WO1998047057A2 - Registry management system - Google Patents
Registry management system Download PDFInfo
- Publication number
- WO1998047057A2 WO1998047057A2 PCT/US1998/007495 US9807495W WO9847057A2 WO 1998047057 A2 WO1998047057 A2 WO 1998047057A2 US 9807495 W US9807495 W US 9807495W WO 9847057 A2 WO9847057 A2 WO 9847057A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- configuration
- list
- settings
- computers
- lists
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/142—Reconfiguring to eliminate the error
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Definitions
- This invention generally relates to management systems for controlling configuration settings to each computer throughout a network, and more particularly, to a management system for conforming the configuration files in a network of computers using the "WINDOWS 95" or "WINDOWS NT" operating systems.
- Diagnosing an application in which the configuration settings are faulty can require many hours of a highly-skilled person's time to identify the root cause of the problem from many possible causes. Often, the administrator must physically access the individual personal computers to examine and/or change faulty configuration settings. This can be a logistical problem when the computers in question are distributed over many geographical locations.
- U.S. Patent No. 5,414,812 issued to Filip et al., discloses an object-oriented ⁇ hierarchical model of a computer network layered communications subsystem implemented in a configuration database subsystem to create and maintain a configuration database and to provide configuration data to the layered communications subsystem.
- the layered communication subsystem is represented by a set of defined object classes. Each object class corresponds to one or more functions defined at each of the communications subsystem layers. Each of the object classes is related in a hierarchical relationship which preserves the functional relationship among the various functions in the various layers making up the layered communications subsystem.
- the configuration database subsystem provides a user interface for command and data input, a configuration support module which implements command processing, validation and object support programs which execute the input commands and allow a configuration database to be built and maintained while ensuring the integrity of the configuration data and the hierarchical relationship, and a database for storing the configuration.
- U.S. Patent No. 5,588,147 issued to Neeman et al. , discloses a method for providing a plurality of files organized into a tree of files in a distributed system having a replication facility and a number of computer systems. A file or a subtree of files at one of the computers can be replicated and stored in another computer.
- U.S. Patent No. 5,432,941 issued to Crick et al. , discloses a dynamic configuration software system wherein a multiplicity of software routines are defined. During configuration of the software system, a plurality of the software routines are selected for inclusion in the software system. Before configuring the software system, each of the multiplicity of software routines is assigned a configuration group. When configuring the software system, each of the multiplicity of software routines is invoked, one configuration group at a time. Each invoked software routine determines whether it should be included in the software system, and if it is to be include, the software routine pushes a reference to itself on a call-down table. Thus, by changing the assigned configuration order of a software routine, the configuration of the software system can be changed.
- U.S. Patent No. 5,581,764 issued to Fitzgerald et al., discloses an enterprise management system for a plurality of desktop computers. The system "reads" each computer and extracts an Already-Have List of configuration data. The system then compares the
- U.S. Patent No. 5,247,683 issued to Holmes et al. , discloses a system for installing software and updating configuration files.
- the system reads configuration build files of new software, for example (which are essentially "Should-Have Lists") and also reads configuration build files of the installed software (which are essentially "Already-Have Lists"). If there are any "clashing statements" between the two configuration build files, the system according to U.S. Patent No. 5,247.683 will compare "priority values" assigned to each clashing statement and automatically discard the lower priority statement. After all clashing statements are resolved, the system replaces the configuration files of the machine.
- the present invention is a software system with facilities to create, store, organize, and revise configuration settings from a central location and then to distribute and reconcile such settings to multiple "local" networked computers.
- the system uses a logical database of computer configuration settings for which common system settings for computers in a related subtree of the groups are determined, versioned, and stored.
- the configuration settings can be extracted from individual computer configurations, and configuration integrity is maintained and managed by determining differences in configuration settings and resolving such differences by accessing the computers directly using remote network access functions or by transmitting to a change distribution system, such as the "MICROSOFT” "SYSTEMS MANAGEMENT SERVER", for implementation at a scheduled time.
- the calculated configuration settings can be compared to the existing configuration settings for a particular computer with differences displayed to a user for diagnostic purposes and to allow the user to accept or refuse a particular configuration change.
- the present system allows a configuration manager in communication with a user at a local-level site to question a particular configuration setting originating from a group level site (or an enterprise level site) and provides an opportunity to override the configuration setting.
- the configuration manager may also provide an explanation for the override to the group level site (or enterprise level site). For example, one particular setting may work better in the specific local computing environment as learned through personal knowledge or experience obtained at the local level (or machine level) than the group level configuration. Since the reason for the local selection is sent to the group or enterprise level, valuable experience regarding operations at the local level may be put to use throughout the entire network.
