WO2010027477A1 - System and method for software usage discovery - Google Patents

System and method for software usage discovery Download PDF

Info

Publication number
WO2010027477A1
WO2010027477A1 PCT/US2009/004983 US2009004983W WO2010027477A1 WO 2010027477 A1 WO2010027477 A1 WO 2010027477A1 US 2009004983 W US2009004983 W US 2009004983W WO 2010027477 A1 WO2010027477 A1 WO 2010027477A1
Authority
WO
WIPO (PCT)
Prior art keywords
software
executable
computer
information
executables
Prior art date
Application number
PCT/US2009/004983
Other languages
French (fr)
Inventor
Christopher J. Enscoe
Gary H. Newman
Original Assignee
Belarc, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Belarc, Inc. filed Critical Belarc, Inc.
Publication of WO2010027477A1 publication Critical patent/WO2010027477A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/323Visualisation of programs or trace data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/865Monitoring of software

Definitions

  • the invention relates generally to systems and methods of managing information about a plurality of computers and, more particularly, to systems and methods for discovering and reporting information about software usage on such computers.
  • the illustrative embodiment of the invention includes a network of client computers that are interconnected with a server over an intranet, or the Internet, or other communications link.
  • the server and/or one or more of the client computers is coupled to one or more associated databases.
  • the software usage discovery system of the present invention runs on each client computer in the network and gathers usage data about application executable files from various storage locations on those client computers in the network, or on an individual computer.
  • the software usage information is extracted from various files, registry keys and other storage locations that contain such information as is relevant to the usage of application executable files on the network, as well as the associated one or more of the databases.
  • a client computer is programmed to collect usage data and aggregate the data into "software items."
  • Each software item as used herein represents an application executable and stores it in a table with information about the executable or version thereof. Based upon the software items for a given executable file that the client computer discovers from its own disks or memory, the important data from each of the software items is included in a record that may be uploaded to the associated database and included in reports generated using the data in the database.
  • the present invention is directed primarily to discovering usage information relating to executable files, however, the invention may be adapted to discovering access or usage of data files, if desired in a particular application of the invention.
  • data about usage of application executable files from a number of sources are incorporated into corresponding software items for several methods for each executable.
  • the software items are then merged such that all of the relevant information about a particular executable is extracted from each software item to create a record of executables that are installed on that computer.
  • the merge process involves multiple queries that are applied to adjacent items on the list that refer to the same file path. If a duplication is found, important data from the duplicate item is transferred to the retained item and the duplicate is then discarded.
  • the merged items for the executables may then be uploaded to the server and the server stores the items as records in an associated database.
  • the server may then generate one or more reports from the records of certain or all of the computers in a suitable manner as requested by the administrator.
  • the information in the reports may then be displayed in a graphic user interface (GUI) that allows a user to view and utilize the information.
  • GUI graphic user interface
  • Fig. 1 is a functional block diagram of an illustrative system with which the present invention can be advantageously employed;
  • Fig. 2 is a chart referred to herein as a software item which contains usage data that is collected for a particular executable application in accordance with an illustrative embodiment of the present invention
  • Fig. 3 is a flow chart of an illustrative procedure by which the client computer discovers executable files, and generates a software item for each executable file;
  • Figs. 4A and 4B together form a flow chart of a procedure by which the client computer merges software items that relate to the same executable and generates a record in accordance with an illustrative embodiment of the method of the present invention
  • Fig. 5 is a chart illustrating usage graphics which are employed to indicate time of last use in accordance with an illustrative embodiment of the present invention
  • Fig. 6A is a graphic user interface for depicting software versions for a computer or a network of computers using any application executable file that may be part of a suite of executable files that make up a particular software program in accordance with an illustrative embodiment of the present invention
  • Fig. 6B is a graphic user interface for depicting software versions for computer systems using a particular software version in accordance with an illustrative embodiment of the present invention
  • Fig. 7 is a graphic user interface for depicting the installed software section of a computer profile summary for computer profile data
  • Fig. 8 is a graphic user interface for depicting details for any executable file that may be part of a suite of executable files that make up a particular software program in a computer profile in accordance with an illustrative embodiment of the present invention
  • Fig. 9 is a graphic user interface for depicting the software version section of a computer profile summary for an individual computer in accordance with an illustrative embodiment of the present invention
  • Fig. 10 is a flow chart of a procedure for obtaining information from a
  • Fig. 11 is a flow chart of an alternative procedure for obtaining information from a Windows PreFetch file in accordance with an illustrative embodiment of the present invention.
  • Fig. 12 is a chart illustrating exemplary header data in a Windows® Prefetch File which can be advantageously employed in accordance with an illustrative embodiment of the present invention.
  • Fig. 13 is a chart illustrating exemplary header data in the new Windows 7 operating system regarding User Assist keys. DETAILED DESCRIPTION OF AN ILLUSTRATIVE
  • Fig. 1 is a functional block diagram of an illustrative system with which the present invention can be advantageously employed.
  • Fig. 1 depicts a system 2 that includes a plurality of client computers 10 in communicating relationship with a server 14.
  • an intranet denoted by reference character 16.
  • the present invention is not limited to a network by which the computers are connected by an intranet, but can be advantageously employed with a set of computers connected by another type of computer network, such as a point-to-point link, shared local area network, wide area network, or virtual private network implemented over a public network, such as the Internet or coupled in communicating relationship in another fashion.
  • the present invention is also applicable to individual computers.
  • the server 14 may perform a number of functions but in particular, the server
  • the 14 is a software discovery server in accordance with the invention, which communicates with a computer information database 18.
  • the computer information database 18 contains, among other things, computer profile data for the computers in the system that are connected by intranet 16 or other communication mechanism with the server or the database.
  • the computers 10 run client profile software that, at the respective computers, collects profile data and uploads the data to the server 14.
  • the software running on each of the client computers is denoted in Fig. 1 as client profile software module 22.
  • a software usage discovery program 24 is also loaded into the memory 26 of the client computers 10 in accordance with the present invention.
  • the server 14 contains a corresponding program 20 in its memory 21.
  • One system with which the present invention may be illustratively employed is that which is disclosed in commonly owned United States Patent Application Serial No. 10/627,191 of Newman, et al. for a GROUPING OF COMPUTERS IN A COMPUTER INFORMATION DATABASE SYSTEM, filed on July 25, 2003, which is presently incorporated by reference herein in its entirety, which provides a system for profiling computers that gathers computer profile data and groups the computers according to primary and secondary grouping criteria for purposes of reporting the data.
  • the computer profile data is examined to find usage data for application executable files. Such data contained in the computer profile data, if any, is extracted for use accordance with the present invention.
  • the present invention can be used as an add-in for that program or with another type of program.
  • the database 18 is used for storage of the computer profile data for the network 2, but each individual computer may have a disk assembly 26 (Fig. 1) or other storage devices, within or directly attached to it as a part of its overall memory.
  • the storage devices 26 are typically disk drives organized as a disk array, wherein the term "disk” commonly describes a self-contained rotating magnetic media storage device.
  • the term disk in this context is synonymous with hard disk drive (HDD) or direct access storage device (DASD).
  • each client computer 10 has its own in-core memory 26.
  • a workstation 28 that includes a display 30 having a screen 32 upon which graphical user interfaces (GUI) in accordance with the invention, as described further hereinafter, are displayed.
  • the workstation 28 may have a wireless or wired keyboard 34 and mouse 36, for user-entered command line interfaces (CLI) and other user interactions.
  • GUI graphical user interfaces
  • an "executable" file is a file that causes the computer to execute or perform indicated tasks according to the encoded instructions.
  • other files only contain data.
  • the first step is a collection step whereby each client computer 10 collects information about the last use of application executable files installed in the memory of the computer using a number of methods, as discussed below.
  • the client computer aggregates the usage data and creates a data storage chart that is referred to herein as a "software item,” for each method for each executable file.
  • the software items are then organized into a list, and the software items relating to the same executable file are merged to generate a single record for each respective executable file.
  • Fig. 2 An exemplary software item in accordance with the present invention is illustrated in Fig. 2, which illustrates the usage data that are collected for a particular application executable file in, for example, a software program in accordance with an illustrative embodiment of the invention.
  • the first item of information 202 is the file name, which is the name of the executable file (.exe) of the particular application program being examined.
  • the next block of information 204 is the directory in which the file is located.
  • LastUseTime block 206 specifies the date and time the executable was last started. This can be set forth in Greenwich Mean Time (GMT) or another suitable time zone designation.
  • GTT Greenwich Mean Time
  • LastUseUser block 208 is a string specifying the security identifier (SID) of the user who last started the executable.
  • the LastUseTime and LastUseUser blocks may be individually unset when the corresponding information isn't discovered. Comparison of an unset LastUseTime to a set value of LastUseTime is defined so that an unset value is considered to be earlier than a set value.
  • the LastUseMethod is the next block 210.
  • the client computer uses up to five or more different methods of determining the last use of an executable. The method of determining the last use is indicated in the chart 200 of Fig. 2 by an integer from 0 to 5.
  • This integer indicates which method of determining last use was utilized for that particular software item.
  • MethodhodNone a no usage discovery method
  • MethodhodLastAccessed a last accessed method
  • MethodhodUserAssist a user assist method
  • MethodhodPrefetch Method indicating that the application is running
  • MethodhodAppStartUp an indication that the application is automatically started without user action
  • the system of the present invention uses five complimentary methods to extract usage data for executable files from the operating system based upon discovering last use data for a subset of executable files with some of the resulting data being more reliable or complete than others. To obtain the most complete and accurate representation of usage data regarding application executable files, therefore, one or more of the methods is used (typically, each method is used) and the results are combined.
  • the "MethodLastAccessed” retrieves the last accessed time, or time stamp, for executable files discovered by the software discovery process (which defines the set of executable files of interest).
  • the last accessed time is maintained by the file system, and it is readily recovered for the files on the individual computer or network of computers.
  • the last accessed time often represents the last time the file was run since there is little need to otherwise access the file.
  • simply opening an executable file for read access will update its last accessed time. More specifically, poorly designed back up or antivirus software, which may open an executable but not run it, can render the timestamp an incorrect indicator of last use.
  • MethodLastAccessed is a useful indicator in a number of cases. Additionally, if it is known that there are no significantly interfering activities on a system, it can be used as a fallback when none of the other more reliable methods apply. When used in a Windows application, the MethodLastAccessed is retrieved using the Windows GetFileTime( ) or FindFirstFile/FindNextFile( ).
  • MethodhodUserAssist Another method by which the present invention performs usage discovery is referred to herein as "MethodUserAssist.”
  • This method examines the UserAssist keys in the Windows® registry to determine usage information for executable files launched in various ways by Windows Explorer®. More specifically, starting with Windows 2000® (and Windows98®) the Windows Explorer program records usage information for applications launched by double-clicking the application's executable file (or a shortcut to it) in Windows Explorer®. In addition, opening a document file associated with an executable by typing an application name into the Run menu, or starting an application from its Windows® start menu shortcut will also generate a persistent UserAssist record.
