Computer hardware and software diagnostic and report system

Information

  • Patent Grant
  • 8234238
  • Patent Number
    8,234,238
  • Date Filed
    Wednesday, May 24, 2006
    19 years ago
  • Date Issued
    Tuesday, July 31, 2012
    13 years ago
Abstract
The present invention tests computer systems for defects that are able to cause performance and functional problems. An agent application is first installed on a user's system. The agent application then retrieves problem data from the expert system library pertinent to the user's operating environment. The agent application tests the user's system for each problem description within a downloaded data structure from the expert system library. If a problem is discovered, a script attempts to remediate the problem and/or notifies the user, describing the issue. If an unknown problem arises, a feedback mechanism expands the expert system library by sending a notification that a problem was discovered. The feedback is then utilized to increase the total knowledge in the expert system library. Then when another user with a similar or the same setup is tested, the agent application will recognize the issue and will take the appropriate remedial actions.
Description
FIELD OF THE INVENTION

The present invention relates to the field of computer system maintenance. More specifically, the present invention relates to the field of testing computer systems for configuration problems and providing remediation solutions to the discovered problems.


BACKGROUND OF THE INVENTION

With the complexity and interoperability of software and hardware today, it is very difficult to install or remove one program without having an effect on one or more pre-existing programs. Microsoft® Windows® operating systems as well as other operating systems have a plethora of components that all must maintain their integrity, otherwise the operating system becomes unstable and possibly fails. Furthermore, generally when hardware is installed, software drivers which allow the hardware to communicate with the software must be installed as well. If these drivers are corrupted, the hardware will not function properly. Additionally, many software programs have components beyond a main executable file which allow the programs to communicate with the operating system, and if these components are deleted or modified incorrectly, the program will no longer function. All of these components, whether they be part of the operating system, hardware or other software, must be able to co-exist without harming each other. Specifically, when the system is modified in some way such as by installing or removing a piece of hardware or a software program, the system should do it so that everything still functions correctly. Furthermore, over time, modifications are made to the system such as updating drivers and installing patches, and these modifications may adversely affect other components of the system. Also, if a user neglects to update his system, he could leave the system open to attacks by viruses or other intruders. So either by action or inaction, a user's system has the potential for issues, and such issues should be monitored.


There are many products which monitor a system or attempt to repair components of the system, but they all have their shortcomings and do not provide the full package to adequately ensure a stable system environment.


Windows® registry repair programs such as Registry Mechanic™ developed by PC Tools™ aid a user in cleaning, repairing and optimizing the Windows® registry. Registry Mechanic™ uses a detection algorithm to scan a user's registry and identify missing and invalid references in a user's registry. Then a list is provided of the registry errors found, so that a user is able to selectively choose to clean each item or automatically repair all of them.


BMC Software and Computer Associates International develop performance software, but these software packages tend to be host based software products.


Other products like security vulnerability scanning software, spyware/virus scanners and patch management software assist in maintaining a stable computing environment. Very well known companies like McAfee and Symantec develop virus scanners to protect a user's computer from being harmed by viruses. Viruses are computer programs which have the ability to disrupt and damage a user's system. The products from these companies are able to scan a user's system and locate irregular programs that fit certain definitions stored in a database. Upon detecting a virus, a user is able to remove the problem and hopefully avoid harm to his computer system. STEALTHbits Technologies develops a program called stealthAUDIT for Exchange. The program is an agentless auditing and conformance management platform that enables users to identify changes in the system to avoid problems by performing discreet patch scanning. However, these products are very focused exclusively on their specific areas of technology such as virus checking or patch management and do not include an entire package for maintaining system stability.


There are significant problems with the aforementioned options. They are not necessarily end user friendly. They do not focus on overall user support or computer reliability. They are not Application Service Provider (ASP) friendly. Furthermore, they lack other significant features. Hence, a solution is needed to overcome these issues.


SUMMARY OF THE INVENTION

The present invention tests computer systems for defects that are able to cause performance and functional problems. An agent application is first installed on a user's system. The agent application then retrieves problem data from the expert system library pertinent to the user's operating environment. The agent application tests the user's system for each problem description within a downloaded data structure from the expert system library. If a problem is discovered, then a script attempts to remediate the problem and/or a notification is sent to the user describing the issue. If an unknown problem arises, a feedback mechanism expands the expert system library by sending a notification that a problem was discovered. The feedback is then utilized to increase the total knowledge in the expert system library. Then when another user with a similar or the same setup is tested, the agent application will recognize the issue and will take the appropriate remedial actions.


In one aspect, a system for monitoring a computing device comprises a plurality of programs for interacting with the computing device to gather information and a plurality of scripts coupled to the plurality of programs for initiating the plurality of programs. Interacting with the computing device further comprises determining a setup of the computing device, gathering information related to configuration of the computing device and analyzing the computing device. The plurality of scripts are less complex than the plurality of programs. The plurality of scripts return a condition status. In some embodiments, the condition status is a binary-type value. The system runs in the background of the computing device. The plurality of scripts run in a specified order. The plurality of scripts are stored within an expert system library. The system further comprises a user interface coupled to the plurality of scripts for interacting with a user. The system further comprises a feedback mechanism for sending feedback to an expert system library. The feedback mechanism expands the expert system library. The system further comprises a reporting mechanism to report one or more problems. The plurality of scripts are embedded within an extensible markup language (XML) structure. The computing device is selected from the group consisting of a/an personal computer, Apple computer, thin client, laptop, cell phone and PDA. Gathering information includes discovering one or more problems.


In another aspect, a system for monitoring a computing device while running in the background of the computing device comprises a plurality of programs for determining a setup of the computing device, gathering information related to configuration of the computing device and analyzing the computing device for one or more problems, a user interface coupled to the plurality of programs, the user interface for interacting with a user and a plurality of scripts coupled to the plurality of programs and to the user interface for acting as an intermediary between the plurality of programs and the user interface, wherein each of the plurality of scripts return a condition status. In some embodiments, the condition status is a binary-type value. The plurality of scripts are less complex than the plurality of programs. The plurality of scripts run in a specified order. The plurality of scripts are stored within an expert system library. The system further comprises a feedback mechanism for sending feedback to an expert system library. The feedback mechanism expands the expert system library. The system further comprises a reporting mechanism to report the one or more problems. The plurality of scripts are embedded within an extensible markup language (XML) structure. The computing device is selected from the group consisting of a/an personal computer, Apple computer, thin client, laptop, cell phone and PDA.


