Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A METHOD AND SYSTEM FOR POPULATING A SOFTWARE CATALOGUE WITH RELATED PRODUCT INFORMATION
Document Type and Number:
WIPO Patent Application WO/2008/119610
Kind Code:
A1
Abstract:
A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.

Inventors:
MACLELLAN SCOT (IT)
SECOMANDI ANTONIO (IT)
DI LITTA LUCA (IT)
PICHETTI LUIGI (IT)
SECCHI MARCO (IT)
Application Number:
PCT/EP2008/052607
Publication Date:
October 09, 2008
Filing Date:
March 04, 2008
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
IBM (US)
IBM FRANCE (FR)
MACLELLAN SCOT (IT)
SECOMANDI ANTONIO (IT)
DI LITTA LUCA (IT)
PICHETTI LUIGI (IT)
SECCHI MARCO (IT)
International Classes:
G06F9/44; G06Q30/00
Foreign References:
EP1746501A12007-01-24
EP1376345A22004-01-02
EP1521172A22005-04-06
Attorney, Agent or Firm:
BELL, Mark (Département de Propriété IntellectuelleLe Plan du Bois, La Gaude, FR)
Download PDF:
Claims:

CLAIMS

1. A method of populating a software catalogue with software product identifiers corresponding to software products being discovered on a plurality of data processing systems, the method including the steps of: scanning the file systems of the plurality of data processing system for detecting the occurrence of a set of files indicative of a product being installed on a data processing system, the set of files including at least one manifest file containing information on at least one referenced software product; determining a product signature associated to the referenced product using the information of the manifest file; storing the signature and an associated software product identifier on the software catalogue.

2. The method of claim 1, wherein the manifest file includes an XML document.

3. The method of any preceding claim wherein the at least one referenced software product includes the software product related to the detected set of files.

4. The method of any preceding claim wherein the at least one referenced software product includes a software product different from the product related to the detected set of files .

5. The method of any preceding claim wherein the at least one manifest file includes a link to another manifest file.

6. The method of any preceding claim wherein the signature includes a file identifier associated to one of the files of the corresponding set of files.

7. The method of any preceding claim wherein the association of the signature with a software product identifier is based on information extracted by the files included in the corresponding set of files.

8. A method for inventorying software products, across a plurality of data processing systems, using the method of any preceding claim.

9. A computer program for performing the method of any preceding claim when the computer program is executed on a data processing system.

10. A system including means for performing the steps of the method according to any claim from 1 to 8.

11. A service deployed in a data processing system for performing the method of any claim from 1 to 8.

Description:

A method and system for populating a software catalogue with related product information

Field of the invention

The present invention relates to the data processing field. More specifically, the present invention relates to methods and systems for detecting the presence of software products on distributed data processing system. In particular the activity of knowledge gathering and catalogue population is addressed by the present invention. The invention further relates to a computer program for performing the method, and to a product embodying the program. Moreover, the invention also relates to a corresponding apparatus.

Background art

Software applications that operate in the System Management field, base their function on a predefined set of information. This is for example the case with Software Inventory products, e.g. IBM Tivoli Configuration Manager (ITCM) of International Business Machines Corporation, which need to correlate the existence of a certain file on the file

system with a certain product. This correlation information is stored within the application repository. Another example comes from license management products, e.g. IBM Tivoli License Manager (ITLM) of International Business Machines Corporation, where information about the actual program execution (myProgram.exe) needs to be correlated to predefined product .

Another example is the Application Monitoring discipline, where the management system is used to monitor the state of applications running on servers. In this case the management system needs to know each of the monitored application interface one by one as each application has it's own method to check application status and its own method to start and stop executions.

The setup and maintenance of this predefined set of information when dealing with large scale environments can act as a limiting factor for the affected System Management applications .

This information needs to be collected from Software Development teams that develop the Applications that are subject to Management Discipline. Then the information needs to be managed and stored into databases normally known as

Knowledge Base. Finally the information needs to be extracted from the KB into a format that is consumable by the System Management Application.

Normally this knowledge base is in the form of a catalogue which contains definitions of software products (e.g. product names and version) and the related signature. The software catalogue lists all the known products which can be found on the managed systems; each product can be identified by one or

more executable modules indicative of its running. As an example, in the case of a License Manager product, a licensing agent working in the background detects the executable modules that have been launched; the licensing agent then identifies the corresponding products through the software catalogue. The catalogue needs to be "populated" and this is normally a costly activity.

