The inability to quantify, demonstrate, and monitor information technology (IT) business value, or assess in a timely, reliable, and efficient manner exposure of an enterprise's business processes to risk and loss, consistently ranks among the top complaints expressed by corporate officers and business enterprise managers. To improve the efficiency of business process execution in support of corporate goals and objectives, business executives partner with IT specialists to develop custom applications, or customize commercially-available, off-the-shelf, packaged applications. However, in spite of these attempts, questions linger over whether these applications deliver the expected process benefits, whether they work as expected, or whether they create unexpected process risks.
Current techniques for measuring and monitoring factors that impact business value and risk exposure generally fall into three categories: (1) Conducting manual surveys, audits, and polls about whether the application or process in question is delivering the expected value and is sufficiently immune to risk; (2) Enhancing and changing the enterprise software application to be monitored to produce log files that contain evidence of whether the application or process in question is delivering the expected value or has been exposed to risk through negligence or abuse; and (3) Applying business intelligence or rules-based technologies to existing log files to discover whether the application or process in question is delivering the expected value or being compromised by exposure to risk.
The current techniques to measure and monitor business value and risk exposure are manual, imprecise, or homegrown ad-hoc measurement techniques that can be expensive, time consuming, unreliable, and inefficient, involving nontrivial overhead, and often resulting in significant costs and losses for the business enterprise.
There is therefore a need to provide systems and methods for modeling, preferably automatically, usage scenarios of one or more enterprise software applications that at least partially support, implement, or automate business process goals. It is also desirable to provide systems and methods for subsequently monitoring the enterprise applications for occurrence of these defined scenarios, and enable relevant users at the enterprise with a precise, dynamic assessment of expected-versus-actual value derived from the software applications or business processes. It is further desirable to provide systems and methods that enable the users to accurately and dynamically assess the enterprise's exposure to risk and potential or real losses related thereto.
In various embodiments, the systems and methods described herein dynamically measure effectiveness and robustness of enterprise software applications by determining, for example, the time, duration, frequency, location, environment, and context, where an application is executed, either alone or in combination with one or more other applications, and/or determining if the software applications are being used in expected or unexpected ways, and/or if the use is approved or unauthorized (and hence likely to be malicious). Reports generated by the systems and methods described herein enable business users to assess their enterprise's exposure to risk, and therefore real or potential loss.
In one aspect, the invention is directed to providing a method of instrumenting one or more software applications. The method includes: tracing events associated with an operation (usage scenario) of the software applications; determining a signature profile representative of a subset of the traced events which are correlated with the usage scenario; and inserting tags corresponding to the signature profile into the software applications for monitoring an additional operation of the software applications.
According to one practice, the method includes monitoring a second operation of the software applications at least in part by detecting a subset of the inserted tags in the second operation. In one embodiment, the monitoring includes detecting the subset of the inserted tags according to a detection sequence. In another embodiment, the monitoring includes detecting the subset of the inserted tags according to a schedule. In yet another embodiment, the monitoring includes collecting information about the second operation at one or more detected tags belonging to the detected subset of the inserted tags. The collected information may include event data associated with the second operation. In one embodiment the collected data is stored for subsequent processing.
According to one practice, the method includes matching with the signature profile one or more detected tags belonging to the detected subset of the inserted tags. In one embodiment, the method includes declaring a match between the first and second operations of the software applications if a match is determined between the detected tags and the signature profile. In another embodiment, the method includes generating a report about the match, including, for example, the second usage scenario. In a typical embodiment, the generated report includes a risk assessment associated with the second usage scenario or with the software applications in general. The report, in various other embodiments, may include a performance or value metric associated with the software applications.