In another aspect, a method of monitoring a computing device to gather information comprises determining a setup of the computing device, gathering information related to configuration of the computing device and analyzing the computing device. Analyzing the computing device further comprises querying the computing device for one or more problems. The method further comprises initiating one or more remediation scripts if one or more problems are detected. The method further comprises sending feedback to an expert system library. The method further comprises expanding the expert system library using the feedback mechanism. The method further comprises reporting one or more problems. The computing device is selected from the group consisting of a personal computer, an Apple computer, a thin client, a laptop, a cell phone and a PDA.


In another aspect, a method of monitoring a computing device to gather information comprises determining a setup of the computing device, gathering information related to configuration of the computing device, analyzing the computing device, reporting analysis on the computing device and sending feedback to an expert system library. Analyzing the computing device further comprises querying the computing device for one or more problems. The method further comprises initiating one or more remediation scripts if one or more problems are detected. The method further comprises expanding the expert system library using the feedback mechanism. The computing device is selected from the group consisting of a personal computer, an Apple computer, a thin client, a laptop, a cell phone and a PDA.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates a block diagram representation of the main components of the preferred embodiment of the present invention.



FIG. 2 illustrates a flowchart of the agent application determining if there are any problems.



FIG. 3 illustrates an example data structure for the expert system library.



FIG. 4 illustrates an example XML coded version of a data structure for the expert system library.



FIG. 5 illustrates a network implementing the preferred embodiment of the present invention.



FIG. 6 illustrates a flowchart of utilizing the present invention to maintain a stable computing device.





DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The present invention is a system and method for using an expert system library of computer configuration problems to test individual computer systems for the existence of problems and then providing remediation solutions for each discovered problem. The system enables maintenance procedures and requirements for system competence to be centralized and distributed, providing an end user a solution to scan his system for configuration problems and to manually or automatically resolve these problems. Configuration problems include, but are not limited to, incomplete software package install and de-installs, incorrect Windows® registry values, software release and patch release issues, software driver problems, network configuration and connectivity, performance issues and many other problems.


The present invention provides the ability to build a central expert system library repository with constructive input from multiple sources. The system is also able to support an application service provider (ASP) infrastructure and business enterprise applications. Furthermore, software applications have the ability to run disconnected from the central server and network. The system is scaleable so that it has the ability to support extremely large ASP user bases over disparate network topologies. The system supports subscription licenses, so that when the subscription is void or expired, the desktop software will be disabled and inactive. The system also supports disparate end-user hardware including Personal Computers (PCs), Apple PC's, thin clients, laptops, cell phones, PDA's and other mobile devices. The present invention utilizes a plug-in model so that each entry in the expert system library is discrete, allowing multiple authors to add to the central repository independently.


The present invention generally comprises four main components: a central compatibility expert system library, a host resident client interrogation agent, problem reporting and remediation mechanisms and a user support feedback mechanism.


Any of the many software and hardware configuration problems is able to be described discretely. Each problem, when stored in a format usable by software resident on an end-user's system, is able to be processed serially, meaning one problem at a time. In an alternative embodiment, problems are processed in parallel, meaning at the same time. The central expert system library stores the problem and resolution information. The information is able to be retrieved and communicated to end-user clients via a problem language and protocol. The information stored includes shared software module names and revisions, hardware driver prerequisites, hardware requirements, operating system revision levels and other operating environment prerequisites. The expert system library also contains software and hardware exceptions.


A plurality of discrete programs are utilized to address these problems. As knowledge grows, the library grows and thousands of discrete programs are developed. For example, initially the system knows how to problem solve internal issues related to CPUs, motherboards, hard disk drives, RAM, video cards, power supplies and software. However, as information is discovered related to other components, the expert system library is able to grow and trouble shoot those areas as well. These other components include for example, networking components such as network cards, cables and routers and peripheral devices such as printers, scanners and digital cameras. Furthermore, new products are continuously developed and with each new product, new issues arise, hence it is crucial to have the ability to continuously increase the expert system library's knowledge.


The discrete programs execute desired tasks and are able to remediate certain issues. For example, the function ethernet_counter determines if an ethernet cable is functioning correctly. If ethernet_counter returns values that increase over time, then the cable is likely not performing well and should be replaced. For such an issue, a user must manually replace the cable. However, if there is a software problem such as a conflict between device drivers, a program is able to automatically update the drivers to avoid the conflict if that is the proper remedy.


Agent software installed on an end user's system is resident and thereby able to interrogate the user's system for hardware and software configurations. The information obtained by the interrogation is used in conjunction with the expert system library to ascertain whether there are problems on an end-user's system. The expert system library describes individual prerequisites such as software versions, registry values and hardware and software configurations which are invalid or problematic. The agent application then uses the information to interrogate the client system for the existence of these problems. The discrete programs run in the background while monitoring the computing system. When an issue arises, the programs are executed in a specified order to analyze a particular aspect of the computing device. Generally, a program first determines the setup, then gathers system information such as licenses, software running and hardware configurations and then finally the system is analyzed. Analysis includes determining any problems and addressing them as deemed appropriate using scripts and programs. Furthermore, issues are assigned a severity or a priority so that high priority items are dealt with quickly. Additionally, there are health risks assigned to ensure the most important issues are corrected before any harm is done. For example, if there is a problem with a user's hard drive, that would be considered a high priority and also a high health risk because data might be written incorrectly resulting in data loss. However, if there is a problem with an ethernet cable dropping some packets, the priority is still high because a user desires a fast connection to the network, but the health risk is low since the only harm is that the user's access to the network is slower.


