Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System and method for clustering host inventories

a host inventory and clustering technology, applied in the field of computer network administration and support, can solve the problems of incongruity between the executable software inventories, the differences between executable software inventories can arise in even the most tightly controlled network environment, and the impact of organization's incongruity

Active Publication Date: 2013-09-19
MCAFEE LLC
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a system and method for identifying similar software inventories on computers in a computer network. This is important for computer network administrators because it helps them to maintain congruity among the software on their computers. The system uses a clustering procedure to group together computers based on their software inventories and a similarity criteria. The method includes obtaining host file inventories for each host, calculating input data using the host file inventories, and providing the input data to a clustering procedure. The system can also use a similarity matrix or a matrix of keyword vectors to compare the software inventories of different hosts. Overall, the system helps to simplify the process of managing and supporting computer networks.

Problems solved by technology

The field of computer network administration and support has become increasingly important and complicated in today's society.
Differences between executable software inventories, however, can arise in even the most tightly controlled network environments.
In addition, each organization may develop its own approach to computer network administration and, consequently, some organizations may have very little congruency and may experience undesirable diversity of executable software on their computers.
Varied executable software inventories on computers within organizations present numerous difficulties to IT administrators to maintain, to troubleshoot, to service, and to provide uninterrupted access for business or other necessary activities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for clustering host inventories
  • System and method for clustering host inventories
  • System and method for clustering host inventories

Examples

Experimental program
Comparison scheme
Effect test

example embodiments

[0017]FIG. 1 is a pictorial representation of a computer network environment 100 in which embodiments of a system for clustering host inventories may be implemented in accordance with the present disclosure. Computer network environment 100 illustrates a network of computers including a plurality of hosts 110a, 110b, and 110c (referred to collectively herein as hosts 110), which may each have, respectively, a set of executable files 112a, 112b, and 112c (referred to collectively herein as sets of executable files 112) and a host inventory feed 114a, 114b, and 114c (referred to collectively herein as host inventory feeds 114). Hosts 110 may be operably connected to a central server 130 through communication link 120. Central server 130 may include an administrative module 140, a host inventory preparation module 150, and a clustering module 160. A management console 170 can also be suitably connected to central server 130 to provide an interface for users such as Information Technolo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method in one example implementation includes obtaining a plurality of host file inventories corresponding respectively to a plurality of hosts, calculating input data using the plurality of host file inventories, and then providing the input data to a clustering procedure to group the plurality of hosts into one or more clusters of hosts. The method further includes each cluster of hosts being grouped using predetermined similarity criteria. In more specific embodiments, each of the host file inventories includes a set of one or more file identifiers with each file identifier representing a different executable software file on a corresponding one of the plurality of hosts. In other more specific embodiments, calculating the input data includes transforming the host file inventories into a matrix of keyword vectors in Euclidean space. In further embodiments, calculating the input data includes transforming the host file inventories into a similarity matrix.

Description

TECHNICAL FIELD[0001]This disclosure relates in general to the field of computer network administration and support and, more particularly, to identifying similar software inventories on selected hosts.BACKGROUND[0002]The field of computer network administration and support has become increasingly important and complicated in today's society. Computer network environments are configured for virtually every organization and usually have multiple interconnected computers (e.g., end user computers, laptops, servers, printing devices, etc.). Typically, each computer has its own set of executable software, each of which can be represented by an executable software inventory. For Information Technology (IT) administrators, congruency among executable software inventories of similar computers (e.g., desktops and laptops) simplifies maintenance and control of the network environment. Differences between executable software inventories, however, can arise in even the most tightly controlled ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F17/30
CPCG06F17/30017G06F17/30705H04L41/0893G06F16/35G06F16/40
Inventor BHARGAVA, RISHIREESE, JR., DAVID P.
Owner MCAFEE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products