According to one practice, tagging the software applications includes injecting code blocks into the software applications, wherein the injected code blocks correspond to one or more software application instructions executed as part of the usage scenario. Code injection may include coupling to a software interface of the software applications. The software interface typically includes a runtime environment interface of one or more software languages used to produce the software applications. Coupling to the software interface may include detecting a software runtime event. The software runtime event typically includes, among other events, one or more of a method call, a method return, a line number of executing software, an object creation, a memory allocation or reallocation, a COM interface call, a COM interface return, a Java Bean event, a J2EE Bean event, a library load, a library unload, a file system event, a TCP/IP stack level transmit event, a TCP/IP stack level receipt event, an SQL event, a transactional bus event, an MQ series event, an MSMQ series event, a web service event, and a notification framework event.
According to one practice, at least one of the first usage scenario and the additional usage scenario includes a plurality of temporally-distributed executions of one or more of the software applications. A usage scenario may include repetitions of one or more business processes according to one or more sets of parameters. For example, a bank teller may repeat customer account access multiple times. This multiple invocation of access privileges may be directed at one customer or multiple customers.
According to one aspect, the invention is directed to providing a software tool for instrumenting one or more software applications. The software tool is stored in a computer-readable medium and executes at least in part on an application server. Typically, the software tool includes: a tracer that traces events associated with an operation of the software applications; a signature profiler that produces a signature profile by selecting a subset of the traced events which are correlated with the usage scenario; and a code injector that inserts tags corresponding to the signature profile into the software applications for monitoring an additional usage scenario of the software application.
According to one practice, the software instrumentation tool includes a detector that detects a subset of the inserted tags in a second operation of the software applications. According to another practice, the software tool includes a matcher that matches the detected tags with the signature profile.
In one embodiment, the software tool includes a graphical user interface that provides a menu of options to enable a user to control a behavior of the software tool. In a typical embodiment, the software tool includes a repository that stores one or more of signature profile data, event data, and match data associated with the first and second usage scenarios. In yet another embodiment, the software tool includes a scheduler that schedules a time frame for monitoring the second or any additional operation of the software applications.
Further features and advantages of the invention will be apparent from the following description of illustrative embodiments and from the claims.
The following figures depict certain illustrative embodiments of the invention. These depicted embodiments are to be understood as illustrative of the invention and not as limiting in any way.
To provide an overall understanding of the invention, certain illustrative practices and embodiments will now be described, including a method for instrumenting one or more software applications and a system for doing the same. The systems and methods described herein can be adapted, modified, and applied to other contexts; such other additions, modifications, and uses will not depart from the scope hereof.
In one aspect, the systems and methods described herein are designed based on the premise that the value of an enterprise software application is realized, and its exposure to risk is reduced or eliminated, if it is used according to properly-selected, intended scenarios. These scenarios are interchangeably referred to herein as use cases, usage scenarios, or operations.
According to one practice, the invention is directed to software instrumentation systems and methods for modeling and monitoring usage scenarios of enterprise software applications that at least partially support, implement, or automate business process goals. In a particular embodiment, the systems and methods described herein employ a software engine that monitors execution of enterprise software applications for occurrence of one or more defined usage scenarios in the execution of those applications, thereby providing users with a precise, dynamic assessment of expected-versus-actual value from the applications and/or business processes. Business processes can span multiple enterprise software applications, and multiple processes can be monitored simultaneously by the systems and methods described herein.
In contrast to other technologies which are typically expensive and yield subjective, qualitative estimates of risk, the systems and methods described herein, in one embodiment, monitor enterprise business processes to provide objective and quantitative risk and loss event information having specified or desired granularity; this enables the users to accurately and dynamically assess the enterprise's exposure to risk and associated potential or real losses. By providing to the users assessments of value and/or risk, the systems and methods of the invention enable the users to redefine business processes, reengineer corresponding enterprise software applications, and adjust usage scenarios to mitigate and control risk or to improve value derived from the business processes of the enterprise.