The agent software has many different functions, allowing it to accomplish a variety of tasks. The agent software is able to report issues that are found, making it a reporting engine, an inventory system, a security system and a performance manager. The agent software uses a language engine for performing the analysis. Although very complex tasks are being performed at times, the resultant script language is simplified for easy modification and interoperability. An interface environment uses the built in functions of the software to simplify what the user views. The interface environment, also referred to as the data entry screen, prompts the user for information. Simple and easily understood scripts are coupled to the interface environment. Then, beneath the scripting language is a more complex language which performs the underlying tasks necessary to remedy whatever situation exists. The scripts are generally less complex than the underlying programs to provide simplicity of interaction with the user interface. The underlying programs are necessary to interact with the system's hardware and software, thus need to have the specific abilities to accomplish such tasks. The scripts take the information from the programs and return a condition status. In some embodiments, the condition status is binary-type value such as “true” or “false,” “1” or “0” or a similar value. In other embodiments, the condition status is a string, ASCII value or other value representing status.


For example, if a user is having troubling viewing a web page on the Internet, the present invention will analyze the situation. There are many possible causes of this problem such as the web site being temporarily down or the user's internet connection not functioning properly. The present invention attempts to determine the root cause of the problem. A script initially asks if the host is available. The script uses the well known ping program or a program similar to the ping program to contact the host. Although the ping program returns data including the number of packets sent, received, lost, in addition to the round-trip time for the packets, that information is able to be consolidated into a binary form of an answer by the script. In particular, if the packets lost is equal to the packets sent, then the host is not available. So a script would ask something such as “Is the host available?” There are two possible responses from the script, “yes” the host is available or “no” it is not. As such, the script returns a much simpler and user-friendly response. Depending on the response, it is determined what else is required to pinpoint the problem. As shown, the script is simple in that it contacts specific programs to analyze the system and based on those responses, returns a binary-type answer.


The expert system library is compartmentalized, so that each component is able to handle a specific task. An example of the present invention in use is in the area of network analysis. There are a plethora of aspects of networking that could contribute to a user not being able to access the network. Furthermore, to check each aspect is a burdensome and slow process. However, with the present invention, the specific tasks are already designated and are then checked in a specified order. The broadest issues are addressed first and gradually the focus is narrowed to the specific component that is causing the problem. For example, if there is a problem connecting to the network, the following set of queries are used to determine why there is the problem. Is there a network device? If there is a network device, is it configured properly? Is the net device driver installed? Is the IP stack active? Is the IP stack DNS configured? Is the IP DNS active? Is there a default gateway? Is the default gateway responding? Is the first node after the gateway responding? Is the Internet accessible? Is the connection dropping packets? Are the tuning parameters set on the IP stack? Are the parameters set on the NetBios stack? Thus, based on the results of these queries, the present invention is able to identify where the problem is stemming from. As described above, the process of finding the answers to these questions is tedious and generally too complex for an average user, hence implementing the present invention not only improves efficiency and provides security, but it also enables those who are not computer savvy to accomplish tasks they otherwise would not be able to.


Contained within the expert system library is information describing the resolution of problems. The descriptions range from simple to complex and are able to include a variety of data such as user instructions on problem resolution or scripts which automatically resolve the end-user configuration problem. Resolutions include, but are not limited to, removal/cleanup of software de-installations, removal of invalid configuration information, installation of patches and others.


The present invention when used by a larger support organization is able to be an extremely valuable system to end users. Each time a customer reports a problem and the support organization corrects the problem within the software deployment, the correction procedure or script is added to the central expert system library. The feedback mechanism will continuously expand the expert system library and ensure each new software system is tested for a wider and more comprehensive group of problems and has solutions to resolve such problems. Once the expert system library has stored every possible problem, all customers of the support organization are able to potentially have their systems run securely with high stability.



FIG. 1 illustrates a block diagram representation of the main components of the preferred embodiment of the present invention 100. In the preferred embodiment of the present invention, an expert system library 102 stores information about software packages and hardware and software configurations 114 required to support the software packages. An agent application 104 is located on one or more user systems. The agent application 104 interrogates the user system 106 for hardware and application configurations. Using the information obtained from the interrogations, the agent application 104 is able to determine if there are any problems. If there are any problems, then the agent application 104 reports the problem to the end-user and/or initiates a remediation script to repair the problem. Furthermore, the agent application 104 is able to receive automatic upgrades 112 so that it is able to continue protecting against improper installations and also automatically upgrade the user system 106. A feedback mechanism 116 sends any newly discovered problem information to the expert system library 102, so that the expert system library 102 is able to incorporate such a problem and will be able to detect and resolve it in the future. The expert system library 102 is able to continuously grow so that it is able to detect more and more issues as time passes. All of the components of the preferred embodiment of the present invention function to assist a user in detecting conditions that will potentially corrupt the user system 106 and then grow the expert system library 102 when new issues are discovered, so that they will be detected in other systems in the future.



FIG. 2 illustrates a flowchart of the agent application determining whether there is a problem that needs to be remedied 200. At the step 202, the agent application is installed on the end-user's system. The agent application is able to come pre-installed on a user's system or a user is able to download the agent application as needed. At the step 204, the agent application interrogates the end-user system for the basic environment. At the step 206, the agent application retrieves problem data from the expert system library pertinent to the end-user's operating environment. For example, if the operating environment is Windows® NT, then problem data related to Windows® NT is retrieved. At the step 208, the agent application tests the end-user's system for each problem description within the downloaded data structure. At the step 210, the agent application determines if any of the problems are detected. If the end-user system does have problems, then the agent application either reports the problems to the end-user at the step 214 and/or initiates the remediation script to repair the problem at the step 212.


There are a wide range of problem conditions that the end-user system is able to detect in the step 210. The following are examples of problem conditions tested by the agent application; however, they are not meant to limit the invention in any way. Software is tested for problems such as problematic software patch revisions, incompatible software packages, problematic software installations and problematic software package un/de-installations. The operating system is also checked, such as Windows® registry corruption and existing performance issues. Environmental issues are investigated such as low disk space or hardware errors. Network issues are checked such as interface errors, DNS or IP configuration problematic, IP routing failure and ISP network performance. Other important elements of a secure system are investigated such as detecting viruses, driver problems and serious security vulnerabilities. Any issues that could create system instability are also able to be investigated.