  • this method covers the most common ways that users invoke applications, however, it is noted that the Microsoft ® operating systems do not document the UserAssist keys but they are apparently used to support the most recently used list of applications in the start menu. This record includes the date and time that the program had been launched, and the user account used to launch it.
  • this method does not result in the information needed about the last use of the executables, and in such a case, one of the alternative methods can be used. For example, this method does not record usage information for applications launched via the Windows Quick Launch toolbar. Thus, performing several different types of methods of last access allows the greatest spectrum of information to be extracted regarding a particular executable.
  • MethodPrefetch This method examines files in the Windows PreFetch folder to determine the time of last use for executables that have been recently run.
  • the Prefetch feature was included to reduce application startup time by anticipating and preloading DLLs.
  • a DLL is a Dynamic Link Library, which is a file of code containing functions that can be called from other executable code (either an application or another DLL). Unlike an executable (.exe) file, a DLL cannot be directly run. DLLs must be called from other code that is already executing.
  • the Windows Prefetch function preloads DLLs that are expected to be accessed shortly after an application begins execution.
  • Windows® determines such DLLs by monitoring each execution of every application for 15 seconds after execution begins and records the DLL usage in special ".pf" files saved in a special folder for that purpose. Included within each such ".pf file is the full path of the executable and a timestamp showing when it began execution. It is not usually necessary, however, to read the .pf file's contents because its last modified time closely reflects the application execution start time and it is named in a manner that allows ready identification of the executable. Since most executables started are monitored in this way, it is a good indication of recently used applications. There is, however, a limit to the number of files contained in the .pf folder, and the files contained therein are sometimes pruned out by, for example, system boots. Thus, the Prefetch method does not always provide complete usage for all applications actually used, but it is a good indicator of last usage for many applications. Further details regarding the PreFetch method are discussed below.
  • MethodhodAppRunning The next method of determining last usage of an executable is “MethodAppRunning.”
  • the computer or network of computer is queried about currently running applications.
  • MethodPrefetch because, as noted, there are times when an executable is either not prefetched, or may have been pruned from the PreFetch folder, but still in use, i.e., when the executable is left running for days or even weeks.
  • process enumeration is performed using the Windows CreateToolhelp32Snapshot(), Process32First and Process32Next() functions.
  • the latter two return the process identifier (PID) of each running process along with the name of the executable file for the process.
  • PID process identifier
  • the PID may then be used to obtain a process handle from which the start time and owner SID of the process may be found.
  • the PID allows this method to obtain the full path to the executable using Modulel32First () in Windows Vista and later.
  • the software items specify if the application was determined to be running.
  • there may be a Boolean indication 212 showing that the executable was found running, or not, at the time of discovery.
  • the other method of determining last usage of an application is the "MethodAppStartup” method.
  • This derives usage information about applications that are known to start running automatically when a user logs on.
  • certain user-specified (or administrator-specified) applications are started automatically.
  • the program of the present invention assumes that such a "startup" application was run at least as recently as the last logon time for that user. From this information, the last use and last user can be derived regarding such applications, even if they are not currently running. A place to find such application information would be in the registry "Run" keys, including the Active Directory and the "Legacy" varieties.
  • the Startup folder in a user's Start menu including the all-users Start Menu, may also contain such information.
  • Boolean flag 214 which indicates whether the executable is registered to run as a service. Any method may include checking whether an executable is a service because services can be set to start running automatically when the operating system boots. In the preferred embodiment, the IsService flag is only set by the MethodNone and MethodLastAccessed methods. Whether a software item is a service is relevant, and used in records , to distinguish between executables that are run automatically and executables that are run by user interaction.
  • the result is a list of software items containing usage data for executables discovered on the computer. Further, if a computer profile from a previous discovery cycle is available, post-merge process usage data from that profile's software items are also added to the list when not superseded by more recent data.
  • Each executable file can have multiple software items in the list, which include data for all the software programs, including the application executable files that comprise the software program that are installed or running on the computer.
  • the client computer next sorts the software items in a suitable manner, such as alphabetically by path name. A merge process is then applied to the sorted list.
  • the software items on the list are merged such that each executable has a single software item on the list.
  • MethodLastAccessed If one item's method of last use is MethodLastAccessed and the other is not, then the MethodLastAccessed item is discarded;
  • LastUseTimes is less than or equal to that threshold (illustratively 30 seconds)
  • the resulting merged list of software items may be uploaded to the server 14, and retained as records in the associated database 18, to report usage network-wide such as on the computers in the network or on a subset or group of the computers in order to determine for example, a network-wide number of recent users of a particular program or version thereof.
  • Other items of information may include where in the network is the greatest concentration of usage and so forth.
  • the resulting list of software items may be utilized on a given computer, to record that computer's usage.
  • the network is represented as a hierarchical system having a group hierarchy that is configured to mimic the organizational authority structure of its users, such that the structure resembles an organization chart.
  • the usage information is included as part of the reports produced for the various groups.
  • the grouping of the computer profile data also serves the function of regulating user access rights within the BelManage® product. Each BelManage® user has access only to profile data (and thus reports) associated with a designated BelManage® login group and sub-groups thereof. This method may be further understood with reference to Fig.
  • step 3 which is a flow chart 300 of an illustrative procedure by which a client computer discovers information about a single application executable files and generates a software item for each method of discovery for each executable file installed on the client computer.
  • the program begins with the start step 302 and continues to step 304, which is to determine the name of the executable file in question.
  • step 306 the directory where the file is located is determined.
  • step 308 the last user and the last use time is found using each of the predetermined methods described above for extracting software usage data for each application executable from the operating system. For each application executable, the methods described above are performed to obtain as much information as possible about each executable in step 309.
  • a software item is generated for each executable as shown in step 31 1.
  • Each software item is then recorded in a list in accordance with step 312.
  • the procedure ends at step 313.
  • Figs. 4A and 4B together form a flow chart of a procedure by which the software usage discovery program running on each client computer generates a list of software items generated in the procedure of Fig. 3, and for merging the list of such items in accordance with the present invention.
  • the procedure begins at the Start step 413 and proceeds to step 420.
  • a list is formed including each software item representing each software executable that is installed on the client computer using the procedure in chart 300 (Fig. 3).
  • the list is sorted such that items that have the same file path are placed adjacent to one another in the list.
  • the first two datum of chart 200 (202 and 204) are compared for adjacent items in step 423. As noted above, if one item's method of last use is MethodLastAccessed and the other is not, then the MethodLastAccessed item is discarded as shown in steps 424 and 426. Otherwise, if the difference between the two item's LastUseTimes is greater than some threshold (illustratively 30 seconds), then the earlier item is discarded as shown in steps 428 and 430.
  • the merge process continues and the client computer compares adjacent items on the list that refer to the same file path name. This is performed so that each application executable file, or version thereof, appears only once on a final list.
  • a series of substeps which are queries that are applied to adjacent items that have the same file path, are performed as part of the merge process. For clarity of illustration, these queries are shown as separate steps in the flow chart of Figs. 4A and 4B.
  • a first query at step 423 is whether two adjacent items refer to the same file path. If they do, the procedure follows the YES path to query step 424. Step 424 queries whether one item has a last use method as a "MethodLastAccessed" and the other does not. If so, then the YES path is followed to step 426, which is to discard the method last accessed item and then the procedure continues with step 442. (Fig. 4B) If it is not true that one software item has a "MethodLastAccessed" and the other does not, then the NO path is followed to query step 428, which asks whether the difference between the two item's last use times is greater than a predetermined threshold value that is set by the system administrator. If the difference is greater, then the YES path is followed to step 430, which is to discard the earlier item and then the procedure continues with step 442.
  • Step 432 is a query whether the difference between the two item's last use times is less than or equal to the predetermined threshold. If so, the procedure flows to step 434, which is to discard the item that has no last use user and retain the item having a valid last use user value and then the procedure continues with step 442.
  • step 450 is to record a list of unique items containing the best information that is available about each executable file in the computer profile for that computer.
  • step 442 is a query step asking whether the discarded item has an IsRunning? flag set. If so, the item's flag is transferred to the retained software item and the procedure goes on to perform step 446. If, on the other hand, the item does not have an "IsRunning? flag set, then the NO procedure follows the path to query step 446, which asks: Does the discarded item have an "IsService?" flag set. If so, then the procedure flows to step 448 which is to transfer the flag to the retained software item, and continue with the procedure to step 450. In step 450, a list of unique items containing the best information about each executable file's last use is included in the computer profile and then the procedure ends at step 460. If the item does not have an IsService flag set, the procedure flows to step 450.
  • step 423 which is a query step that inquires whether two adjacent items refer to the same file path, if the result is No, then the process continues to step to step 450, which is to record a list of unique items containing the best information that is available about each executable and including that information in the computer profile.
  • the list is included in the computer profile at step 450 and the procedure ends at step 460 until the next time that the administrator chooses to analyze the software, i.e., the application executable files, that are installed on the computer in the network of computers.
  • the computer profile may be sent to the server 14, which stores the information in database 18 as part of the computer's profile data as a database record.
  • the administrator may request reports that summarize this information.
  • the process can be performed on a per executable basis.
  • the sorting step 422 and the adjacent comparison of adjacent items 423 could be omitted and the process can be continued for each executable, which process is summarized as follows: A. creating an item for one method, B. discover using a second method, C. merge the results from the second method with the first into one item again, D. repeat B and C again for other methods until the information desired for a given executable is determined.
  • the procedure 400 (the flow chart of Figs. 4A and 4B) or the per executable procedure may be set to run automatically every day, week, month, or other regular time period to produce the list of software and related information about each software item's usage.
  • This description of the procedure relates to a network of client computers that are interconnected to a server computer, however, it should be understood that the process and system of the present invention can be readily adapted to perform the stated steps on an individual, stand alone computer in accordance with the present invention.
  • the procedures have been described in such a manner that the client computer generates the software items and performs the merge process.
  • the server may be programmed to perform the steps of generating the profile from the software items, which have been uploaded to the server from the individual client computers. Additionally, or alternatively, the server may be programmed to perform the merge process.
  • the steps illustrated in the figures and described herein are illustrative of aspects of the invention, and not limiting thereto. It should be understood that in certain applications of the invention, the steps can be performed in a different order, and/or steps can be omitted or repeated as desired.