Internal fraud, and susceptibility to it, is a form of risk exposure that poses significant, challenging, and dynamically-changing problems for a variety of business enterprises. Financial losses due to fraud are particularly palpable in the banking industry. The U.S. Department of Justice, in a 2003 FBI report titled “Financial Institution Fraud and Failure Report,” identifies a commercial banker who embezzled about $2,100,000 over a 2.5-year period. She did so at least in part by opening bank accounts under fictitious names and then transferring funds from her bank's internal expense accounts to the fictitious accounts. She raided the internal expense accounts in small increments—presumably to avoid detection—but averaged about 60-100 debits per month. According to the report, on the first of every subsequent month, the banker wrote a large check from one or more of the fictitious accounts which she subsequently deposited into her personal account. The fraud scenario highlighted above involves unusual banking activity; for example, the banker completed an average of about 60-100 transactions per month.
In one embodiment, the software instrumentation systems and methods described herein monitor the bank's business processes for—and thereby deter, control, or at least mitigate real or potential losses due to—such a rogue activity. In one aspect, the systems and methods of the invention identify and detect key indicators of risk as part of the monitoring of the business processes. To better understand how the software instrumentation systems and methods disclosed herein can be employed for risk detection, assessment, mitigation, and control, a high-level description of a business enterprise risk and control lifecycle will now be presented.
The lifecycle 100 begins, in step 102, by identifying one or more areas of risk in an enterprise, and potential losses resulting from those risk areas. Typically, this task is performed by corporate executives, IT staff, or other users familiar with the business objectives and needs of the enterprise and business processes that underlie or guide the design of enterprise software applications. Once the areas of risk have been identified, the systems and methods of the invention monitor the enterprise software applications to detect and assess, in step 104, real or potential losses associated with those risks. Additionally, the systems and methods of the invention provide for an independent verification of subjective self-assessments produced by other technologies, thereby increasing the likelihood of devising and deploying, in step 106, more appropriate risk mitigation and control procedures and infrastructure for the enterprise.
In step 108 of the lifecycle 100, the software instrumentation systems and described herein monitor the risk mitigation and control procedures and infrastructure devised in step 106 to assess their effectiveness. Typically, risk control procedures and infrastructures are tested frequently: an expensive and time-consuming overhead activity. The systems and methods described herein, however, reduce or eliminate such overheads by, in one embodiment, dynamically, even continuously, monitoring the risk mitigation and controls for rogue processes that may circumvent the controls and create new or elevated risks.
Proceeding through the risk and control lifecycle 100, step 110 includes institutionalizing or otherwise adopting loss prevention or reduction measures. The software instrumentation systems and methods described herein help prevent, or substantially reduce, risk-based losses by detecting risk indicators associated with risk hypotheses propounded by enterprise business process developers or software application designers.
Many risks cannot be fully controlled, or their corresponding losses prevented, by prior art technologies, especially as enterprises adapt their business processes in response to dynamically-changing business conditions, climates, and landscapes. However, in a typical embodiment, the software instrumentation systems and methods described herein can be rapidly deployed—with little or no change to the enterprise applications—to test risk hypotheses and monitor associated quantitative indicators of risk, thereby preventing, or preemptively reducing, loss before it occurs.
Given the magnitude of fraud in the banking industry, and to further illustrate various risk mitigation, control monitoring, and loss prevention aspects and features of the software instrumentation systems and methods described herein, examples will now be provided for detecting and preventing fraud at a retail bank. It will become apparent how the systems and methods of the invention can monitor the business processes of a financial institution—such as the bank that fell victim to the rogue activities of the banker, in the case of fraud reported by the FBI and referred to above—to avoid, substantially diminish the likelihood of, eliminate, or otherwise mitigate losses related to fraud risk.
In an exemplary application, a global retail bank faced losses from fraud committed by tellers in some branch offices. Bank security officials developed fraud hypotheses that included the following: (a) more than normal customer access by recently-hired tellers is strongly correlated with identity theft; and (b) activation of a dormant account followed by a payment from that account is an indicator of fraud. The bank's security officials determined that monitoring these teller activities allows them to collect specific risk event data and quantify real and potential losses, thereby preventing or preemptively reducing fraud before it occurs.