FIG. 3 illustrates an example data structure for the expert system library. The expert system library transfers data structures to the agent so that the client is able to perform checks to determine if there are any problems. The preferred format for the data structures is an embedded language with XML wrapping, although any format is acceptable. The example data structure 300 has the following item definitions within it. An ID item 302 stores the test record number. A class item 304 holds the type of test to be performed, such as performance, software patch level, security, virus or software inconsistency. A platform item 306 stores the operating system environment information, for example Windows NT, ME or XP. A product item 308 contains the affected application's information. The product item 308 is a specific component that needs to be investigated such as the Windows Shell or a specified application. A description item 310 stores a detailed description of the problem described. A criteria item 312 holds the subroutine used to identify test criteria. Within the criteria item 312, a test_ref subroutine 313 is used to identify test criteria. Although only one test_ref subroutine 313 is shown in FIG. 3, the criteria item 312 is able to hold a number of test_ref subroutines 313 depending on what test criteria is needed. A remediation description item 314 contains instructions on how to repair the problem described, and a remediation script item 316 stores one or more scripts to automatically remediate the problem described.



FIG. 4 illustrates an example XML coded version of a data structure of the expert system library. In the example, the ID item is “5.” The platform item is “Windows.” Furthermore, the category is “hardware” and the family is “Hardware Management.” Hence, the agent application knows that it needs to investigate issues concerning hardware management of Windows®. Additional items are able to be included in the data structure as well such as a dependency, confidence and health index. The date_created and date_modified items are useful in determining when the data structure was created or modified which helps in the process of problem solving. The description item describes the problem, which in this example, is that the “ethernet card is reporting errors.” Diagnostic script language is included to determine the status of the hardware or software. Remediation information is used to help resolve the problem, such as a suggestion to “replace your ethernet cable.” If proper, a remediation script is included to automatically correct the problem. As described above, in the example, the data structure comprises the items required to perform system checks to aid in determining potential conflicts on a user's system. The aforementioned example is not meant to limit the present invention in any way.


The agent application is host-based software, pre-installed on an end user system. The application is an interpreter for the data structure downloaded from the central expert system library and a library of functions. The functions primarily access information about a user's system or remediate a user's system. For example, one function is able to query an operating system to determine if it has a certain patch installed, and another function is able to install the patch. The agent application is also responsible for reporting problems found. Other functions of the agent application include, but are not limited to, accessing hardware error counts, reading/writing the Windows® registry, accessing software modules and version/patch levels, moving, copying and removing files from the file system, reading operating system environment such as memory and disk space, updating virtual memory configurations and many other functions to maintain a stable environment.


The expert system library utilizes a plug-in architecture. Each expert system library record has functionality of a discrete program such that each entry is able to be added to the expert system library without affecting the other expert system library entries and updated or removed from the expert system library with no effect on the other problem records. Such a plug-in architecture allows multiple authors to maintain different problem records independently of simultaneous work being done on other problem records.


The expert system library data structure includes procedural language elements including, but not limited to, boolean logic, string manipulation, flow control verbs and simple match functions. The language provides a system interpretation tightly integrated with the operating system. The language is used to create powerful and flexible mechanisms to test for the existence of problem conditions. For example the following language function tests the Windows® registry for the existence of a value:














str regvalue


str regkey


regkey =


″\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\


CurrentVersion\Hotfix\Q31


2895′


regvalue = F$GETREG(regkey)


if (regvalue != ′<error>′) then









return 9 //signal hotfix not installed







else









return 0 //signal hotfix installed







endif









The example language checks if the HotFix (Patch) is installed by analyzing the value of the Windows® registry value at Q312895. If the value is not an error, then the Microsoft® patch is installed. Further, the routine is able to check for one or more code modules which are supposed to be updated by this patch. If the code module version is less than the correct value, then the registry has the patch recorded as installed, but the actual code module could be below the correct value, which would mean the patch was installed but the installation failed.


The language interpreter, part of the agent application, contains a set of functions which are called the Expert System Library Data Language. The functions are specific to operating environments, but operate the same for the Expert System Library Data Language. The operating environments where the functions reside could include Microsoft® Windows®, Microsoft® CE, Unix, Linux, handheld operating systems, cell phone operating systems as well as others. The function portability allows the present invention to be implemented across many different platforms.


Since the functions are created in the specific operating system environment, the functions are able to reach into the operating system environments to retrieve specific and detailed data. Examples of such functions include, but are not limited to: Read Windows Registry Value, Check Device Error Counter Values, Check File System Organizations and Structures, Check File Modules and File Version Values, Check for Installation of Specific Applications, Read Environmental Values and Counters, Read Windows Event Log Entries as well as other functions to retrieve specific data.



FIG. 5 illustrates a network implementing the preferred embodiment of the present invention. The present invention is implemented over a network of devices 500. The expert system library is stored on a server 502 that is coupled to the Internet 504 in a preferred embodiment. In alternative embodiments, the server 502 is coupled to a company intranet or other types of networks such as a Local Area Network (LAN), Wide Area Network (WAN) or a Metropolitan Area Network (MAN). In yet other alternative embodiments, the expert system library is stored on one or more servers. Furthermore, the coupling between the server 502 and the Internet 504 is able to be via networking cables or wireless means. The Internet 504 is also coupled to a variety of computing devices that have the agent application stored on them. The computing devices include, but are not limited to, a personal computer 506, a PDA 508, a cell phone 510, a laptop computer 512, a thin client 514 or an Apple personal computer 516. The agent application retrieves problem data from the expert system library on the server 502. Then, the agent application on the computing devices checks to determine if there are any problems in the system. If any problems are discovered, the agent application alerts the user and/or attempts to remediate the issue using a script. If an unknown problem occurs without being detected, the reporting mechanism sends feedback to the server 502, so that the expert system library is able to learn of the issue and is able to detect such a conflict in the future. Thus, users of the system are able to feel comfortable they are working on a safe and secure environment and when there are undiscovered issues, with a large network of people, these undiscovered issues will be noticed and recorded so that other users' systems are able to resolve such issues.



