of data in the fingerprints of the second plurality of fingerprints is found. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable medium including program instructions for identifying whether applications are active in a computing system of an enterprise, the program instructions, when executed by a processor, cause the processor to:
-
define and store a first plurality of fingerprints associated with a plurality of internal applications, wherein each of the first plurality of fingerprints comprises an identification code, a version number, and a build number, and wherein the plurality of internal applications are created by development staff within the enterprise; define and store a second plurality of fingerprints associated with a plurality of third party applications, wherein the second plurality of fingerprints comprise directory structures, files associated with the plurality of third party applications, times of last modification of one or more data stores associated with the plurality of third party applications, and types of modification of data in one or more data stores associated with the plurality of third party applications; determine whether applications are internal applications or third party applications; in response to determining that the applications are internal applications, search the computing system for fingerprints of the first plurality of fingerprints associated with the applications; identify the applications as active when the fingerprints of the first plurality of fingerprints are found; in response to determining that the applications are third party applications, search the computing system for fingerprints of the second plurality of fingerprints associated with the applications, wherein the search for the fingerprints of the second plurality of fingerprints further causes the processor to; search a plurality of directory structures of the computing system for the directory structures in the fingerprints of the second plurality of fingerprints; search a plurality of files of the computing system for the files associated with the applications in the fingerprints of the second plurality of fingerprints; search memory of the computing system for the data in the fingerprints of the second plurality of fingerprints in a predefined threshold number of searches, wherein the predefined threshold number of searches is greater than one; search one or more data stores of the computing system associated with the applications for the times of last modification in the fingerprints of the second plurality of fingerprints; and search one or more data stores of the computing system associated with the applications for the types of modification of data in the fingerprints of the second plurality of fingerprints, and identify the applications as active when a plurality of;
one or more of the directory structures in the fingerprints of the second plurality of fingerprints is found, one or more of the files in the fingerprints of the second plurality of fingerprints is found, one or more of the data in the fingerprints of the second plurality of fingerprints is found in one of the predefined threshold number of searches, one or more of the times of last modification in the fingerprints of the second plurality of fingerprints is found, and one or more of the types of modification of data in the fingerprints of the second plurality of fingerprints is found. - View Dependent Claims (19, 20)
-
Specification