The software instrumentation systems and methods described herein can be quickly deployed to monitor the teller activities specified in the fraud hypotheses above. Monitoring is quick, easy, and specific. And the systems and methods of the invention allow for collection of branch-specific risk event data and teller activity.
Exemplary steps that an embodiment of the software instrumentation systems and methods of the invention perform as part of monitoring enterprise software applications will now be described. Although the description is in the context of potential fraud at a retail bank, other applications do not depart from the scope hereof.
Each of the process steps 202, 204, and 206 is associated with a corresponding set of software events (e.g., application code instructions) in a teller-customer Account Management System 210, which includes a suite of one or more enterprise software applications. According to one practice, as each step of the customer service process is demonstrated (executed)—typically in a development environment—the software instrumentation systems and methods described herein trace the software events associated with the step. As shown in
For example, in the embodiment depicted by
According to
According to one embodiment, once a signature profile has been created, the systems and methods described herein insert, in one or more enterprise applications, tags (using software code injection, for example) corresponding to events associated with the signature profile. The systems and methods then monitor an additional usage scenario (operation) of the business processes (as represented by the one or more enterprise applications) and listen for one or more of the inserted tags. For example, when one of the process steps—for example, the View Statement process 204—is performed, the software instrumentation systems and methods described herein listen for software application instructions in the active signature profiles (i.e., in this case, the profiles for Validate Customer, View Statement, and Print Statement) and detect inserted tags corresponding to the process 204.
Optionally, the sequence of detected tags is matched against the active signature profiles and a determination is made that the additional operation is a View Statement operation. In one embodiment, the systems and methods described herein collect data at certain instructions (e.g., teller identity, customer balance, etc.). According to one practice, the collected data is reported to the user. In one embodiment, if a match is declared between the additional operation and one of the active signature profiles, information is reported to the user about the additional operation (e.g., identity of the customer whose account was viewed in the second operation).
The additional operation may include multiple executions of one or more of the process steps 202, 204, and 206, and these multiple executions may be distributed in time, occurring, for example, sequentially in time. If the teller performs a View Statement step multiple times (for one or more customers), then, in one embodiment, the systems and methods described herein detect tags associated with each execution of the View Statement operation and collect data associated with each execution of the View Statement process, including, the number of execution times, identities of the customers whose accounts were viewed, etc. This mode of monitoring is one way of detecting rogue behavior by tellers or others in a financial institution. Using the systems and methods described herein, the about 60-100 monthly fraudulent debit transactions that the commercial banker of the FBI report was performing can be discovered.
Then, an optional scheduler 320 determines appropriate time frames for deploying the signature profiles 311a-311c to a detector 330 which monitors one or more enterprise software applications 340 tagged based on the signature profiles 311a-311c. The scheduler is controlled, in one embodiment, by a user who specifies the scheduled times or time windows. In some embodiments, the monitoring is to be continuously performed in time, in which case the scheduler 320 would not be employed.
In the embodiment shown in
As pointed out by the bracketed region 410 of the report 400, John's customer access behavior shown in 406b-406d are unusually high compared with the behaviors of Anna, Jim, and Mary. This may suggest fraudulent behavior by John. This is an exemplary illustration of how the report 400 generated by the systems and methods described herein assists business executives, IT staff, or other users to detect rogue or suspect behavior.
In step 504, the systems and methods described herein listen to the demonstrated usage scenario and compile a trace of various events that occur during the demonstration of the usage scenario. These traced events typically include one or more software runtime events, such as, without limitation, a method call, a method return, a line number of executing software, an object creation, a memory allocation or reallocation, a COM interface call, a COM interface return, a Java Bean event, a J2EE Bean event, a library load, a library unload, a file system event, a TCP/IP stack level transmit event, a TCP/IP stack level receipt event, an SQL event, a transactional bus event, an MQ series event, an MSMQ series event, a web service event, and a notification framework event.