FIG. 6 illustrates a flowchart of utilizing the present invention to maintain a stable computing device. In the step 600, a setup of the computing device is determined by the plurality of discrete programs. Setup information includes operating system information and hardware of the computing device. Then the discrete programs gather information related to configuration of the computing device, such as software installations, hardware connections and other configuration information in the step 602. Using the gathered information, the discrete programs are then able to analyze the computing device in the step 604. When analyzing the computing device the discrete programs monitor the system to make sure proper patches are installed, no software conflicts exist, the environment is stable and other necessary components are reviewed. If a problem is detected in the step 606, appropriate scripts are initiated to remediate the problem in the step 608. After the problem is remediated or if there is no problem, in some embodiments, the analysis performed by the discrete programs is reported on the computing device in the step 610. The reporting allows a user to review the status of the computing device and if any problems were discovered and how they were remediated. Also, in some embodiments, if a problem is discovered but is not able to be remediated, then feedback is sent to an expert system library in the step 612, so that in the future, such issues are known and the appropriate action is able to be taken if these issues occur again. The process continuously repeats in the background of the computing device, so that the system is able to remain stable. It should be understood that only those components that are needed are utilized again. For example, if there is no modification to the computing device setup, that information is not reacquired nor is the configuration information if the configuration has not changed. Thus, the present invention is able to monitor the system thoroughly yet efficiently.


The present invention supports subscription licenses, so that when the subscription is void or expired, the desktop software will be disabled and inactive. With respect to subscriptions, the present invention has interfaces for billing support.


An additional feature of the present invention includes offline operation. The software has the ability to run disconnected form the central server and network. The drawback with offline operation is that a user must install some if not all of the expert system library, so that it is able to be utilized locally. Furthermore, if an issue arises, the feedback mechanism is not able to communicate with the expert system library, thus the expert system library will be limited in its growth capabilities.


To utilize the present invention, in the preferred embodiment, an end user computer has the agent application pre-installed. In an alternative embodiment, a user has to install the agent application after either downloading it or via CD. Once the agent application exists on the user's computer, it interrogates the user system for the basic environment. The agent application then retrieves problem data from the expert system library pertinent to the user's operating environment. The agent application tests the user's system for each problem description within the downloaded data structure from the expert system library. If a problem is discovered, then a script will attempt to remediate the problem and/or a notification will be sent to the user describing the issue such as “patch X is missing, go to www.findpatch.com to download and install the patch.” If a problem unknown to the expert system library arises, a feedback mechanism sends a notification to the expert system library that a problem was discovered. In the preferred embodiment the feedback is automatically sent via software. In an alternative embodiment, the feedback is sent via a user reporting the problem. The feedback is then utilized by the expert system library to increase the total knowledge. Then when another user with a similar or the same setup is tested, the agent application will recognize the issue and will take the appropriate actions to handle it. In time, the number of problems able to be detected and resolved will increase, thus creating a more secure and stable environment.


In operation, the present invention assists users in detecting potential problems and conflicts that a typical user is unaware of. Other programs attempt to detect specific problems, but they are insufficient to ensure an overall stable environment. The present invention not only checks for software conflicts; it also checks for conflicts within the operating system for hardware conflicts as well. When a conflict or problem does arise, the present invention utilizes scripts to attempt to resolve the problem and further reports these conflicts to the user. Furthermore, the agent application which monitors a user's computer is coupled to a feedback mechanism which is able to send data to the expert system library so that the expert system library is able to learn and expand to handle new potential conflicts. Since the expert system library is continuously expanding with new knowledge, once a new problem is discovered, the agent application is able to aid future users to resolve the problem. Ultimately, the present invention could potentially continue to gain knowledge to the point where most, if not all, conflicts and problems have been discovered and will be resolvable before any detriment comes to the user's system.


Within the present application, software includes programs, applications, scripts, system software, middleware in addition to any other generally known meaning of software.


The present invention has been described in terms of specific embodiments incorporating details to facilitate the understanding of principles of construction and operation of the invention. Such reference herein to specific embodiments and details thereof is not intended to limit the scope of the claims appended hereto. It will be readily apparent to one skilled in the art that other various modifications may be made in the embodiment chosen for illustration without departing from the spirit and scope of the invention as defined by the claims.