Several IT management solutions exist that perform the discovery of installed software for either inventory or licensing purposes. One form of software discovery that is particularly effective exploits a previously defined signature for each product that has to be discovered. The term signature means any type of information that can be consumed by a software discovery application to determine the presence of one or more instances of a software product on a given computer. A typical and particularly simple implementation of a signature is one that specifies the file-name and the file-size of a key application file. In this case, detecting a file with matching characteristics would cause the signature to be matched, thus indicating that the associated software product is installed. One advantage of a signature-based approach to software discovery is that the matching of a signature can be correlated by a management application to a precise definition (name, version, etc.) of the entity (software product) being discovered. A software inventory application which exploits signature-based discovery of installed software therefore has the need of accessing a comprehensive knowledge base of product and signature definitions. The challenge of this approach is to maintain its content up-to-date with respect to:

- new software products being continuously made available;

- maintenance updates to existing software products.

The value of the Knowledge Base is directly proportional to the coverage and accuracy of its content, therefore the problem is how to guarantee coverage and accuracy at an affordable cost.

It would therefore be highly desirable an improved method which could help reducing the Knowledge Base management overhead while introducing a scalable and efficient method to deal with the information that are needed at runtime.

It is an object of the present invention to provide a method and a system which alleviates the above drawbacks.

Summary of the invention

According to the present invention we provide a method of populating a software catalogue with software product identifiers corresponding to software products being discovered on a plurality of data processing systems, the method including the steps of: scanning the file systems of the plurality of data processing system for detecting the occurrence of a set of files indicative of a product being installed on a data processing system, the set of files including at least one manifest file containing information on at least one referenced software product; determining a product signature associated to the referenced product using the information of the manifest file; storing the signature and an associated software product identifier on the software catalogue.

Another aspect of the present invention provides a computer program for performing the above-described method.

A still further aspect of the invention provides a program product embodying this program.

Moreover, another aspect of the invention provides a corresponding apparatus for implementing the above method.

The novel features believed to be characteristic of this invention are set forth in the appended claims. The invention itself, however, as well as these and other related objects and advantages thereof, will be best understood by reference to the following detailed description to be read in conjunction with the accompanying drawings.

Brief description of the drawings

Figure 1 is a schematic block diagram of a data processing system in which the method of the invention is applicable;

Figure 2 shows the functional blocks of a generic computer of the system; Figure 3 depicts the main components that can be used for practicing the method; and Figures 4 shows a diagram describing the flow of activities relating to an illustrative implementation of the method.

Detailed description of the preferred embodiment (s)

With reference in particular to Figure 1, a data processing system 100 with distributed architecture implementing a Software Inventory system, is depicted. The

system 100 includes multiple endpoints 105, which are grouped into different sets. The endpoints 105 can be workstations, servers, laptops and more generally any kind of data processing system where a plurality of software products is installed. The endpoints 105 are connected to each other through a network 110 (for example, a LAN) . The different sets of endpoints 105 communicate with a remote system management server 115 through a network 120 (for example, INTERNET-based) ; the system management server 115 implements a central repository where inventory data of the system 100 is collected and managed. As mentioned above, the present invention may be implemented in a license management system, but more generally in any system requiring an inventory activity, e.g. a software deployment system which needs to distribute fixes or enhancements to a plurality of workstation, after having inventoried the current status of each workstation; another possible use is within a configuration management system.

As shown in Figure 2, a generic computer of the system (workstation, local server, or system management server) is denoted with 150. The computer 150 is formed by several units that are connected in parallel to a system bus 153. In detail, one or more microprocessors (//P) 156 control operation of the computer 150; a RAM 159 is directly used as a working memory by the microprocessors 156, and a ROM 162 stores basic code for a bootstrap of the computer 150. Peripheral units are clustered around a local bus 165 (by means of respective interfaces) . Particularly, a mass memory consists of a hard-disk 168 and a drive 171 for reading CD-ROMs 174. Moreover, the computer 150 includes input devices 177 (for example, a keyboard and a mouse) , and output devices 180 (for example, a monitor and a printer) . A Network Interface Card (NIC) 183 is used to connect the computer 150 to the network. A bridge unit 186 interfaces the system bus 153 with the local bus 165. Each microprocessor

156 and the bridge unit 186 can operate as master agents requesting an access to the system bus 153 for transmitting information. An arbiter 189 manages the granting of the access with mutual exclusion to the system bus 153. Similar considerations apply if the system has a different topology, or it is based on other networks. Alternatively, the computers have a different structure, include equivalent units, or consist of other data processing entities (such as PDAs, mobile phones, and the like) . In any case, the solution of the invention is also suitable to be used in a system wherein the control of the workstations is decentralized, or even in a stand-alone computer.