In step 506, the systems and methods described herein filter the traced events to determine a signature profile. The signature profile is a subset of the traced events that are correlated with the demonstrated usage scenario. Typically, though not necessarily, the traced events are incorporated in the signature profile according to a specific sequence/order; that is, if the traced events A, B, C are incorporated in the signature profile, they acquire a particular order in the signature profile, such that signature A, B, C would be distinct from signature A, C, B, etc.
Although typically the signature profile includes a strict subset (i.e., a fraction) of the traced events, in some embodiments all the traced events are included in the signature profile to properly indicate or represent the demonstrated usage scenario.
Once the signature profile has been determined in step 506, the the systems and methods described herein, in step 508, tag the enterprise software application(s) according to the signature profile. These tags correspond to the traced events belonging to the signature profile, that is, the events deemed correlated with, or representative or indicative of, the demonstrated usage scenario.
A purpose of inserting the software tags is to enable subsequent monitoring of a second operation (i.e., a second usage scenario) of the enterprise application. According to one practice, inserting the tags includes injecting code blocks into the enterprise software application, wherein the injected code blocks correspond to one or more software application instructions executed as part of the demonstrated usage scenario (demonstrated, first operation) of the enterprise software application(s). In a typical embodiment, injecting the code blocks includes coupling to a software interface of the enterprise application. The software interface may include a runtime environment interface of one or more software languages underlying the construction of the enterprise application.
The systems and methods described herein employ, in various embodiments, published, secure, open application instrumentation interfaces at the application's language runtime layer. At least in part because of this approach, the software instrumentation systems and methods described herein do not have to depend on application-specific interfaces (e.g., a published API for the teller system), and can be used to instrument a broad range of enterprise applications rather than integrate with specific applications.
In some contexts, users do not wish for the software instrumentation systems and methods described herein to directly address events in mainframe code. Their wish stems at least in part from concerns about instrumenting the systems of record. Accordingly, in various embodiments, the systems and methods of the invention use interfaces and wrappers around mainframe applications to assess and monitor mainframe-based processes. In this way, conflict is avoided with security, integrity, and performance issues while still providing quality, speed, depth, and granularity of information about process execution.
In one embodiment, the systems and methods of the invention detect, in step 554, one or more of the tags previously inserted in the enterprise application as part of step 508 of the development phase depicted by
The production steps 550 include, in one embodiment, a step 560 for collecting information about the additional usage scenario. The collected information may be compiled according to a sequence in which the tags are detected in step 554 and may include information about the additional scenario at locations associated with the detected tags. Optionally, the information collected in step 560 is stored, in step 562, in a database or other computer-readable storage medium for subsequent referral. In one embodiment, the systems and methods described herein generate, in step 564, a report based on the collected information. The report can then be used by one or more users to evaluate risk, measure effectiveness of the enterprise software applications, revise the business processes underlying the enterprise applications, revise risk or value hypotheses, etc.
Although
A signature profiler/editor 630 determines a signature profile representative of the usage scenario from the trace produced by the tracer 620. A scheduler 650 sets at least one time or time window (time frame) for a detector 660 to monitor an additional usage scenario/operation of the enterprise software application 601. The times or time windows set by the scheduler 650 may be determined by a user operating the system 600 using a project workspace (that can include a GUI) 640. In a typical embodiment, the detector 660 monitors instructions in the additional operation of the software applications 601 corresponding to an active signature profile (i.e., a signature profile against which the additional usage scenario is to be compared, during the time frame specified by the scheduler 650). Like the tracer, the detector 660 may interface with a custom or commercially-available packaged enterprise application 601.
A matcher 680 compares the tags detected by the detector 660 with a library of one or more active signature profiles. If a match is detected, the matcher 680 optionally generates a report 690 containing information about the additional usage scenario. In one embodiment, the report contains information about the enterprise applications 601 at one or more locations associated with the detected tags. In a typical embodiment, a sequence in which the tags are detected is significant, and is used in the matching process; that is, if two detected sequences contain the same events but in different orders, the two sequences are considered different.