Claims
  • 1. A system for monitoring a computing device comprising: a. a server device in communication with the computing device, the server device including a memory device containing an expert system library;b. a plurality of programs stored on the computing device for interacting with the computing device to gather information;c. a plurality of scripts coupled to the plurality of programs for initiating the plurality of programs, wherein the plurality of scripts are stored within the expert system library, wherein the system runs in the background of the computing device; andd. a feedback mechanism stored on the computing device for sending feedback to the expert system library, wherein the feedback mechanism expands the expert system library, wherein the expert system library comprises a plug-in architecture, wherein the plug-in architecture comprises a plurality of entries, wherein each entry comprises a program that is functionally discrete from the program of other entries, wherein the expert system library comprises a dependency, a confidence and a health index.
  • 2. The system as claimed in claim 1 wherein interacting with the computing device further comprises: a. determining a setup of the computing device;b. gathering information related to configuration of the computing device; andc. analyzing the computing device.
  • 3. The system as claimed in claim 2 wherein gathering information includes discovering one or more problems.
  • 4. The system as claimed in claim 1 wherein the plurality of scripts are less complex than the plurality of programs.
  • 5. The system as claimed in claim 1 wherein the plurality of scripts return a condition status.
  • 6. The system as claimed in claim 5 wherein the condition status is a binary-type value.
  • 7. The system as claimed in claim 1 wherein the plurality of scripts run in a specified order.
  • 8. The system as claimed in claim 1 further comprising a user interface coupled to the plurality of scripts for interacting with a user.
  • 9. The system as claimed in claim 1 further comprising a reporting mechanism to report one or more problems.
  • 10. The system as claimed in claim 1 wherein the plurality of scripts are embedded within an extensible markup language (XML) structure.
  • 11. The system as claimed in claim 1 wherein the computing device is selected from a group consisting of a personal computer, an Apple computer, a thin client, a laptop, a cell phone and a PDA.
  • 12. The system of claim 1, wherein the plug-in architecture of the expert system library allows a plurality of authors to independently and simultaneous modify one or more of the entries.
  • 13. The system of claim 1, wherein the expert system library comprises a data structure including one or more of Boolean logic, string manipulation, flow control verbs and simple match functions.
  • 14. A system for monitoring a computing device while running in the background of the computing device comprising: a. a server device in communication with the computing device, the server device including a memory device containing an expert system library;b. a plurality of programs stored on the computing device for i. determining a setup of the computing device;ii. gathering information related to configuration of the computing device; andiii. analyzing the computing device for one or more problems;c. a user interface stored on the computing device coupled to the plurality of programs, the user interface for interacting with a user;d. a plurality of scripts coupled to the plurality of programs and to the user interface for acting as an intermediary between the plurality of programs and the user interface, wherein each of the plurality of scripts return a condition status, wherein the plurality of scripts are stored within the expert system library, wherein the system runs in the background of the computing device; ande. a feedback mechanism stored on the computing device for sending feedback to the expert system library, wherein the feedback mechanism expands the expert system library;wherein the expert system library comprises a plug-in architecture, wherein the plug-in architecture comprises a plurality of entries, wherein each entry comprises a program that is functionally discrete from the program of other entries, wherein the expert system library comprises a dependency, a confidence and a health index.
  • 15. The system as claimed in claim 14 wherein the condition status is a binary-type value.
  • 16. The system as claimed in claim 14 wherein the plurality of scripts are less complex than the plurality of programs.
  • 17. The system as claimed in claim 14 wherein the plurality of scripts run in a specified order.
  • 18. The system as claimed in claim 14 further comprising a reporting mechanism to report the one or more problems.
  • 19. The system as claimed in claim 14 wherein the plurality of scripts are embedded within an extensible markup language (XML) structure.
  • 20. The system as claimed in claim 14 wherein the computing device is selected from a group consisting of a personal computer, an Apple computer, a thin client, a laptop, a cell phone and a PDA.
  • 21. A method of monitoring a computing device to gather information comprising: a. providing a server device in communication with the computing device, the server device including a memory device containing an expert system library;b. determining a setup of the computing device;c. gathering information related to configuration of the computing device;d. analyzing the computing device;e. sending feedback to the expert system library; andf. expanding the expert system library using a feedback mechanism stored on the computing device;wherein the method of monitoring is performed while running in the background of the computing device, and further wherein the expert system library comprises a plug-in architecture, wherein the plug-in architecture comprises a plurality of entries, wherein each entry comprises a program that is functionally discrete from the program of other entries, wherein the expert system library comprises a dependency, a confidence and a health index.
  • 22. The method as claimed in claim 21 wherein analyzing the computing device further comprises querying the computing device for one or more problems.
  • 23. The method as claimed in claim 21 further comprising initiating one or more remediation scripts if one or more problems are detected.
  • 24. The method as claimed in claim 21 further comprising reporting one or more problems.
  • 25. The method as claimed in claim 21 wherein the computing device is selected from a group consisting of a personal computer, an Apple computer, a thin client, a laptop, a cell phone and a PDA.
  • 26. A method of monitoring a computing device to gather information comprising: a. providing a server device in communication with the computing device, the server device including a memory device containing an expert system library;b. determining a setup of the computing device;c. gathering information related to configuration of the computing device;d. analyzing the computing device;e. reporting analysis on the computing device;f. sending feedback to the expert system library; andg. expanding the expert system library using a feedback mechanism stored on the computing device;wherein the method of monitoring is performed while running in the background of the computing device, and further wherein the expert system library comprises a plug-in architecture, wherein the plug-in architecture comprises a plurality of entries, wherein each entry comprises a program that is functionally discrete from the program of other entries, wherein the expert system library comprises a dependency, a confidence and a health index.
  • 27. The method as claimed in claim 26 wherein analyzing the computing device further comprises querying the computing device for one or more problems.
  • 28. The method as claimed in claim 26 further comprising initiating one or more remediation scripts if one or more problems are detected.
  • 29. The method as claimed in claim 26 wherein the computing device is selected from a group consisting of a personal computer, an Apple computer, a thin client, a laptop, a cell phone and a PDA.
  • 30. A method of continuously monitoring a computing device to gather information comprising: a. providing a server device in communication with the computing device, the server device including a memory device containing an expert system library;b. determining a setup of the computing device;c. gathering information related to configuration of the computing device;d. querying the computing device for one or more problems wherein a broadest issue is queried first and the query is narrowed until a specific component that is causing the one or more problems problem is found;e. reporting analysis on the computing device;f. sending feedback to the expert system library; andg. expanding the expert system library using a feedback mechanism stored on the computing device;wherein the method of monitoring is continuously performed during the operation of the computing device while running in the background of the computing device, and further wherein the expert system library comprises a plug-in architecture, wherein the plug-in architecture comprises a plurality of entries, wherein each entry comprises a program that is functionally discrete from the program of other entries, wherein the expert system library comprises a dependency, a confidence and a health index.
  • 31. The method of claim 30 further comprising assigning the one or more problems a priority level.
  • 32. The method of claim 31 further comprising assigning the one or more problems a health risk value based on a severity of future potential harm to the computing device if the one or more problems are not corrected.
RELATED APPLICATION(S)

This application is a continuation-in-part of U.S. patent application Ser. No. 11/368,214, filed on Mar. 2, 2006 now U.S. Pat. No. 7,512,584 and entitled “COMPUTER HARDWARE AND SOFTWARE DIAGNOSTIC AND REPORT SYSTEM” which is hereby incorporated by reference, and which claims priority under 35 U.S.C. §119(e) of the co-owned U.S. Provisional Patent Application Ser. No. 60/658,970, filed Mar. 4, 2005, and entitled “PRE-INSTALL COMPLIANCE AND CENTRAL PROBLEM DISCOVERY SYSTEM.” The Provisional Patent Application Ser. No. 60/658,970, filed Mar. 4, 2005, and entitled “PRE-INSTALL COMPLIANCE AND CENTRAL PROBLEM DISCOVERY SYSTEM” is also hereby incorporated by reference in its entirety. The following co-owned, co-filed, co-pending U.S. patent application Ser. No. 11/368,212, filed Mar. 2, 2006 and entitled PRE-INSTALL COMPLIANCE SYSTEM is also incorporated by reference.