  • the final result is a list of unique items, one per application executable file, containing the best information about each file's last use.
  • a report can then be generated which sets forth the information in a format desired by the user. Several examples of this are provided below.
  • the list or portions thereof may be included in a more detailed report of other computer profile data for the computers being managed by the system of the present invention.
  • a software program is comprised of several executables (each being the same publisher's company and product name) a single aggregated entry may be shown to represent the entire set. That entry shows the data for highest software version found in the set.
  • a link can be provided to a more detailed report for each executable in the set, if desired in a particular application of the invention.
  • the report's displayed usage data will be for the aggregated entry from the most recently used executable, unless that executable is registered as a service that starts automatically.
  • the displayed usage data is from the most recently used non-service executable.
  • the non-service executable may be of greater significance because it represents active use of the software program by a user, rather than automatic use by the system.
  • the logic used to prefer non-service over service executables is also applied to "start up" items where the last use method is the method of application automatic start up.
  • a single computer profile summary report can be created locally on a single computer, in which case information is displayed locally from the memory of the user's computer via the user's web browser.
  • FIG. 5 is a chart illustrating a method of displaying software usage in terms of recency of use.
  • the chart 500 indicates time of last use in accordance with an illustrative embodiment of the present invention.
  • item 502 is an underscored asterisk and exclamation point which indicates that one or more of the executables, that may be part of a suite of executable files, comprising a software program is currently running.
  • an underscored asterisk with a Roman numeral I illustrates that the most recently used of the executables comprising a software program were last used within the past week, but none are currently running.
  • An underscored asterisk with a Roman numeral II as shown in row 506 means that the most recently used of the executables comprising a software program were last used in the past 90 days, but longer than one week ago.
  • Row 508 includes an underscored asterisk and a Roman numeral III to indicate that the most recently used of the executables comprising a software program was last used within the past year, but longer ago than 90 days.
  • Item 510 is an asterisk with four Vs (UU) to indicate that the most recently used of the executables comprising a software program was last used over one year ago.
  • UU Vs
  • an underscored asterisk indicates that the last use is unknown and the executables comprising a software program may never have been run.
  • Fig. 6A is a graphic user interface (GUI) 600a for depicting software versions for computers using a particular software program in accordance with an illustrative embodiment of the present invention.
  • Fig, 6B is a graphic user interface relating to the computer networks using a particular software version.
  • the software program 602 is Microsoft® Office 2003.
  • the current group is "sample reports," as shown in the pull down window 604.
  • Column 606 provides a count of 17 instances of this software program being used in computers in this group.
  • the GUI also includes, illustratively, a column for computer System Names 610, version 612, date of last use 614 and last user 616.
  • this type of report is illustratively entitled: Software Versions - Systems Using Product.
  • the report provides the name of the computer or network of computers, the version number of the Office 2003® version being used, the date of last use and the last user.
  • This report can be generated by selecting, illustratively, clicking on a product's name in the "All Software Versions" report (not shown). It can also be selected using other identifiers which remain within the scope of the present invention.
  • FIG. 6B is a graphic user interface 600b for depicting systems using a particular software version in accordance with an illustrative embodiment of the present invention.
  • the software program 622 is identified as Office 2003 manufactured by Microsoft®.
  • the version number 624 is 1 1.0.5614.
  • the Details section 628 contains the system of each computer using that particular version, as shown in column 630.
  • the date of last use is shown in column 632, and the last user is shown in column 634.
  • this report lists those computers within the selected group that have a specific version of a given software program installed.
  • the report contains the date of last use and the name of the last user.
  • the report is generated when a user clicks on a version range in the AU Software Versions report (not shown). Then, the user can click on a specific version number in that report.
  • Fig. 7 is a graphic user interface 700 for depicting the installed software section of a computer profile summary for computer profile data.
  • the installed software is listed in column 702 and the date of last use is provided in column 704.
  • This report is a summary of information collected from a particular computer about the software that is installed on that computer, showing also the software publisher company, the software program name and the version number of each instance of a software program installed on the computer.
  • This report can be illustratively contained in a computer profile summary report and may be viewed by clicking on a computer name in the System List report (not shown) in accordance with an illustrative embodiment of the invention, or it may be produced as part of another report or in many other variations as desired in a particular application of the invention.
  • Fig. 8 is a graphic user interface 800 for depicting details for a particular software program of a computer profile in accordance with an illustrative embodiment of the present invention.
  • the particular software being studied in the report is Office 2003 (802) manufactured by Microsoft® and the computer name 804 is provided as dsk ⁇ l(kjones).
  • One install directory for that software is provided at pane 806.
  • the first instance of a related executable is found in the computer in the C: ⁇ drive.
  • the directory path name for the software product is C: ⁇ Program Files ⁇ Common Files ⁇ Microsoft Shared ⁇ Snapshot Viewer.
  • This executable has a description 810 which is listed as Office Access Snapshot Viewer and its version (812) is 11.0.5510.
  • the executable has a file name 814 of Snapview.exe and the size 816 of the executable is 47 KB.
  • the data of last use 818 was 12/7/2006 and the last user 820 is ecollins.
  • a number of executables for Office 2003 are installed on the f: ⁇ drive, as shown at line 822.
  • this report shows the details of a specific software program listed in the Computer Profile Summary report. It shows executables comprising the software program (having the specific company and software program name) along with descriptions, filenames, sizes, versions and install directories of each.
  • two columns show the date of last use and name of last user, if known.
  • Fig. 9 is a graphic user interface 900 for depicting the software versions section of a computer profile summary for an individual computer.
  • each software item that is installed on a computer is listed, such as, for example, the software identified at line 902 entitled EnTech Taiwan - PowerStrip for Windows Version 3.49.0.0.
  • the graphic from the table of Figure 4 indicating the time of last use.
  • the software 902 is identified by the graphic "*IIH" (904), which indicates that the program was last run over one year ago. This allows an administrator or user to easily distinguish rarely used software from software programs that have been run recently, and are therefore more likely to be frequently used.
  • This information can also be provided by rolling the mouse over the asterisk next to software name and an information box 906 appears and provides further information about the executable. As noted at the top of the report, if the user clicks on the asterisk next to a the software name, then the location of the software is provided. There are various other ways in which this information may be presented, while remaining within the scope of the present invention. In the example, the report is provided for an individual computer, but it can also be used for a client computer in a network of computers.
  • Fig. 10 is a flow chart of a procedure 1000 for obtaining information from a Windows PreFetch file, as mentioned hereinbefore. More specifically, the PreFetch files have the extension .pf. Inspecting and parsing a .pf file can provide the name or path of the executable to which the .pf refers and the date and time that the .pf file was last updated by the Windows Task Scheduler (which indicates the last time the executable was last run).
  • the procedure 1000 begins at the start step 1002 and continues to step 1004 which is to extract the substring that precedes the dash and hash code of the PreFetch file name.
  • the PreFetch file name is the name of the software executable itself followed by a dash and the hexadecimal representation of a 32-bit hash of the file's path and command line arguments (and followed by the .pf extension).
  • An example is EXCEL.EXE-28297C59.pf.
  • the executable file name then, is trivially obtained by extracting the substring that preceded the dash and hash code. In accordance with the invention, this is accomplished by parsing the name starting at the end and working backwards. This is preferable because the name of the executable may itself contain a dash character.
  • step 1006 is to obtain the update time of the PreFetch file from "ftLastWriteTime" which is a member of the WIN32_FIND_DATA structure returned by the WINDOWS FindFirstFile() and FindNextFileO functions.
  • This is the time the task scheduler updated the .pf file, and closely corresponds to the time the executable was last run.
  • This is an efficient method of obtaining and extracting information from Windows PreFetch files, without having to open and read the file.
  • the technique of Fig. 10 does not work when the name is ambiguous.
  • multiple executables may exist on the same computer or network of computers with the same name but in different folders and each yields the same filename but a different hash code.
  • the better method is to follow the procedure of Fig. 1 1.
  • Fig. 1 1 is a flow chart 1 100 of an alternative procedure for obtaining information from a Windows PreFetch file in accordance with an illustrative embodiment of the present invention.
  • the procedure begins with the start step 1102 and continues to step 1104, which is to open the contents of the Prefetch file.
  • Each file relates to an executable installed on that computer.
  • the next step 1106 the contents of the file is inspected in order to find an initial header.
  • the header provides file offset and the size of each data section. It also provides the time of last application execution that reflects the recency of use of the application.
  • step 1 108 examines the null terminated path strings contained in the module path list, its offset and size found in the header, to find the full path name of each module.
  • Fig. 12 is a chart illustrating exemplary header data in a Windows® Prefetch
  • the chart 1200 summarizes Header Data in the Windows PreFetch file.
  • Byte Offset 4 there is a data word consisting of a Magic Number.
  • the magic number is one way of incorporating metadata to specify a document file type or format.
  • the magic number is four bytes long.
  • the data word indicates the offset to start the module path list.
  • Byte Offset 104 the data provides the Size of the module path list (in bytes).
  • Byte Offset 120 the time of last application execution is provided.
  • the data word provides the number of application executions.
  • Fig. 13 is a chart illustrating exemplary header data in the new Windows 7 operating system regarding UserAssist keys.
  • each value in the "Count" key contains a block of binary data consisting of various pieces of information Windows® uses internally to implement features in the start menu (and perhaps other features).
  • the software usage discovery system seeks to determine the last use timestamp indicating when a shortcut or executable was last opened or executed (an 8-byte FILETIME), and perhaps the run count (a 4-byte DWORD indicating how many times the shortcut or executable has been opened or executed).
  • the binary blocks for .exe and .Ink file values are 16 bytes long.
  • the byte offsets to the run count and last use time are 4 and 8, respectively.
  • the run count starts at 5, meaning it will have a value of 6 the first time the application is run.
  • the binary blocks for .exe and .Ink file values are 72 bytes long.
  • the byte offsets to the run count and last use time are 4 and 60, respectively.
  • the run count starts at 0.
  • the present invention specifies a method that has a number of alternative procedures to determine information that may be used to make informed decisions about the usage of software programs, that may be comprised of multiple application executable files, that are running in a network or on an individual computer.
  • the present invention provides detailed information about the installation of particular executables and recency of use of such executables which information will facilitate better decision making regarding license purchase, allocation and memory usage throughout the network of computers or on an individual computer.
  • the invention does not require use of run-time intervention on the computer to perform the method because it derives reliable usage measures from information that is already being collected and maintained by the operating system in various registers, keys, files and the like.
  • the present invention has the advantage of providing usage information that is reliable and complete. As noted, this will prove valuable to software license administrators seeking to identify underused software and/or recently used software, and to determine other information such as allocation as desired in a particular application of the invention.
  • reports can be generated across the whole network of computers regarding a particular software program, application executable file, or other information such as the number of users who have run the executable and the recency of such uses. Or individual computers in a subset of the client computers can be examined for certain executables, or versions thereof and usage of the application executable file that may be part of a software program.