A database 670, which is in communication with the OAL 610 to exchange information, serves as a repository of project information, including trace, signature, scheduling, match, and reporting data, among others things. In one embodiment, the project workspace 640 (that may include a GUI or another user interface), serves as a command and control center for the user, or team of users, to manage various aspects of the system architecture 600 and the functioning thereof. In one embodiment, the project workspace is used as a primary user interface used by a project team to define projects, describe/define business processes represented by enterprise software applications, demonstrate usage scenarios, and manage signatures, reports, and alerts, among other things.
Also shown in
To further illustrate various features and embodiments of the software instrumentation systems and methods described herein, another example will now be described, related to another area of risk to a financial institution. One form of fraud in the banking industry is escheat fraud, wherein bank employees identify dormant accounts, process unauthorized address changes, and make fraudulent fund transfers. In various embodiments, the systems and methods described herein enable banking authorities to identify unauthorized account activities, the fraudsters involved, the monetary amounts of the fraudulent transactions, and the accounts affected, among other things.
In the embodiment depicted in
The Change Address step 804 involves the software process 814 of accessing the dormant account to alter one or more features of the account, for example, an address associated with the account. An enterprise software application associated with the activities of step 804 is the bank's account management system 822.
According to the embodiment depicted by
Exemplary screenshot 900 of
Exemplary screenshot 915 of
Exemplary screenshot 930 of
Turning to
Turning now to
In particular,
The systems and methods described herein produce reports according to the granularity of detail specified by the users. Business executives and other users can use the exemplary reports of
The embodiments described so far have focused on risk management utility of the software instrumentation systems and methods of the invention.
Prompted by a need to adapt to, or even lead, a dynamically-changing business climate, a management team of the business enterprise from time to time adjusts its strategic goals and objectives 1102. To meet the goals and objectives 1102 in the changing business environment, corporate executives design, reengineer, or otherwise drive, as shown by block 1103, business processes 1104 which are deemed conducive to meeting the enterprise's goals and objectives 1102.
As described above, business processes 1104 are supported, modeled, or otherwise represented at least in part by one or more enterprise software applications 1106, which execute to implement one or more aspects of the processes 1104. The enterprise executives typically depend on an efficient execution of the software applications 1106, limited exposure of the software applications to risk or loss, and robustness of the business processes 1104 against risk or loss, in achieving their business goals 1102. To increase process efficiency, enterprise management executives typically employ a chief information officer (CIO) and an information technology (IT) team to develop enterprise software applications 1106 to implement the business processes 1104. In various embodiments, the software applications 1106 include custom applications (e.g., an Insurance claims Processing System) or customizations of commercially-available packaged applications (e.g., Siebel Customer Relationship Management (CRM)) that automate the business processes 1104 and support process execution.
The business enterprise also expects value 1107 from the business processes 1104 implemented at least partially by the enterprise software applications 1106. Accordingly, the enterprise assesses value 1107 from the software applications 1106 and their underlying business processes 1104—aided in part by measuring 1108 the corporate performance 1109—and revising the goals and objectives 1102 as appropriate.
An example of value assessment and process effectiveness monitoring is illustrated by the sample reports generated by the systems and methods described herein, which were installed for a healthcare network. The healthcare network includes several stand-alone hospitals working in concert.
According to one embodiment, the Patient Visit Process includes the following steps: check in a patient; view the patient's medical chart; medically examine the patient; update the patient's chart; optionally, prescribe a drug treatment regimen to the patient; and check the patient out. In addition to improving overall staff productivity, following the steps of the Patient Visit Process—which employ the Patient Care System and the Electronic Patient Record that it generates—is expected to improve overall quality of patient care. An additional, or alternative, expectation is that on average, across the entire patient population, this process will be completed in about 25 minutes for each patient.