US Referenced Citations (211)
Number Name Date Kind
4866635 Kahn et al. Sep 1989 A
5602990 Leete Feb 1997 A
5649196 Woodhill et al. Jul 1997 A
5659743 Adams et al. Aug 1997 A
5787409 Seiffert et al. Jul 1998 A
5802364 Senator et al. Sep 1998 A
5812751 Ekrot et al. Sep 1998 A
5835911 Nakagawa et al. Nov 1998 A
5897635 Torres et al. Apr 1999 A
5933647 Aronberg et al. Aug 1999 A
5950010 Hesse et al. Sep 1999 A
5974547 Klimenko Oct 1999 A
6012152 Douik et al. Jan 2000 A
6029196 Lenz Feb 2000 A
6067582 Smith et al. May 2000 A
6144959 Anderson et al. Nov 2000 A
6170065 Kobata et al. Jan 2001 B1
6189101 Dusenbury, Jr. Feb 2001 B1
6209089 Selitrennikoff et al. Mar 2001 B1
6212660 Joeressen et al. Apr 2001 B1
6282711 Halpern et al. Aug 2001 B1
6292827 Raz Sep 2001 B1
6301612 Selitrennikoff et al. Oct 2001 B1
6311221 Raz et al. Oct 2001 B1
6317761 Landsman et al. Nov 2001 B1
6349137 Hunt et al. Feb 2002 B1
6356915 Chtchetkine et al. Mar 2002 B1
6363400 Chtchetkine et al. Mar 2002 B1
6366296 Boreczky et al. Apr 2002 B1
6378035 Parry et al. Apr 2002 B1
6421777 Pierre-Louis et al. Jul 2002 B1
6449658 Lafe et al. Sep 2002 B1
6459499 Tomat Oct 2002 B1
6463530 Sposato Oct 2002 B1
6473794 Guheen et al. Oct 2002 B1
6477531 Sullivan et al. Nov 2002 B1
6490677 Aquilar et al. Dec 2002 B1
6536037 Guheen et al. Mar 2003 B1
6553375 Huang et al. Apr 2003 B1
6556950 Schwenke et al. Apr 2003 B1
6574618 Eylon et al. Jun 2003 B2
6606744 Mikurak Aug 2003 B1
6625651 Swartz et al. Sep 2003 B1
6625754 Aguilar et al. Sep 2003 B1
6636857 Thomas et al. Oct 2003 B2
6654797 Kamper Nov 2003 B1
6654801 Mann et al. Nov 2003 B2
6694375 Beddus et al. Feb 2004 B1
6697852 Ryu Feb 2004 B1
6704886 Gill et al. Mar 2004 B1
6718464 Cromer et al. Apr 2004 B2
6728530 Heinonen et al. Apr 2004 B1
6735625 Ponna May 2004 B1
6751658 Haun et al. Jun 2004 B1
6757729 Devarakonda et al. Jun 2004 B1
6757894 Eylon et al. Jun 2004 B2
6816462 Booth, III et al. Nov 2004 B1
6816882 Conner et al. Nov 2004 B1
6871210 Subramanian Mar 2005 B1
6880108 Gusler et al. Apr 2005 B1
6885481 Dawe Apr 2005 B1
6886020 Zahavi et al. Apr 2005 B1
6915343 Brewer et al. Jul 2005 B1
6954853 Wang et al. Oct 2005 B2
6954930 Drake et al. Oct 2005 B2
6959235 Abdel-Malek et al. Oct 2005 B1
6985967 Hipp Jan 2006 B1
7003560 Mullen et al. Feb 2006 B1
7003663 Lagosanto et al. Feb 2006 B2
7058698 Chatterjee et al. Jun 2006 B2
7080118 Hildebrand Jul 2006 B2
7143307 Witte et al. Nov 2006 B1
7149698 Guheen et al. Dec 2006 B2
7175078 Ban et al. Feb 2007 B2
7178166 Taylor et al. Feb 2007 B1
7194445 Chan et al. Mar 2007 B2
7200779 Coss et al. Apr 2007 B1
7210143 Or et al. Apr 2007 B2
7237122 Kadam et al. Jun 2007 B2
7260597 Hofrichter et al. Aug 2007 B1
7287053 Bodin Oct 2007 B2
7328367 Ukai et al. Feb 2008 B2
7337311 Chen et al. Feb 2008 B2
7392046 Leib et al. Jun 2008 B2
7401125 Uchida et al. Jul 2008 B1
7480822 Arbon et al. Jan 2009 B1
7512584 Keith, Jr. Mar 2009 B2
7571467 Priestley et al. Aug 2009 B1
7627694 Sreenivasan et al. Dec 2009 B2
7698487 Rothman et al. Apr 2010 B2
7788524 Wing et al. Aug 2010 B2
20010034736 Eylon et al. Oct 2001 A1
20010037323 Moulton et al. Nov 2001 A1
20010037399 Eylon et al. Nov 2001 A1
20010037400 Raz et al. Nov 2001 A1
20010044850 Raz et al. Nov 2001 A1
20010049793 Sugimoto Dec 2001 A1
20020007418 Hegde et al. Jan 2002 A1
20020013827 Edstrom et al. Jan 2002 A1
20020035674 Vetrivelkumaran et al. Mar 2002 A1
20020042833 Hendler et al. Apr 2002 A1
20020049764 Boothby et al. Apr 2002 A1
20020083183 Pujare et al. Jun 2002 A1
20020087625 Toll et al. Jul 2002 A1
20020087717 Artzi et al. Jul 2002 A1
20020087883 Wohlgemuth et al. Jul 2002 A1
20020087963 Eylon et al. Jul 2002 A1
20020091763 Shah et al. Jul 2002 A1
20020094868 Tuck et al. Jul 2002 A1
20020104080 Woodard et al. Aug 2002 A1
20020107920 Hotti Aug 2002 A1
20020116585 Scherr Aug 2002 A1