Abstract

A method of obtaining information about usage of application executable files and associated software program in a network of computers or on an individual computer is provided. The method involves collecting information about last use of software programs, and associated executable files, on a computer or a set of managed computers from various resources on the computers. The information that is collected includes file name, directory, date and time the executable was last started, a security identifier of the last user, the method of last use, whether the executable was found to be running at the time it was found, and whether the executable is registered to run as a service. From this information, a list is generated regarding software items, and the list is merged such that a given executable has a single software item on the list. Reports are produced detailing information about one or more software items on the list. The reports may be displayed in a graphic user interface designed for that purpose.

Description

SYSTEM AND METHOD FOR SOFTWARE USAGE DISCOVERY
BACKGROUND OF THE INVENTION
Field of the Invention
The invention relates generally to systems and methods of managing information about a plurality of computers and, more particularly, to systems and methods for discovering and reporting information about software usage on such computers.
Background Information
In a large scale network of a plurality of computers, such as for a multinational corporation or a government entity, it is a challenge to track the usage of the many software programs, and the executable files that make up such programs that are installed on each computer in the network. It is important to maintain accurate information about the usage of programs in order that, for example, an administrator can make informed decisions about the necessity of maintaining current licenses for the multitude of applicant executable files (sometimes referred to herein as simply "executables") The aggregate of a set of executable files make up software programs that are installed on the computers in the network. Also of interest to an administrator is the manner in which the executables are allocated within the network. More particularly, there may be many application executable files installed on such computers for which single or multiple user licenses are being paid and maintained, and in some cases, such executables are rarely, if ever, used or accessed.
Current versions of the Windows® operating system and other operating systems do not provide direct, reliable information about the usage of software on a computer and/or a network of computers. As yet, there is not a system or method for reliably and efficiently collecting and maintaining such information in a non-invasive way. Currently available products monitor application usage invasively, at run-time of the monitored application. Such products add overhead to the operation of each computer and can contribute to unreliability of the computer through the monitoring methods they use. In addition, those products can only provide usage information prospectively after they are installed on the computer.
Therefore, there remains a need for a system that tracks and maintains records of software usage, version, recency of use and the like for a computer system containing multiple computers, or for an individual computer.
SUMMARY OF THE INVENTION
These disadvantages of prior techniques are overcome by the present invention, which is a system and method for software usage discovery. The illustrative embodiment of the invention includes a network of client computers that are interconnected with a server over an intranet, or the Internet, or other communications link. The server and/or one or more of the client computers is coupled to one or more associated databases. It should also be understood that the present invention can be readily employed with an individual stand alone computer. The software usage discovery system of the present invention runs on each client computer in the network and gathers usage data about application executable files from various storage locations on those client computers in the network, or on an individual computer. The software usage information is extracted from various files, registry keys and other storage locations that contain such information as is relevant to the usage of application executable files on the network, as well as the associated one or more of the databases.
A client computer is programmed to collect usage data and aggregate the data into "software items." Each software item as used herein, represents an application executable and stores it in a table with information about the executable or version thereof. Based upon the software items for a given executable file that the client computer discovers from its own disks or memory, the important data from each of the software items is included in a record that may be uploaded to the associated database and included in reports generated using the data in the database. The present invention is directed primarily to discovering usage information relating to executable files, however, the invention may be adapted to discovering access or usage of data files, if desired in a particular application of the invention. More specifically, data about usage of application executable files from a number of sources, including data collected using a variety of different methods, as discussed herein, are incorporated into corresponding software items for several methods for each executable. The software items are then merged such that all of the relevant information about a particular executable is extracted from each software item to create a record of executables that are installed on that computer. Briefly, the merge process involves multiple queries that are applied to adjacent items on the list that refer to the same file path. If a duplication is found, important data from the duplicate item is transferred to the retained item and the duplicate is then discarded. The merged items for the executables may then be uploaded to the server and the server stores the items as records in an associated database. The server may then generate one or more reports from the records of certain or all of the computers in a suitable manner as requested by the administrator. The information in the reports may then be displayed in a graphic user interface (GUI) that allows a user to view and utilize the information.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention description below refers to the accompanying drawings, of which:
Fig. 1 is a functional block diagram of an illustrative system with which the present invention can be advantageously employed;
Fig. 2 is a chart referred to herein as a software item which contains usage data that is collected for a particular executable application in accordance with an illustrative embodiment of the present invention;
Fig. 3 is a flow chart of an illustrative procedure by which the client computer discovers executable files, and generates a software item for each executable file;
Figs. 4A and 4B together form a flow chart of a procedure by which the client computer merges software items that relate to the same executable and generates a record in accordance with an illustrative embodiment of the method of the present invention; Fig. 5 is a chart illustrating usage graphics which are employed to indicate time of last use in accordance with an illustrative embodiment of the present invention;
Fig. 6A is a graphic user interface for depicting software versions for a computer or a network of computers using any application executable file that may be part of a suite of executable files that make up a particular software program in accordance with an illustrative embodiment of the present invention;
Fig. 6B is a graphic user interface for depicting software versions for computer systems using a particular software version in accordance with an illustrative embodiment of the present invention;
Fig. 7 is a graphic user interface for depicting the installed software section of a computer profile summary for computer profile data;
Fig. 8 is a graphic user interface for depicting details for any executable file that may be part of a suite of executable files that make up a particular software program in a computer profile in accordance with an illustrative embodiment of the present invention;
Fig. 9 is a graphic user interface for depicting the software version section of a computer profile summary for an individual computer in accordance with an illustrative embodiment of the present invention; Fig. 10 is a flow chart of a procedure for obtaining information from a
Windows® PreFetch file in accordance with an illustrative embodiment of the present invention;
Fig. 11 is a flow chart of an alternative procedure for obtaining information from a Windows PreFetch file in accordance with an illustrative embodiment of the present invention;
Fig. 12 is a chart illustrating exemplary header data in a Windows® Prefetch File which can be advantageously employed in accordance with an illustrative embodiment of the present invention; and
Fig. 13 is a chart illustrating exemplary header data in the new Windows 7 operating system regarding User Assist keys. DETAILED DESCRIPTION OF AN ILLUSTRATIVE
EMBODIMENT
Fig. 1 is a functional block diagram of an illustrative system with which the present invention can be advantageously employed. Fig. 1 depicts a system 2 that includes a plurality of client computers 10 in communicating relationship with a server 14. The computers 10, some of which may be workstations, laptops, servers or other devices (not shown) communicate over, for example, an intranet denoted by reference character 16. It should be understood, however, that the present invention is not limited to a network by which the computers are connected by an intranet, but can be advantageously employed with a set of computers connected by another type of computer network, such as a point-to-point link, shared local area network, wide area network, or virtual private network implemented over a public network, such as the Internet or coupled in communicating relationship in another fashion. In addition, the present invention is also applicable to individual computers. The server 14 may perform a number of functions but in particular, the server
14 is a software discovery server in accordance with the invention, which communicates with a computer information database 18. The computer information database 18 contains, among other things, computer profile data for the computers in the system that are connected by intranet 16 or other communication mechanism with the server or the database. Illustratively, the computers 10 run client profile software that, at the respective computers, collects profile data and uploads the data to the server 14. The software running on each of the client computers is denoted in Fig. 1 as client profile software module 22. A software usage discovery program 24 is also loaded into the memory 26 of the client computers 10 in accordance with the present invention. Additionally, the server 14 contains a corresponding program 20 in its memory 21.
One system with which the present invention may be illustratively employed is that which is disclosed in commonly owned United States Patent Application Serial No. 10/627,191 of Newman, et al. for a GROUPING OF COMPUTERS IN A COMPUTER INFORMATION DATABASE SYSTEM, filed on July 25, 2003, which is presently incorporated by reference herein in its entirety, which provides a system for profiling computers that gathers computer profile data and groups the computers according to primary and secondary grouping criteria for purposes of reporting the data.
In accordance with an illustrative embodiment of the invention, the computer profile data is examined to find usage data for application executable files. Such data contained in the computer profile data, if any, is extracted for use accordance with the present invention. The present invention can be used as an add-in for that program or with another type of program.
The database 18 is used for storage of the computer profile data for the network 2, but each individual computer may have a disk assembly 26 (Fig. 1) or other storage devices, within or directly attached to it as a part of its overall memory. The storage devices 26 are typically disk drives organized as a disk array, wherein the term "disk" commonly describes a self-contained rotating magnetic media storage device. The term disk in this context is synonymous with hard disk drive (HDD) or direct access storage device (DASD). In addition, each client computer 10 has its own in-core memory 26. Also associated with one or more computers 10 is a workstation 28 that includes a display 30 having a screen 32 upon which graphical user interfaces (GUI) in accordance with the invention, as described further hereinafter, are displayed. The workstation 28 may have a wireless or wired keyboard 34 and mouse 36, for user-entered command line interfaces (CLI) and other user interactions.
As will be well understood by those skilled in the art, an "executable" file is a file that causes the computer to execute or perform indicated tasks according to the encoded instructions. In contrast, other files only contain data. In accordance with the present invention, the first step is a collection step whereby each client computer 10 collects information about the last use of application executable files installed in the memory of the computer using a number of methods, as discussed below. The client computer aggregates the usage data and creates a data storage chart that is referred to herein as a "software item," for each method for each executable file. The software items are then organized into a list, and the software items relating to the same executable file are merged to generate a single record for each respective executable file. An exemplary software item in accordance with the present invention is illustrated in Fig. 2, which illustrates the usage data that are collected for a particular application executable file in, for example, a software program in accordance with an illustrative embodiment of the invention. Specifically, the first item of information 202 is the file name, which is the name of the executable file (.exe) of the particular application program being examined. Then, the next block of information 204 is the directory in which the file is located. LastUseTime block 206 specifies the date and time the executable was last started. This can be set forth in Greenwich Mean Time (GMT) or another suitable time zone designation. LastUseUser block 208 is a string specifying the security identifier (SID) of the user who last started the executable. The LastUseTime and LastUseUser blocks may be individually unset when the corresponding information isn't discovered. Comparison of an unset LastUseTime to a set value of LastUseTime is defined so that an unset value is considered to be earlier than a set value. Referring again to Fig. 2, the LastUseMethod is the next block 210. In accordance with the software discovery program of the present invention, the client computer uses up to five or more different methods of determining the last use of an executable. The method of determining the last use is indicated in the chart 200 of Fig. 2 by an integer from 0 to 5. This integer indicates which method of determining last use was utilized for that particular software item. Thus, there are separate software items for each method of discovery for the same executable if the method yields usage information. For example, there may be a no usage discovery method (MethodNone) (0), a last accessed method (MethodLastAccessed) (1), a user assist method (MethodUserAssist)(2), a Prefetch method (MethodPrefetch)(3), a method indicating that the application is running (MethodAppRunning)(4), and an indication that the application is automatically started without user action (MethodAppStartUp)(5). Each of the methods is described in further detail below. Other methods may be implemented while remaining within the scope of the present invention. To summarize, in an illustrative embodiment of the invention, the system of the present invention uses five complimentary methods to extract usage data for executable files from the operating system based upon discovering last use data for a subset of executable files with some of the resulting data being more reliable or complete than others. To obtain the most complete and accurate representation of usage data regarding application executable files, therefore, one or more of the methods is used (typically, each method is used) and the results are combined.
Each of the methods to determine last use will now be discussed in greater detail. The "MethodLastAccessed" retrieves the last accessed time, or time stamp, for executable files discovered by the software discovery process (which defines the set of executable files of interest). The last accessed time is maintained by the file system, and it is readily recovered for the files on the individual computer or network of computers. In the case of executables, the last accessed time often represents the last time the file was run since there is little need to otherwise access the file. However, simply opening an executable file for read access will update its last accessed time. More specifically, poorly designed back up or antivirus software, which may open an executable but not run it, can render the timestamp an incorrect indicator of last use. Another example of such circumstances is that there are times when Windows® reads an executable file to show it's icon in Windows Explorer®. This would result in a new timestamp, but does not accurately reflect the last use time. The "MethodLastAccessed," is a useful indicator in a number of cases. Additionally, if it is known that there are no significantly interfering activities on a system, it can be used as a fallback when none of the other more reliable methods apply. When used in a Windows application, the MethodLastAccessed is retrieved using the Windows GetFileTime( ) or FindFirstFile/FindNextFile( ). In the Belarc implementation referred to above, for example, such functions are called to retrieve file sizes, so the last accessed time stamp is provided as part of that information. The invention can also be readily adapted to obtain a last time stamp from other operating systems in other applications of the invention since a last accessed timestamp is available on most operating systems for particular application executable file being used by the computers or computer networks. As discussed above, there are situations when last accessed time is not a useful indicator of last use. In such situations, as may be decided by an administrator, the last accessed method is not used and is instead replaced with the no usage discovery method, "MethodNone", so that at least one software item is always present for each discovered application executable. A MethodNone item has unset values of LastUseTime (206) and LastUseUser (208).