In one aspect, the expected value from the Patient Visit Process, and the Patient Care System that implements the Patient Visit Process, includes a drop in total Patient Cycle Time. According to one exemplary embodiment, the drop is from an average of about 55 minutes to about 25 minutes—a significant productivity increase. Additionally, or alternatively, the Patient Care System is expected to enable a significant portion of all patients (e.g., about 30%, according to one embodiment) to self-register: a reduction in patient registration by staff of close to one-third. In yet another aspect, an Electronic Patient Record produced by the Patient Care System is expected to reduce, or in some instances eliminate, incidences of adverse interactions of prescription drugs—a significant improvement in the quality of patient care.
Turning to
As
In addition to monitoring the entire Patient Visit Process, the healthcare network also expects that the new Patient Self-Registration features of the Patient Care System are used and adopted as expected, so as to realize desired cost-reduction goals.
Turning to
Employing the systems and methods of the invention for instrumenting software applications enables the healthcare network to, among other things, evaluate a business process and a software application used to implement the business process. Additionally, the systems and methods described herein enable the healthcare network to use the collected data to manage and adjust its strategic goals—in this case including a combination of redesigning the Patient Visit Process; redesigning the Patient Care system (software application); retraining the staff; and providing the staff and the patients with incentives to encourage adoption of the redesigned Patient Care System.
When the enterprise software application executes according to a specified usage scenario (i.e., when a usage scenario of the enterprise software application is demonstrated), it produces various software application events. The monitoring engine listens for the application events and maintains a trace of the produced events. Examples of application events have been referred to above. For a particular usage scenario, the nature of software applications is that they execute the same sequence of application events every time that usage scenario is repeated; accordingly, if those events are properly tagged, the software applications can employ the tags to emit information representative of the execution of the tagged software events. This is an important observation, at least in part because a particular usage scenario is deemed to have been executed when a particular sequence of application events is recognized by the systems and methods described herein.
However, a usage scenario can produce a large number—perhaps even hundreds of thousands—of application events, which can make the event sequence running in the enterprise software application difficult and expensive to subsequently recognize or parse through. Accordingly, in one embodiment, a raw event sequence (or trace), produced in step 1301 from the demonstration of the usage scenario, is parsed to identify an important subset of application event sequences whose detection is strongly correlated with the demonstrated usage scenario. The events of the parsed trace identified as being correlated with the usage scenario form what has been referred to herein as a signature, a signature profile, or—depending on context—an active signature profile. As shown in previous figures, for example,
In the process of creating a signature profile, the user may create some ambiguity. In other words, a signature profile created from a trace may match more than one usage scenario in the enterprise software application. This ambiguity can be exploited to effect, if the user chooses to demonstrate an exemplary usage scenario, develop a signature from the resulting trace, and then use the signature to recognize not just the exemplary, but many, if not all, similar usage scenarios. In many embodiments, however, the signature profile uniquely represents the demonstrated usage scenario.
The collected application traces can be ambiguous if more than one usage scenario is demonstrated at a time. Typically, therefore, the systems and methods described herein produce signatures in a controlled, development environment, as mentioned above.
The signatures created from usage scenarios in the development environment can be employed in a production environment. At least in part because of the synergy between the existing application environments and the software instrumentation systems and methods described herein, typically no substantial changes to the application development and deployment environment in which the disclosed software platform works are required.
As shown in
Referring to the embodiment of
Guided instrumentation, in step 1303 of
As seen in step 1304 of
The remaining figures illustrate various embodiments illustrative of how the systems and methods described herein can be configured to interact or integrate with various features of enterprise software applications.
In particular, according to a typical embodiment, the modeling environment 1410 includes a functional layer 1412 wherein benefits, risks, and usage scenarios (i.e., operations) of the enterprise applications 1401 are described or defined—with due consideration of the goals and objectives of the enterprise. In functional layer 1414, the systems and methods described herein demonstrate the usage scenarios defined in the development layer 1412; trace events associated with the demonstrated scenarios; and from the traced events produce signature profiles associated with demonstrated scenarios. Layer 1416 depicts tagging of (instrumenting) the enterprise applications 1410 according to the signatures produced in the layer 1414.
