Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Systems and methods for event detection

a technology of event detection and event analysis, applied in error detection/correction, instruments, computing, etc., can solve the problems of increasing complexity of computer use, increasing the difficulty of consumer phone calls to help centers regarding spyware adware, and increasing the difficulty of finding

Inactive Publication Date: 2008-11-06
GLOBALFOUNDRIES INC
View PDF13 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a system and method for detecting events in computer systems and analyzing them to determine the likely cause. The system accesses logs of events from multiple computers and scans them for patterns. The system can detect both problematic and beneficial events. The detection service can be provided as a fee by a service provider and may involve a shared server or peer model. The system can also isolate and test potential causes of events without harming the host computer. The invention allows for automated testing and experimentation without human intervention and can provide a roll-back feature to restore computer systems to a previous state.

Problems solved by technology

Computer use is becoming increasingly complex, as traditional operating systems are under continual attack by a panoply of malicious software agents including viruses, nonviral “malware,” adware, spyware, and Web browser hijackers.
Viral and nonviral threats are very serious concerns for consumers, service providers, help desks, and computer and software manufacturers.
Additionally, operating systems may contain inefficiencies and errors that cause them to fail when a user runs a program or takes other seemingly innocuous actions.
Consumer phone calls to help centers regarding spyware adware typically require significant troubleshooting time.
Usually the complaint is that the computer is performing slowly.
Consumers often do not understand the differences among adware, spyware, worms, and viruses—and the lack of knowledge costs Internet service providers significant money.
Problems may arise on certain computer systems as a result of various kinds of user actions that trigger the installation of malicious software or computer registry changes.
The problem may not appear when the user visits a web site, but might appear when the user clicks a link from that web site that redirects the browser to another site, in a nonobvious manner, that contains the offending software.
However, it is not always clear as to which one of a number of steps or events prior to a problem is the true cause of the problem.
Computer terrorism may involve attacks that modify the logic of a computing system in order to introduce delays or to make the system unpredictable.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for event detection
  • Systems and methods for event detection
  • Systems and methods for event detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020]The present invention provides a detection service that facilitates the automatic localizing the cause of items of interest associated with computer systems.

[0021]With reference to FIG. 1, there is provided in accordance with at least one presently preferred embodiment of the present invention an agent 102 that is installed on a client 101 or server system 103 and that is responsible for tracking specific events. These events may be caused by software, the user, services provider, company, or group of users, and include, for example, such trackable events as mouse events, keyboard events, browser requests via http and ftp, mail events via SMTP, and various other events that could affect the functioning and response of a user's system, such as system 101. Often, the events of most interest will be those that may affect the system in a negative fashion, such as associated with adware, spyware, software installations, and viral and nonviral threats. However, these items of intere...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system accesses a log of events on more than one computing system and scans these logs in an effort to determine the likely cause of various items of interest, events, or problems. These items of interest often include improper or frustrating behavior of a computer system, but may also include delightful or beneficial behaviors for which a user, group of users, company, service, or help desk seeks a cause. Once the likely source of the item of interest is found, a test may be performed to confirm the source of the problem and warning or corrective action taken.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation application of copending U.S. patent application Ser. No. 11 / 096,659 filed on Mar. 31, 2005, the contents of which are hereby fully incorporated by reference in its entiretyFIELD OF THE INVENTION[0002]The present invention relates generally to systems and methods for event detection and analysis. More specifically, this invention relates to determining causes of concerns encountered by users of computing systems.BACKGROUND OF THE INVENTION[0003]Computer use is becoming increasingly complex, as traditional operating systems are under continual attack by a panoply of malicious software agents including viruses, nonviral “malware,” adware, spyware, and Web browser hijackers. Viral and nonviral threats are very serious concerns for consumers, service providers, help desks, and computer and software manufacturers. Additionally, operating systems may contain inefficiencies and errors that cause them to fail wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F11/00G06F11/34
CPCG06F11/0748G06F11/079G06F21/552
Inventor BANTZ, DAVID F.CHEFALAS, THOMAS E.MESTRIANNI, STEVEN J.PICKOVER, CLIFFORD A.
Owner GLOBALFOUNDRIES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products