Another method by which the present invention performs usage discovery is referred to herein as "MethodUserAssist." This method examines the UserAssist keys in the Windows® registry to determine usage information for executable files launched in various ways by Windows Explorer®. More specifically, starting with Windows 2000® (and Windows98®) the Windows Explorer program records usage information for applications launched by double-clicking the application's executable file (or a shortcut to it) in Windows Explorer®. In addition, opening a document file associated with an executable by typing an application name into the Run menu, or starting an application from its Windows® start menu shortcut will also generate a persistent UserAssist record. Thus, this method covers the most common ways that users invoke applications, however, it is noted that the Microsoft ® operating systems do not document the UserAssist keys but they are apparently used to support the most recently used list of applications in the start menu. This record includes the date and time that the program had been launched, and the user account used to launch it.
There are some instances in which this method does not result in the information needed about the last use of the executables, and in such a case, one of the alternative methods can be used. For example, this method does not record usage information for applications launched via the Windows Quick Launch toolbar. Thus, performing several different types of methods of last access allows the greatest spectrum of information to be extracted regarding a particular executable.
The next method is "MethodPrefetch." This method examines files in the Windows PreFetch folder to determine the time of last use for executables that have been recently run. Starting with Windows XP®, the Prefetch feature was included to reduce application startup time by anticipating and preloading DLLs. A DLL is a Dynamic Link Library, which is a file of code containing functions that can be called from other executable code (either an application or another DLL). Unlike an executable (.exe) file, a DLL cannot be directly run. DLLs must be called from other code that is already executing. The Windows Prefetch function preloads DLLs that are expected to be accessed shortly after an application begins execution. Windows® determines such DLLs by monitoring each execution of every application for 15 seconds after execution begins and records the DLL usage in special ".pf" files saved in a special folder for that purpose. Included within each such ".pf file is the full path of the executable and a timestamp showing when it began execution. It is not usually necessary, however, to read the .pf file's contents because its last modified time closely reflects the application execution start time and it is named in a manner that allows ready identification of the executable. Since most executables started are monitored in this way, it is a good indication of recently used applications. There is, however, a limit to the number of files contained in the .pf folder, and the files contained therein are sometimes pruned out by, for example, system boots. Thus, the Prefetch method does not always provide complete usage for all applications actually used, but it is a good indicator of last usage for many applications. Further details regarding the PreFetch method are discussed below.
The next method of determining last usage of an executable is "MethodAppRunning." In this method, the computer or network of computer is queried about currently running applications. In all versions of Windows®, it is possible to enumerate running processes to provide coarse usage information about the application executable files running in them. The fact that the respective processes are currently in use is itself an indicator of last use. In later versions of Windows® it is also possible to determine the process owner and the actual start time of each running process, thus providing more detailed usage information.
This method yields immediate usage information, but only for those executables that are then running. It is a good compliment to the method
MethodPrefetch, because, as noted, there are times when an executable is either not prefetched, or may have been pruned from the PreFetch folder, but still in use, i.e., when the executable is left running for days or even weeks.
As one solution, process enumeration is performed using the Windows CreateToolhelp32Snapshot(), Process32First and Process32Next() functions. The latter two return the process identifier (PID) of each running process along with the name of the executable file for the process. On Windows 2000 and later, the PID may then be used to obtain a process handle from which the start time and owner SID of the process may be found. Additionally, the PID allows this method to obtain the full path to the executable using Modulel32First () in Windows Vista and later. Referring still to Fig. 2, the software items specify if the application was determined to be running. Illustratively, for MethodAppRunning there may be a Boolean indication 212 showing that the executable was found running, or not, at the time of discovery.
The other method of determining last usage of an application is the "MethodAppStartup" method. This derives usage information about applications that are known to start running automatically when a user logs on. When a user logs on to Windows, certain user-specified (or administrator-specified) applications are started automatically. Thus, the program of the present invention assumes that such a "startup" application was run at least as recently as the last logon time for that user. From this information, the last use and last user can be derived regarding such applications, even if they are not currently running. A place to find such application information would be in the registry "Run" keys, including the Active Directory and the "Legacy" varieties. Also, the Startup folder in a user's Start menu, including the all-users Start Menu, may also contain such information.
Referring still to Fig. 2, there may be a Boolean flag 214 which indicates whether the executable is registered to run as a service. Any method may include checking whether an executable is a service because services can be set to start running automatically when the operating system boots. In the preferred embodiment, the IsService flag is only set by the MethodNone and MethodLastAccessed methods. Whether a software item is a service is relevant, and used in records , to distinguish between executables that are run automatically and executables that are run by user interaction.
After the discovery methods have been applied, the result is a list of software items containing usage data for executables discovered on the computer. Further, if a computer profile from a previous discovery cycle is available, post-merge process usage data from that profile's software items are also added to the list when not superseded by more recent data. Each executable file can have multiple software items in the list, which include data for all the software programs, including the application executable files that comprise the software program that are installed or running on the computer. The client computer next sorts the software items in a suitable manner, such as alphabetically by path name. A merge process is then applied to the sorted list. Thus, in accordance with the invention, the software items on the list are merged such that each executable has a single software item on the list. With respect to a software item's appearance on the list, both short and long Windows file path notations are considered to be equivalent. Adjacent items are compared and when two adjacent items refer to the same file path, the following queries are applied to merge the adjacent software items in accordance with the present invention:
1. If one item's method of last use is MethodLastAccessed and the other is not, then the MethodLastAccessed item is discarded;
2. Otherwise, if the difference between the two item's LastUseTimes is greater than some threshold (illustratively 30 seconds), then the earlier item is discarded;
3. Otherwise, if the difference between the two item's LastUseTimes is less than or equal to that threshold (illustratively 30 seconds), then the item that has no LastUseUser value is discarded, and the one having a valid LastUseUser value is retained;
4. If the discarded item has the IsRunning flag set, then the flag is transferred to the retained item; and 5. If the discarded item has the IsService flag set, then the flag is transferred to the retained item.
The resulting merged list of software items may be uploaded to the server 14, and retained as records in the associated database 18, to report usage network-wide such as on the computers in the network or on a subset or group of the computers in order to determine for example, a network-wide number of recent users of a particular program or version thereof. Other items of information may include where in the network is the greatest concentration of usage and so forth.
The resulting list of software items may be utilized on a given computer, to record that computer's usage. Alternatively, or in addition, in one embodiment, the network is represented as a hierarchical system having a group hierarchy that is configured to mimic the organizational authority structure of its users, such that the structure resembles an organization chart. The usage information is included as part of the reports produced for the various groups. The grouping of the computer profile data also serves the function of regulating user access rights within the BelManage® product. Each BelManage® user has access only to profile data (and thus reports) associated with a designated BelManage® login group and sub-groups thereof. This method may be further understood with reference to Fig. 3, which is a flow chart 300 of an illustrative procedure by which a client computer discovers information about a single application executable files and generates a software item for each method of discovery for each executable file installed on the client computer. The program begins with the start step 302 and continues to step 304, which is to determine the name of the executable file in question. In step 306, the directory where the file is located is determined. Next, in step 308, the last user and the last use time is found using each of the predetermined methods described above for extracting software usage data for each application executable from the operating system. For each application executable, the methods described above are performed to obtain as much information as possible about each executable in step 309. A software item is generated for each executable as shown in step 31 1. Each software item is then recorded in a list in accordance with step 312. The procedure ends at step 313.
Figs. 4A and 4B together form a flow chart of a procedure by which the software usage discovery program running on each client computer generates a list of software items generated in the procedure of Fig. 3, and for merging the list of such items in accordance with the present invention. The procedure begins at the Start step 413 and proceeds to step 420. At step 420, a list is formed including each software item representing each software executable that is installed on the client computer using the procedure in chart 300 (Fig. 3). In step 422, the list is sorted such that items that have the same file path are placed adjacent to one another in the list.
The first two datum of chart 200 (202 and 204) are compared for adjacent items in step 423. As noted above, if one item's method of last use is MethodLastAccessed and the other is not, then the MethodLastAccessed item is discarded as shown in steps 424 and 426. Otherwise, if the difference between the two item's LastUseTimes is greater than some threshold (illustratively 30 seconds), then the earlier item is discarded as shown in steps 428 and 430. The merge process continues and the client computer compares adjacent items on the list that refer to the same file path name. This is performed so that each application executable file, or version thereof, appears only once on a final list. A series of substeps, which are queries that are applied to adjacent items that have the same file path, are performed as part of the merge process. For clarity of illustration, these queries are shown as separate steps in the flow chart of Figs. 4A and 4B.
A first query at step 423 is whether two adjacent items refer to the same file path. If they do, the procedure follows the YES path to query step 424. Step 424 queries whether one item has a last use method as a "MethodLastAccessed" and the other does not. If so, then the YES path is followed to step 426, which is to discard the method last accessed item and then the procedure continues with step 442. (Fig. 4B) If it is not true that one software item has a "MethodLastAccessed" and the other does not, then the NO path is followed to query step 428, which asks whether the difference between the two item's last use times is greater than a predetermined threshold value that is set by the system administrator. If the difference is greater, then the YES path is followed to step 430, which is to discard the earlier item and then the procedure continues with step 442.
If the difference in times is not greater, then the NO path is followed to query step 432. Step 432 is a query whether the difference between the two item's last use times is less than or equal to the predetermined threshold. If so, the procedure flows to step 434, which is to discard the item that has no last use user and retain the item having a valid last use user value and then the procedure continues with step 442.
If the answer to query 432 is NO, then the procedure moves to step 450, which is to record a list of unique items containing the best information that is available about each executable file in the computer profile for that computer.
Returning to steps 434, 426, or 430, which provide for an item to be discarded, the YES path on the right hand side of the flow chart is followed such that the procedure continues to step 442, which is a query step asking whether the discarded item has an IsRunning? flag set. If so, the item's flag is transferred to the retained software item and the procedure goes on to perform step 446. If, on the other hand, the item does not have an "IsRunning?" flag set, then the NO procedure follows the path to query step 446, which asks: Does the discarded item have an "IsService?" flag set. If so, then the procedure flows to step 448 which is to transfer the flag to the retained software item, and continue with the procedure to step 450. In step 450, a list of unique items containing the best information about each executable file's last use is included in the computer profile and then the procedure ends at step 460. If the item does not have an IsService flag set, the procedure flows to step 450.
Returning to step 423, which is a query step that inquires whether two adjacent items refer to the same file path, if the result is No, then the process continues to step to step 450, which is to record a list of unique items containing the best information that is available about each executable and including that information in the computer profile.
When all retained items are included on the list, such that each executable appears only once on the list, the list is included in the computer profile at step 450 and the procedure ends at step 460 until the next time that the administrator chooses to analyze the software, i.e., the application executable files, that are installed on the computer in the network of computers. The computer profile may be sent to the server 14, which stores the information in database 18 as part of the computer's profile data as a database record. The administrator may request reports that summarize this information. In accordance with a further aspect of the invention, the process can be performed on a per executable basis. In such an alternative process, the sorting step 422 and the adjacent comparison of adjacent items 423 could be omitted and the process can be continued for each executable, which process is summarized as follows: A. creating an item for one method, B. discover using a second method, C. merge the results from the second method with the first into one item again, D. repeat B and C again for other methods until the information desired for a given executable is determined.