20020124092 Urien Sep 2002 A1
20020129089 Hegde et al. Sep 2002 A1
20020138640 Raz et al. Sep 2002 A1
20020157089 Patel et al. Oct 2002 A1
20020161868 Paul et al. Oct 2002 A1
20020161908 Benitez et al. Oct 2002 A1
20020169797 Hegde et al. Nov 2002 A1
20020188941 Cicciarelli et al. Dec 2002 A1
20030004882 Holler et al. Jan 2003 A1
20030005096 Paul et al. Jan 2003 A1
20030009538 Shah et al. Jan 2003 A1
20030033379 Civanlar et al. Feb 2003 A1
20030036882 Harper et al. Feb 2003 A1
20030037328 Cicciarelli et al. Feb 2003 A1
20030041136 Cheline et al. Feb 2003 A1
20030046371 Falkner Mar 2003 A1
20030051128 Rodriguez et al. Mar 2003 A1
20030055878 Fletcher et al. Mar 2003 A1
20030078960 Murren et al. Apr 2003 A1
20030110188 Howard et al. Jun 2003 A1
20030126242 Chang Jul 2003 A1
20030140160 Raz et al. Jul 2003 A1
20030191730 Adkins et al. Oct 2003 A1
20030204562 Hwang Oct 2003 A1
20030233383 Koskimies Dec 2003 A1
20030233493 Boldon et al. Dec 2003 A1
20040010716 Childress et al. Jan 2004 A1
20040068554 Bales et al. Apr 2004 A1
20040073787 Ban et al. Apr 2004 A1
20040093492 Daude et al. May 2004 A1
20040104927 Husain et al. Jun 2004 A1
20040107273 Biran et al. Jun 2004 A1
20040123153 Wright et al. Jun 2004 A1
20040128346 Melamed et al. Jul 2004 A1
20040148306 Moulton et al. Jul 2004 A1
20040180721 Rowe Sep 2004 A1
20040193876 Donley et al. Sep 2004 A1
20040201604 Kraenzel et al. Oct 2004 A1
20040236843 Wing et al. Nov 2004 A1
20040243928 Hesmer et al. Dec 2004 A1
20050027846 Wolfe et al. Feb 2005 A1
20050033808 Cheng et al. Feb 2005 A1
20050044197 Lai Feb 2005 A1
20050044544 Slivka et al. Feb 2005 A1
20050108297 Rollin et al. May 2005 A1
20050108546 Lehew et al. May 2005 A1
20050108593 Purushothaman et al. May 2005 A1
20050144218 Heintz Jun 2005 A1
20050149729 Zimmer et al. Jul 2005 A1
20050160289 Shay Jul 2005 A1
20050193245 Hayden et al. Sep 2005 A1
20050198196 Bohn et al. Sep 2005 A1
20050216524 Gomes et al. Sep 2005 A1
20050216902 Schaefer Sep 2005 A1
20050226059 Kavuri et al. Oct 2005 A1
20050256952 Mouhanna et al. Nov 2005 A1
20050262503 Kane Nov 2005 A1
20050268145 Hufferd et al. Dec 2005 A1
20050273486 Keith, Jr. Dec 2005 A1
20050283606 Williams Dec 2005 A1
20050286435 Ogawa et al. Dec 2005 A1
20060021040 Boulanger et al. Jan 2006 A1
20060031377 Ng et al. Feb 2006 A1
20060031407 Dispensa et al. Feb 2006 A1
20060031529 Keith, Jr. Feb 2006 A1
20060041641 Breiter et al. Feb 2006 A1
20060041759 Kaliski, Jr. et al. Feb 2006 A1
20060047716 Keith, Jr. Mar 2006 A1
20060047946 Keith, Jr. Mar 2006 A1
20060074943 Nakano et al. Apr 2006 A1
20060095705 Wichelman et al. May 2006 A1
20060129459 Mendelsohn Jun 2006 A1
20060143709 Brooks et al. Jun 2006 A1
20060179061 D'Souza et al. Aug 2006 A1
20060224544 Keith, Jr. Oct 2006 A1
20060224545 Keith, Jr. Oct 2006 A1
20060233310 Adams, Jr. et al. Oct 2006 A1
20070078982 Aidun et al. Apr 2007 A1
20070094269 Mikesell et al. Apr 2007 A1
20070143374 D'Souza et al. Jun 2007 A1
20070174658 Takamoto et al. Jul 2007 A1
20070174690 Kambara et al. Jul 2007 A1
20070185936 Derk et al. Aug 2007 A1
20070239905 Banerjee et al. Oct 2007 A1
20070271290 Keith, Jr. Nov 2007 A1
20070271428 Alturi Nov 2007 A1
20070274315 Keith Nov 2007 A1
20070276836 Chatterjee et al. Nov 2007 A1
20080034019 Cisler et al. Feb 2008 A1
20080034071 Wilkinson et al. Feb 2008 A1
20080077622 Keith Mar 2008 A1
20080077630 Keith Mar 2008 A1
20080127294 Keith May 2008 A1
20080209142 Obernuefemann Aug 2008 A1
20080216168 Larson et al. Sep 2008 A1
20080294860 Stakutis et al. Nov 2008 A1
20080313632 Kumar et al. Dec 2008 A1
20090094362 Huff Apr 2009 A1
20100050011 Takamoto et al. Feb 2010 A1
Related Publications (1)
Number Date Country
20070233633 A1 Oct 2007 US
Provisional Applications (1)
Number Date Country
60658970 Mar 2005 US
Continuation in Parts (1)
Number Date Country
Parent 11368214 Mar 2006 US
Child 11440563 US