The measurement (production) environment 1420 illustrates an instrumentation layer 1422 wherein the enterprise applications 1410 execute according to a usage scenario (operation) which is to be subsequently identified with (i.e., matched to) a subset of a library of usage scenarios defined or described in the modeling environment 1410. In the layer 1422, a subset of the tags that were inserted in the modeling (development) environment's instrumentation layer 1416 are detected in the yet unidentified scenario (operation). At the functional layer 1424, the detected tags are matched to known usage scenarios defined in the modeling environment. In a typical embodiment, the systems and methods described herein also include a functional layer 1422 that produces a report indicative of how closely the goals and objectives of the enterprise have been met by the enterprise applications 1410 or what level of risk exposure the enterprise faces. The reports can also flag enterprise executives and authorized users of any suspicious process activity, for example, by showing bank officials that a particular teller has accessed customer accounts in an unusual manner.
In one exemplary embodiment, the development portion 1605 of the lifecycle 1600 includes a layer 1611 denoting software development lifecycle tools such as, without limitation, IBM Rational software (IBM Corp., White Plains, N.Y.), CaliberRM (Borland Software Corp., Scotts Valley, Calif.), Compuware Application Development Software (Compuware Corp., Detroit, Mich.), Mercury Application Development Environment (Mercury Computer Systems, Inc. (Chelmsford, Mass.), and others. In this embodiment, the lifecycle 1600 includes a layer 1612 denoting professional services automation tools such as, without limitation, Kintana (Mercury Computer Systems, Inc.), Changepoint (Compuware Corp.), PlanView Portfolio Management Software (PlanView United States, Austin, Tex.), Microsoft Business Solutions (Microsoft Corp., Redmond, Wash.), and others.
The deployment portion 1606 of the lifecycle 1600, according to this embodiment, includes a layer 1613 of business intelligence tools such as, without limitation, SAS Business Intelligence Client Tools (SAS Institute GmbH, Heidelberg, Germany), MicroStrategy Business Intelligence Software Solutions (MicroStrategy, Inc., McLean, Va.), Cognos (Cognos Business Intelligence and Performance Management Software Solutions (Cognos, Ottawa, ON, Canada), Informatica (Informatica Corp., Redwood City, Calif.), and others.
Another layer of the deployment portion 1606 of this embodiment of the lifecycle 1600 is the systems management tools layer 1614, which includes, for example and without limitation, BMC (BMC Software, Houston, Tex.), IBM-Tivoli (IBM Corp., White Plains, N.Y.), HP-OpenView (HP, Palo Alto, Calif.), CA (Computer Associates, Islandia, N.Y.), and others. Another layer of the deployment portion 1606 of this embodiment of the lifecycle 1600 is the business value measurement (and risk assessment) layer 1615 where the software instrumentation systems and methods described herein are deployed. Yet another layer of this embodiment includes an embedded analytics tolls layer 1616.
Exemplary platforms that the systems and methods described herein support include, but are not limited to, the following: Windows XP for the project workspace and the OAL; Oracle or SQL Server for the Repository (Database) management; applications written in Java, C++, using environments such as J2EE, COM, NET, and on platforms such as Windows XP/2000, AIX, HP-UX, Linux, and Solaris for the tracer, signature profiler, detector, scheduler, and matcher.
The contents of all references—including, but not limited to, patents and patent applications—cited throughout this specification, are hereby incorporated by reference in entirety.
Many equivalents to the specific embodiments of the invention and the specific methods and practices associated with the systems and methods described herein exist. Accordingly, the invention is not to be limited to the embodiments, methods, and practices described herein, but is to be understood from the following claims, which are to be interpreted as broadly as allowed under the law.
This application incorporates by reference in entirety, and claims priority to and benefit of, U.S. provisional patent application 60/544,790, filed on 13 Feb. 2004.
Number | Date | Country | |
---|---|---|---|
60544790 | Feb 2004 | US |