Moreover, the procedure 400 (the flow chart of Figs. 4A and 4B) or the per executable procedure may be set to run automatically every day, week, month, or other regular time period to produce the list of software and related information about each software item's usage. This description of the procedure relates to a network of client computers that are interconnected to a server computer, however, it should be understood that the process and system of the present invention can be readily adapted to perform the stated steps on an individual, stand alone computer in accordance with the present invention. Furthermore, the procedures have been described in such a manner that the client computer generates the software items and performs the merge process. In an alternative embodiment of the invention, the server may be programmed to perform the steps of generating the profile from the software items, which have been uploaded to the server from the individual client computers. Additionally, or alternatively, the server may be programmed to perform the merge process. In addition, the steps illustrated in the figures and described herein are illustrative of aspects of the invention, and not limiting thereto. It should be understood that in certain applications of the invention, the steps can be performed in a different order, and/or steps can be omitted or repeated as desired.
When the software items in the list have been merged in this way, the final result is a list of unique items, one per application executable file, containing the best information about each file's last use. A report can then be generated which sets forth the information in a format desired by the user. Several examples of this are provided below. Alternatively, the list or portions thereof may be included in a more detailed report of other computer profile data for the computers being managed by the system of the present invention. In the report, when a software program is comprised of several executables (each being the same publisher's company and product name) a single aggregated entry may be shown to represent the entire set. That entry shows the data for highest software version found in the set. A link can be provided to a more detailed report for each executable in the set, if desired in a particular application of the invention.
Illustratively, the report's displayed usage data will be for the aggregated entry from the most recently used executable, unless that executable is registered as a service that starts automatically. In that case, the displayed usage data is from the most recently used non-service executable. The non-service executable may be of greater significance because it represents active use of the software program by a user, rather than automatic use by the system. For a similar reason, the logic used to prefer non-service over service executables is also applied to "start up" items where the last use method is the method of application automatic start up. In addition, a single computer profile summary report can be created locally on a single computer, in which case information is displayed locally from the memory of the user's computer via the user's web browser. Fig. 5 is a chart illustrating a method of displaying software usage in terms of recency of use. The chart 500 indicates time of last use in accordance with an illustrative embodiment of the present invention. For example, item 502 is an underscored asterisk and exclamation point which indicates that one or more of the executables, that may be part of a suite of executable files, comprising a software program is currently running. As shown in row 504, an underscored asterisk with a Roman numeral I illustrates that the most recently used of the executables comprising a software program were last used within the past week, but none are currently running. An underscored asterisk with a Roman numeral II as shown in row 506 means that the most recently used of the executables comprising a software program were last used in the past 90 days, but longer than one week ago. Row 508 includes an underscored asterisk and a Roman numeral III to indicate that the most recently used of the executables comprising a software program was last used within the past year, but longer ago than 90 days. Item 510 is an asterisk with four Vs (UU) to indicate that the most recently used of the executables comprising a software program was last used over one year ago. And finally, as shown in row 512, an underscored asterisk indicates that the last use is unknown and the executables comprising a software program may never have been run.
Examples of reports that are generated by the server and displayed in graphic user interfaces that are designed in accordance with the present invention are depicted in the illustrative graphic user interfaces of Figs. 6A through 9. Fig. 6A is a graphic user interface (GUI) 600a for depicting software versions for computers using a particular software program in accordance with an illustrative embodiment of the present invention. Fig, 6B is a graphic user interface relating to the computer networks using a particular software version. Returning to the report of Fig. 6A, the software program 602 is Microsoft® Office 2003. The current group is "sample reports," as shown in the pull down window 604. Column 606 provides a count of 17 instances of this software program being used in computers in this group. The GUI also includes, illustratively, a column for computer System Names 610, version 612, date of last use 614 and last user 616. Thus, this type of report is illustratively entitled: Software Versions - Systems Using Product. As shown in Fig.6A, the report provides the name of the computer or network of computers, the version number of the Office 2003® version being used, the date of last use and the last user. This report can be generated by selecting, illustratively, clicking on a product's name in the "All Software Versions" report (not shown). It can also be selected using other identifiers which remain within the scope of the present invention. Fig. 6B is a graphic user interface 600b for depicting systems using a particular software version in accordance with an illustrative embodiment of the present invention. The software program 622 is identified as Office 2003 manufactured by Microsoft®. The version number 624 is 1 1.0.5614. As shown in the report summary section 626, eight computers use this version. The Details section 628 contains the system of each computer using that particular version, as shown in column 630. The date of last use is shown in column 632, and the last user is shown in column 634.
Thus, this report lists those computers within the selected group that have a specific version of a given software program installed. The report contains the date of last use and the name of the last user. The report is generated when a user clicks on a version range in the AU Software Versions report (not shown). Then, the user can click on a specific version number in that report. In alternative embodiments of the invention, there may be other techniques by which this report can be selected and/or presented. Fig. 7 is a graphic user interface 700 for depicting the installed software section of a computer profile summary for computer profile data. The installed software is listed in column 702 and the date of last use is provided in column 704. This report is a summary of information collected from a particular computer about the software that is installed on that computer, showing also the software publisher company, the software program name and the version number of each instance of a software program installed on the computer. This report can be illustratively contained in a computer profile summary report and may be viewed by clicking on a computer name in the System List report (not shown) in accordance with an illustrative embodiment of the invention, or it may be produced as part of another report or in many other variations as desired in a particular application of the invention. Fig. 8 is a graphic user interface 800 for depicting details for a particular software program of a computer profile in accordance with an illustrative embodiment of the present invention. The particular software being studied in the report is Office 2003 (802) manufactured by Microsoft® and the computer name 804 is provided as dskθθl(kjones). One install directory for that software is provided at pane 806. The first instance of a related executable is found in the computer in the C:\ drive. As shown in line 808, the directory path name for the software product is C:\Program Files\Common Files\Microsoft Shared\Snapshot Viewer. This executable has a description 810 which is listed as Office Access Snapshot Viewer and its version (812) is 11.0.5510. The executable has a file name 814 of Snapview.exe and the size 816 of the executable is 47 KB. The data of last use 818 was 12/7/2006 and the last user 820 is ecollins. Similarly, a number of executables for Office 2003 are installed on the f:\ drive, as shown at line 822. The executables listed there depict the information for each instance of a Microsoft Office® component installed on the computer. In summary, this report shows the details of a specific software program listed in the Computer Profile Summary report. It shows executables comprising the software program (having the specific company and software program name) along with descriptions, filenames, sizes, versions and install directories of each. In accordance with an illustrative embodiment of the present invention, two columns show the date of last use and name of last user, if known.
Fig. 9 is a graphic user interface 900 for depicting the software versions section of a computer profile summary for an individual computer. As shown in the GUI 900, each software item that is installed on a computer is listed, such as, for example, the software identified at line 902 entitled EnTech Taiwan - PowerStrip for Windows Version 3.49.0.0. Also provided is the graphic from the table of Figure 4 indicating the time of last use. In the example, the software 902, is identified by the graphic "*IIH" (904), which indicates that the program was last run over one year ago. This allows an administrator or user to easily distinguish rarely used software from software programs that have been run recently, and are therefore more likely to be frequently used. This information can also be provided by rolling the mouse over the asterisk next to software name and an information box 906 appears and provides further information about the executable. As noted at the top of the report, if the user clicks on the asterisk next to a the software name, then the location of the software is provided. There are various other ways in which this information may be presented, while remaining within the scope of the present invention. In the example, the report is provided for an individual computer, but it can also be used for a client computer in a network of computers.
Fig. 10 is a flow chart of a procedure 1000 for obtaining information from a Windows PreFetch file, as mentioned hereinbefore. More specifically, the PreFetch files have the extension .pf. Inspecting and parsing a .pf file can provide the name or path of the executable to which the .pf refers and the date and time that the .pf file was last updated by the Windows Task Scheduler (which indicates the last time the executable was last run).
As shown in Fig. 10, the procedure 1000 begins at the start step 1002 and continues to step 1004 which is to extract the substring that precedes the dash and hash code of the PreFetch file name. For example, the PreFetch file name is the name of the software executable itself followed by a dash and the hexadecimal representation of a 32-bit hash of the file's path and command line arguments (and followed by the .pf extension). An example is EXCEL.EXE-28297C59.pf. The executable file name, then, is trivially obtained by extracting the substring that preceded the dash and hash code. In accordance with the invention, this is accomplished by parsing the name starting at the end and working backwards. This is preferable because the name of the executable may itself contain a dash character.
Then, the procedure continues to step 1006 which is to obtain the update time of the PreFetch file from "ftLastWriteTime" which is a member of the WIN32_FIND_DATA structure returned by the WINDOWS FindFirstFile() and FindNextFileO functions. This is the time the task scheduler updated the .pf file, and closely corresponds to the time the executable was last run. This is an efficient method of obtaining and extracting information from Windows PreFetch files, without having to open and read the file. However, since only the name of the executable is provided without path information, the technique of Fig. 10 does not work when the name is ambiguous. For example, multiple executables may exist on the same computer or network of computers with the same name but in different folders and each yields the same filename but a different hash code. In that case, in accordance with the invention, the better method is to follow the procedure of Fig. 1 1.
Fig. 1 1 is a flow chart 1 100 of an alternative procedure for obtaining information from a Windows PreFetch file in accordance with an illustrative embodiment of the present invention. The procedure begins with the start step 1102 and continues to step 1104, which is to open the contents of the Prefetch file. Each file relates to an executable installed on that computer. In the next step 1106 the contents of the file is inspected in order to find an initial header. The header provides file offset and the size of each data section. It also provides the time of last application execution that reflects the recency of use of the application. Then, step 1 108 examines the null terminated path strings contained in the module path list, its offset and size found in the header, to find the full path name of each module. If actual usage counts are important, the procedure continues to step 11 10 in which the header data is also inspected for the number of times the application has been executed since the file's creation. The procedure ends at step 1 112. Fig. 12 is a chart illustrating exemplary header data in a Windows® Prefetch
File which can be advantageously employed in accordance with an illustrative embodiment of the present invention. The chart 1200 summarizes Header Data in the Windows PreFetch file. Specifically, at Byte Offset 4, there is a data word consisting of a Magic Number. As will be understood by those skilled in the art, the magic number is one way of incorporating metadata to specify a document file type or format. The magic number is four bytes long. Then, at Byte Offset 100, the data word indicates the offset to start the module path list. At Byte Offset 104, the data provides the Size of the module path list (in bytes). Then at Byte Offset 120 the time of last application execution is provided. At Offset 144, the data word provides the number of application executions.
Fig. 13 is a chart illustrating exemplary header data in the new Windows 7 operating system regarding UserAssist keys. Specifically, in Windows® 7, as in previous versions, each value in the "Count" key contains a block of binary data consisting of various pieces of information Windows® uses internally to implement features in the start menu (and perhaps other features). In accordance with the present invention the software usage discovery system seeks to determine the last use timestamp indicating when a shortcut or executable was last opened or executed (an 8-byte FILETIME), and perhaps the run count (a 4-byte DWORD indicating how many times the shortcut or executable has been opened or executed).
In the original (version 3) Windows ® scheme, the binary blocks for .exe and .Ink file values are 16 bytes long. As illustrated in the chart 1300 of Fig. 13, the byte offsets to the run count and last use time are 4 and 8, respectively. The run count starts at 5, meaning it will have a value of 6 the first time the application is run.
Notably, in the Windows 7 (version 5) scheme, the binary blocks for .exe and .Ink file values are 72 bytes long. As indicated in Fig. 13, the byte offsets to the run count and last use time are 4 and 60, respectively. The run count starts at 0. It should be understood that the present invention specifies a method that has a number of alternative procedures to determine information that may be used to make informed decisions about the usage of software programs, that may be comprised of multiple application executable files, that are running in a network or on an individual computer. The present invention provides detailed information about the installation of particular executables and recency of use of such executables which information will facilitate better decision making regarding license purchase, allocation and memory usage throughout the network of computers or on an individual computer. The invention does not require use of run-time intervention on the computer to perform the method because it derives reliable usage measures from information that is already being collected and maintained by the operating system in various registers, keys, files and the like. The present invention has the advantage of providing usage information that is reliable and complete. As noted, this will prove valuable to software license administrators seeking to identify underused software and/or recently used software, and to determine other information such as allocation as desired in a particular application of the invention.
In accordance with a further aspect of the invention, reports can be generated across the whole network of computers regarding a particular software program, application executable file, or other information such as the number of users who have run the executable and the recency of such uses. Or individual computers in a subset of the client computers can be examined for certain executables, or versions thereof and usage of the application executable file that may be part of a software program. While the invention has been particularly shown and described with reference to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details can be made without departing from the spirit and scope of the invention. Furthermore, the terms and expressions that have been employed herein are used as terms of descriptions and not of limitation. There is no intention in the use of such terms and expressions of excluding any equivalents of the features shown and described or portions thereof. It is recognized that various modifications are possible within the scope of the invention claimed.
What is claimed is:

Claims

CLAIMS 1. A method of obtaining information about software usage in a network of computers, comprising: in a network of computers that are in communication with a server, collecting information, at a given client computer, about executables installed on a computer in the network of computers, by ; generating one or more software items for each executable that includes a method of last use and one or more of the following: 1. file name, 2. directory, 3. date and time the executable was last started, 4. security identifier of the last user, 5. whether the executable was found to be running at the time it was found, and 6. whether the executable is registered and run as a service, generating a list of software items containing usage data for executables found on the computer; merging the information on the list so that a one software item for a given executable appears on the list; and including information from the one software item on the list for each executable in a computer profile for that computer; and collecting the computer profile data from respective computers in the network of computers; storing computer profile data in an associated database; and producing reports about executables, software programs comprised of one or more executables, or both, from the data stored in the database comprised of one or more executables.
2. The method as defined in Claim 1 wherein determining the method of last use comprises retrieving a last access time maintained by a file system running on the given computer.
3. The method as defined in Claim 1 wherein determining a method of last use comprises: opening an application's executable file by at least one of the following: opening a document file associated with an executable; typing an application name into a "Run" menu, starting an application from its Windows® Start Menu shortcut; and extracting usage information including at least one of date and time the executable was launched, a cumulative count of the number of times the executable has been launched, and the user who launched the executable.
4. The method as defined in Claim 1 wherein determining the method of last use comprises opening a Windows® Pre-fetch folder and extracting a file path of the executable and a time stamp showing when the executable began execution.
5. The method as defined in Claim 1 wherein determining the method of last use comprises querying the file system for information about currently running processes.
6. The method as defined in Claim 5 further comprising determining at least one of the process owner and the actual start time of one or more running applications.
7. The method as defined in Claim 1 wherein determining the method of last use comprises searching for applications that start running automatically when a user logs on to the computer.
8. The method as defined in Claim 1 wherein the merging process comprises comparing two software items having the same file path in accordance with one or more of the following: 1. when an executable has a method of determining last use that is based upon last access time, and the other executable does not have such a method of determining last use, then discarding from the list the executable that has the method of determining last use that is based upon last access time, and retaining the other item; 2. otherwise, if the difference between the last use times of the two software items is greater than a predetermined threshold, then discarding the software item with the earlier time and retaining the other item; 3. otherwise, when the difference is less than or equal to the predetermined threshold, then discarding the software item that has no last user value and retain the software item with a valid last user value; 4. when a discarded software item has an IsRunning flag set, then transferring that flag to a. retained software item; 5. when a discarded software item has an IsService flag set, then transferring that flag to the retained software item.
9. The method as defined in Claim 1 further comprising producing reports setting forth information about one or more selected executables, software programs that are comprised of one or more of the executables, or both.
10. The method as defined in Claim 1 wherein producing reports setting forth information about executables and/or software applications includes producing reports that include usage information for all or a subset of computers in the network.
11. A system for managing a set of computers in a network of computers, comprising a plurality of client computers and a server; one or more client computers embodying program instructions for determining the usage of installed executables using a plurality of methods of last use to create a respective software item describing executables that are components of software programs, the client computers uploading the software items to the server; a software module embodying program instructions for performing a merge of the software items that relate to the same executable and producing a list of software items that includes one software item for a given executable; the server, in communicating relationship with the client computers, embodying program instructions relating to collecting the usage information associated with the respective client computers; producing reports regarding usage of executables and software programs comprised of executables or both that are installed on one or more of the client computers. a computer information database in which selected information about software usage in the system is stored in one or more database records.
12. The system as defined in Claim 1 1 further comprising a server producing reports based upon the database records which reports include information about one or more of usage of executables, software programs comprising executables, versions thereof, users thereof, and frequency of use of given executables, software programs or both. .
13. The system as defined in Claim 1 1 wherein the client computers are grouped based upon computer grouping criteria that are selected from information in the database, and the reports are produced for the computers within a given group and subgroups thereof.
14. The system as defined in Claim 13 wherein said groups are based upon primary and secondary criteria.
15. The system as defined in Claim 1 1 wherein the software module operates within a given client computer, and uploads the list to the server.
16. The system as defined in Claim 1 1 wherein the software module operates within the server.
17. The system as defined in Claim 1 1 wherein said graphic user interface comprises a display of software versions of a particular software program that are being used in the client computers or an individual computer, and at least one of the computers upon which the item being displayed, at least one of a date of last use of the software items, and the last user.
18. The system as defined in Claim 1 1 wherein said graphic user interface comprises a depiction of a list of computers that are using a particular version of software.
19. The system as defined in Claim 11 wherein said graphic user interface comprises a depiction of the installed software on a particular computer and the date each program was last used by the computer.
20. The system as defined in Claim 11 wherein said graphic user interface comprises an install directory for a particular software program on a specific computer and at least one of a path name for each software item, the name of the software item, the version number, the filename and size, the date of last use and the identity of the last user.
21. The system as defined in Claim 11 wherein said graphic user interface comprises a list of software programs and the version of each and an indication of the recency of use of the software item.
22. The method as defined in Claim 21 wherein said graphic user interface includes an information box providing further details about a software program selected by the user.
23. The method as defined in Claim 1 1 further comprising a computer workstation for administration of the client computers which monitors the usage of one or more executables, software programs or both on one or more selected client computers in the network of computers and at which said reports can be visually displayed in a graphic user interface for inspection by a user.
24. A method of obtaining information about software usage in a stand alone computer, comprising: collecting information, at a computer, about one or more software application executable files installed on the computer; generating one or more software items for each software executable that includes a method of last use and one or more of the following: 1. file name; 2. directory; 3. date and time the executable was last started; 4. security identifier of the last user; 5. whether the executable was found to be running at the time it was found; and 6. whether the executable is registered and run as a service. generating, a list of software items containing usage data for executables found on the computer; merging the information on the list so that one software item for a given executable appears on the list; and producing a report detailing information about one or more software items on the list.
25. A system for managing a computer, comprising: a computer memory embodying the computer program instructions for monitoring the usage of installed executables on the computer, including at least one of: collecting information, at the computer, about one or more executables installed on the computer; generating for a given executable, one or more software items that each include a method of last use and one or more of the following: file name; directory; date and time the executable was last started; security identifier of the last user; whether the executable was found to be running at the time it was found; and whether the executable is registered and run as a service; and a computer workstation for administration of the system which monitors one or more executables, that are installed on the computer, to determine usage of the executables, software programs comprised of the executables, or both, and producing reports relating to the collected usage information.
26. The system for managing a computer as defined in Claim 25 wherein reports are visually displayed in a graphic user interface for inspection by a user.
27. A database management system, comprising: a network of client computers and a server; one or more client computers embodying program instructions for determining the usage of executables on one or more of the client computers using a plurality of methods of last use, creating unique software items describing the executables and including the software items in computer profile data; and a server in communicating relationship with the client computers, the server embodying program instructions for collecting the computer profile data in a computer information database and producing records relating to the information contained in the software items, producing reports regarding usage of executables installed on one or more of the client computers.
28. A method for discovering software usage, comprising: collecting data about usage of executables from a number of sources within the memory of one or more computers, including data collected using a variety of different methods; generating a software item for each executable determined by each of such methods that were used to locate each application executable file that is discovered on one or more computers; sorting the software items into a list; merging the list including applying multiple queries to items on the list that refer to the same file path to determine whether a duplicate software item is found for a given application executable file; when a duplication is found, transferring desired data from the duplicate item to a retained item and discarding the duplicate item; combining the data to produce a list of retained software items that include the best usage information about each executable that is installed on that computer; and storing the information contained in the retained software items as one or more records in an associated database.
29. The method as defined in Claim 28 further comprising at an associated server, generating one or more reports from the records relating to one or more of the computers as requested by an administrator.
PCT/US2009/004983 2008-09-02 2009-09-02 System and method for software usage discovery WO2010027477A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US9361808P 2008-09-02 2008-09-02
US61/093,618 2008-09-02