Considering now Figure 3, the main components that can be used to practice the method of a preferred embodiment of the invention are denoted as a whole with 300. The information (programs and data) is typically stored on the hard-disks of the different computers and loaded (at least partially) into the corresponding working memories when the programs are running . A System Management Server 115 controls and executes management operations on several endpoints 105, connected by a communication network. The set of endpoints 105 includes servers, workstations, desktops or laptops, whose installed software is analyzed with the objective of enlarging the available base of product definitions and related signatures and discover software products.

The Systems Management Server 115 controls management operations on a potentially large set of interconnected endpoints 105, thus avoiding the need of physically visiting each computer. This server and the underlying systems management infrastructure are used for performing a scanning operation on the managed computers with the goal of collecting raw data needed by the analysis application; and for moving data generated locally by the scanners to a central

file-server 301, where these data can be stored on the server's file system. The scanning operation may be performed on all managed endpoints 105 or on a specific subset, the latter being possibly determined by their role (servers, workstations, desktops or laptops) or by the running operating system.

According to a preferred embodiment of the present invention, the above data gathering method is implemented by using IBM Software Signature Analyzer Tool; it is however understood by those skilled in the art that other methods, producing similar results could be used instead. The method includes a mechanism which helps in increasing the knowledge of the overall system without causing big overhead to the system itself. The present method is based on the concept that the Managed Application (the application that is managed by the System Management Application) manifest it's management interfaces using an Application Management Manifest file. Block 105 of Figure 3 represents in general the plurality of targets 105, however in the Figure only a number of Manifest files are represented to show their relations and possible cross references.

The System Management Application will detect the Manifest file at Runtime on the systems where the Managed Application is installed and extract the information which are included in the Manifest file. A Manifest file can point to another (or more than one) Manifest file which in turn could point to one or more Manifest files

Manifest file, can take the form of an XML document, which includes a set of well-known tags, like product name, vendor name, version details, il8n info but also control commands (start/stop interfaces) , lifecycle information (url where to download a more recent version of the product, etc) .

Here is an example of a Manifest file:

<ProductManifest> <ID>

<ProductName>IBM Tivoli License Compliance Manager</ProductName> <Version>2</Version> <Release>3</Release> <Modification>K/Modification> <Fixpack>K/Fixpack> <VendorName>IBM</VendorName> <VendorHome>Program Files\IBM</VendorHome>

<ProductId>l</ProductId> </ID> <Monitor>

<SignatureExeFile> <FileName>TLM.exe</FileName>

<FileSize>15000</FileSize> </SignatureExeFile> </Monitor> <LifeCycle> <DownloadURL>www. ibm. com/support/ITLCM</DownloadURL> </LifeCycle> <ManagentCommand>

<StartCommad>srvstart</StartCommad> <StopCommand>srvstop</StopCommand> <MonitorCommad>srvcheck</MonitorCommad> </ManagentCommand> <RelatedProducts> <product>

<ProductId>IBM WebSphere Application Server</Productld> <ProductLocation>Program

Files\IBM\WebSphere\</ProductLocation>

</product> </RelatedProducts> <SameVendor> <ProductId>Program Files\IBM\HTTP Server\ProductManifest . xml</ProductId>

<ProductId>Program FiIes\ IBM\DB2\ProductManifest . xml</ProductId>

</SameVendor> </ProductManifest>

The Manifest file can be in addition used to provide a ranking support for customers that have to make selections in ambiguous situations.

Manifest file can reference also other product Manifest files which are related in some way to the current product, in such case the agents can select from the aggregated catalog

also the information of the related products. For example a product manifest file could contain reference to the manifest file of other products delivered from the same vendor.

In this way, according to the example above, the ITLM product is able to detect the existence of the referenced application and update the software catalogue (the Knowledge Base) during standard application operation. The Information needed for the discovery are on the machine, hence avoiding unnecessary correlation duties.