Publications (1)

Publication Number Publication Date
WO2010027477A1 true WO2010027477A1 (en) 2010-03-11

Family

ID=41202789

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2009/004983 WO2010027477A1 (en) 2008-09-02 2009-09-02 System and method for software usage discovery

Country Status (2)

Country Link
US (1) US8473607B2 (en)
WO (1) WO2010027477A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685071A (en) * 2012-09-20 2014-03-26 腾讯科技(深圳)有限公司 Network source distributing method and device

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339511B (en) * 2007-07-02 2011-06-15 国际商业机器公司 Method and system for controlling and self-adaptively preloading dynamic link libraries
US8607225B2 (en) * 2010-12-28 2013-12-10 Oracle International Corporation Managed upgrades of components in an integrated software and hardware system
TWI546700B (en) * 2011-01-13 2016-08-21 宏達國際電子股份有限公司 Portable electronic device, and control method and computer program product of the same
CN103019918B (en) * 2011-09-27 2015-07-15 腾讯科技(深圳)有限公司 Method and device for acquiring operating frequency of application program
US9027141B2 (en) * 2012-04-12 2015-05-05 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
US20140207846A1 (en) * 2013-01-23 2014-07-24 International Business Machines Corporation Client-side aggregation of nested resource dependencies
US9230069B2 (en) 2013-04-16 2016-01-05 International Business Machines Corporation Execution-based license discovery and optimization
GB2519790B (en) * 2013-10-30 2017-07-12 1E Ltd Configuration of network devices
US10819861B2 (en) * 2014-04-28 2020-10-27 Tangoe Us, Inc. Real-time usage detection of software applications
US10931543B2 (en) 2014-04-28 2021-02-23 Tangoe Us, Inc. Data usage analysis and reporting
GB2525874A (en) 2014-05-07 2015-11-11 Ibm Measurement of computer product usage
US10043153B2 (en) 2014-07-24 2018-08-07 International Business Machines Corporation Pattern-based product identification with feedback
US9772926B2 (en) 2015-08-20 2017-09-26 International Business Machines Corporation System and method for determining relevance of application software maintenance
RU2634177C1 (en) * 2016-05-20 2017-10-24 Акционерное общество "Лаборатория Касперского" System and method for unwanted software detection
US10536465B2 (en) 2017-01-18 2020-01-14 Microsoft Technology Licensing, Llc Security for accessing stored resources
US10542088B2 (en) 2017-01-18 2020-01-21 Microsoft Technology Licensing, Llc Modifying data resources within party-partitioned storage areas
US10838819B2 (en) 2017-01-18 2020-11-17 Microsoft Technology Licensing, Llc Including personal relationship metadata within duplicated resources shared across partitioned storage
US10776133B2 (en) * 2018-01-25 2020-09-15 Salesforce.Com, Inc. Preemptive loading of code dependencies for improved performance
CN110333997B (en) * 2019-07-15 2023-11-10 秒针信息技术有限公司 Method and device for fusing equipment use information
CN111258850A (en) * 2020-01-13 2020-06-09 奇安信科技集团股份有限公司 Method and device for updating software information based on Linux system
US20210240801A1 (en) * 2020-02-03 2021-08-05 Arris Enterprises Llc Digital rights management system resource manager
US11567924B2 (en) 2020-03-26 2023-01-31 International Business Machines Corporation Product usage discovery signature based on database table content changes

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5499340A (en) * 1994-01-12 1996-03-12 Isogon Corporation Method and apparatus for computer program usage monitoring
WO2001053948A2 (en) * 2000-01-18 2001-07-26 Isogon Corporation Continuous inventorying monitor
US20010013024A1 (en) * 2000-02-08 2001-08-09 Yoshinori Takahashi Apparatus and method for managing software licenses and storage medium storing a program for managing software licenses
WO2002005184A2 (en) * 2000-07-10 2002-01-17 Critical Devices, Inc. Method and system for software inventory management using a global central repository

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
WO1993011480A1 (en) * 1991-11-27 1993-06-10 Intergraph Corporation System and method for network license administration
US5678044A (en) * 1995-06-02 1997-10-14 Electronic Data Systems Corporation System and method for improved rehosting of software systems
US6128016A (en) 1996-12-20 2000-10-03 Nec Corporation Graphic user interface for managing a server system
US5987430A (en) * 1997-08-28 1999-11-16 Atcom, Inc. Communications network connection system and method
US7237240B1 (en) * 2001-10-30 2007-06-26 Microsoft Corporation Most used programs list
US7657499B2 (en) 2003-04-07 2010-02-02 Belarc, Inc. Grouping of computers in a computer information database system
EP1627286A1 (en) 2003-05-28 2006-02-22 Belarc, Inc. Secure user access subsystem for use in a computer information database system
US20070245002A1 (en) * 2006-04-15 2007-10-18 Huy Nguyen Community-based information view, management and delivery system with micro-access control for data view and data scope
US7844616B2 (en) * 2007-01-30 2010-11-30 International Business Machines Corporation Method, system, and program product for discovering relevant information in a dynamic information system
US8165886B1 (en) * 2007-10-04 2012-04-24 Great Northern Research LLC Speech interface system and method for control and interaction with applications on a computing system
US8302088B2 (en) * 2008-10-15 2012-10-30 International Business Machines Corporation Analysis of effects of a software maintenance patch on configuration items of a CMDB

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5499340A (en) * 1994-01-12 1996-03-12 Isogon Corporation Method and apparatus for computer program usage monitoring
WO2001053948A2 (en) * 2000-01-18 2001-07-26 Isogon Corporation Continuous inventorying monitor
US20010013024A1 (en) * 2000-02-08 2001-08-09 Yoshinori Takahashi Apparatus and method for managing software licenses and storage medium storing a program for managing software licenses
WO2002005184A2 (en) * 2000-07-10 2002-01-17 Critical Devices, Inc. Method and system for software inventory management using a global central repository

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685071A (en) * 2012-09-20 2014-03-26 腾讯科技(深圳)有限公司 Network source distributing method and device
CN103685071B (en) * 2012-09-20 2019-02-26 腾讯科技(深圳)有限公司 A kind of method and apparatus for distributing Internet resources

Also Published As

Publication number Publication date
US20100057905A1 (en) 2010-03-04
US8473607B2 (en) 2013-06-25

Similar Documents

Publication Publication Date Title
US8473607B2 (en) System and method for software usage discovery
US11698900B2 (en) Leveraging search query history in a search interface
US10810074B2 (en) Unified error monitoring, alerting, and debugging of distributed systems
US7661135B2 (en) Apparatus, system, and method for gathering trace data indicative of resource activity
US8839209B2 (en) Software performance profiling in a multi-tenant environment
US6996807B1 (en) Consolidation and reduction of usage data
US8533193B2 (en) Managing log entries
US20180032570A1 (en) Search point management
US20050256956A1 (en) Analyzing user-activity data using a heuristic-based approach
JP5710851B2 (en) System and method for impact analysis
US20050033777A1 (en) Tracking, recording and organizing changes to data in computer systems
JP2006520966A (en) Integrated server analysis
US20110153465A1 (en) Contextual computing system
US20060143144A1 (en) Rule sets for a configuration management system
US20080066069A1 (en) Thread Interception and Analysis
US11768776B1 (en) Evicting data associated with a data intake and query system from a local storage
US20060161895A1 (en) Configuration management system and method of comparing software components
US20060037000A1 (en) Configuration management data model using blueprints
US20080195670A1 (en) System and method for log management
US20120144374A1 (en) Capturing Replayable Information at Software Defect Locations in a Multi-Tenant Environment
US20110276770A1 (en) Method and system for analysing most recently used registry keys
US11645234B2 (en) Rule-based collections of subset(s) of metadata in response to a trigger event occurring
US20060059118A1 (en) Apparatus, system, and method for associating resources using a behavior based algorithm
Nordvik et al. Using the object ID index as an investigative approach for NTFS file systems
JP2012208565A (en) Log management method, log management device, and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09789260

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09789260

Country of ref document: EP

Kind code of ref document: A1