Further the application management manifest can contain information about which file must be in execution on to the operating system to consider that the managed application is running, which command the Management application can issue to start or stop the managed application.

The present invention aims at populating the Knowledge Base 307 using the gathered information. In this way the Knowledge Base is broadened exploiting the normal activity of the Software Application. With the present method a more efficient update of the Knowledge Base can be performed without the need of a specific process or manual procedure by leveraging the references which are included in the Manifest files to other related applications and Manifest Files. The data harvested from the selected computers stored in the file-system of the central file-server, from which the data can be accessed by the Analysis Application 303. Analysis Application 303 implements the data transformation and the analysis leading to the creation of new product definitions and related signatures.

The Analysis Application 303 combines the data gathered as explained above with registry information contained in Operating System Registry 305. This combined product

definition and a related signature is then generated and stored in the Software Knowledge Base 307. A Software Knowledge Base 307 is a database holding a set of consolidated product definitions and signatures. The database can be initially empty or it can be populated with data created by a provider of software signatures. The new definitions produced by the analysis application are consolidated in this database.

Considering now Figure 4, the logic flow of generating a product signature according to an embodiment of the invention is represented with a method 400. The method begins at the black start circle 401. Continuing to block 403 data are gathered throughout the endpoints 105. At step 405 Manifest files are detected during normal operations by means of existing discovery procedures, e.g. well known Operating System registry keys pointing to an existing Manifest file or file system scan looking for predetermined Manifest file name matching criteria. As explained above Manifest files contains information about the detected software product and/or reference to another software product which can be related in some way to the detected software product. A Manifest file could be also detected as a consequence of a cross-reference from another Manifest file (as mentioned above with reference to Fig. 3) . At step 407 it is checked whether the referenced software product is already known to the system, i.e., according to a preferred embodiment of the present invention, if an entry relating to such referenced software product is found in the Knowledge Base 307. If the software product is already listed, no further action is needed and the control goes back to step 403. As an alternative embodiment it would be possible to verify whether the information contained in the Knowledge Base is complete or whether it can be integrated with the content of the Manifest file. If the result of the check of step 407 is negative, the method takes advantage of

the information contained in the Manifest file. According to an embodiment of the present invention a further check (409) is performed to verify the presence of the referenced software product on the monitored systems (e.g. on the plurality of endpoints 105) . If this is the case the Knowledge Base 307 is updated with the information provided by the Manifest file

(step 411), otherwise it is saved for future use (step 413). A possible alternative is to update the Knowledge Base 307 in any case, so that the check 409 is not necessary. Or also the information contained in the Manifest file could be integrated with other information gathered from the system with traditional methods.

Similar considerations apply if programs and data are structured in a different manner, if other modules or functions are provided, or if the information is stored in equivalent memory structures.

Similar considerations apply if the method includes equivalent or additional steps.

Alternatively, for example different methods of obtaining the information on the inspected endpoints can be used, depending also on the operating system on which the system is installed. It would be possible for example that the Manifest file "manifests" their presence to the System Management application at predetermined times or with pretermined rules. Although the invention has been described above with a certain degree of particularity with reference to preferred embodiment (s) thereof, it should be understood that various changes in the form and details as well as other embodiments are possible. Particularly, it is expressly intended that all combinations of those elements and/or method steps that substantially perform the same function in the same way to achieve the same results are within the scope of the invention.

In any case, the method of the invention can be used for discovering, inventorying or metering any kind of software products (such as video games, multimedia works, and the like) . In addition, the programs can be distributed on any other computer readable medium (such as one or more DVDs); alternatively, the programs are pre-loaded onto the hard-disks, are transmitted to the computers, are broadcast, or more generally are provided in any other form directly loadable into the working memories of the computers.

Moreover, it will be apparent to those skilled in the art that the additional features providing further advantages are not essential for carrying out the invention, and may be omitted or replaced with different features. In any case, the method according to the present invention is also suitable to be carried out with a hardware structure (for example, integrated in a chip of semiconductor material), or with a combination of software and hardware.

Naturally, in order to satisfy local and specific requirements, a person skilled in the art may apply to the solution described above many modifications and alterations all of which, however, are included within the scope of protection of the invention as defined by the following claims .