- the existing configuration setting i.e. , the one
- an "allow-override” value for each (or selected) configuration settings is provided to dictate which configuration settings are allowed to be overridden at the local level.
- the software system comprises a database including a representation, such as a Registry, of groups of computers and their desired configuration settings, a program that enables an administrator to update this representation, and a program which will examine the current computer configuration settings for each computer in the database and compare the current settings with new configuration settings that are earmarked for that computer in order to produce a list of differences.
- the program can automatically resolve any conflict between the representation or Registry entries of the computer in a main set of configuration settings and the current configuration settings of the particular computer by either changing the state of the representation or by changing the current configuration settings of the computer.
- Fig. 1 is a block diagram of an enterprise network system showing a configuration server and a plurality of computers, interconnected by a bus, according to the invention
- Fig. 2 is a block diagram of four representative computers showing details of selected configuration settings, utilizing an illustrative embodiment of the present invention
- Fig. 3 is a block diagram showing computers and groups thereof according to the present invention
- Fig. 4 is a block diagram showing computers and groups arranged in a hierarchy, according to the present invention
- Fig. 5 is a flow chart of the method of operation of the software system of an illustrative embodiment of the invention
- Fig. 6 is a flow chart of the method of operation for determining differences in configuration settings
- Fig. 7 is a portion of a flow chart showing the method of operation for determining differences in configuration settings and for determining an "allow override" setting.
- Fig. 8 is a block diagram showing computers and groups of computers arranged in a hierarchy to illustrate the rules of precedence, according to the invention.
- Network 12 includes a plurality of machines 14, i.e., computers such as personal computers (PCs), servers, private branch exchanges (PBXs) and other computing devices, which may be labelled A-D, respectively.
- machines 14 are referred to herein as computers, which are connected over network connections 16 to configuration server 18, and optionally to each other, such as in a token ring network configuration.
- Configuration server 18 includes or is connected to memory such as configuration database 20.
- network 12 operates with computers 14 and manages data transfers and transactions by running the
- Network connections 16 may be a local area network (LAN) for interconnecting computers 14 to configuration server 18 and optionally to each other.
- LAN local area network
- Configuration management system 10 of the present invention may be implemented in software executed by configuration server 18, or alternatively may be hardware components of or integrated features of configuration server 18 and/or components operatively connected thereto in order to allow an administrator to modify the configuration settings of network 12 and of the plurality of computers 14.
- Configuration management system 10 of the present invention may be an application program in which case it may be complied or assembled from source code written, for example, in C+ + or "VISUAL BASIC".
- configuration management system 10 may be placed in the network operating system (NOS).
- NOS network operating system
- a computer or terminal of an administrator may include a display, and configuration management system 10 of the present invention may also generate or operate in conjunction with a graphic user interface (GUI) such as the GUI of "WINDOWS NT", to allow an administrator to point-and-click or otherwise provide commands and selections to reconfigure network 12 and computers 14 thereof.
- GUI graphic user interface
- Configuration settings for network 12 are typically stored in a memory such as configuration database 20, with configuration server 18 capable of allowing an administrator to modify the configuration settings through an administrative access point, which may be a terminal and/or may be one of computers 14. Such configuration settings may be stored in configuration database 20 in at least one computer file.
- the present invention is described in terms of the "MICROSOFT” "WINDOWS NT” network operating system (NOS). Accordingly, configuration management system 10 of the present invention is capable of modifying the configuration settings in configuration database 20.
- Network 12 uses a configuration file which is common to the configuration of each computer 14, with the configuration file being called the Registry in the "MICROSOFT” "WINDOWS NT” network operating system.
- the configuration file is a central repository for configuration settings used by virtually all software applications written for "WINDOWS NT".
- the "WINDOWS NT" operating system contains built-in functions which allow a program to manipulate the entries in the Registry by adding, modifying, and deleting entries, the functions being called “Akeys” and "Anames”, and their associated values, called
- Configuration files appropriate to a non-"MICROSOFT"-based NOS may be modified by an administrator using configuration management system 10 and the method of use described herein.
- configuration server 18 manages the Registry settings of each "WINDOWS NT" computer 14 throughout network 12.
- Configuration database 20 stores relationship information regarding each computer 14 on network 12, groups of computers, and linking information, as described below.
- Configuration server 18 uses configuration management system 10, embodied as an executable program, according to the invention, and uses configuration database 20 to perform configuration management functions.
- Configuration management system 10 provides for the efficient management of system configuration settings (e.g. , in the Registry file in "WINDOWS NT” and "WINDOWS 95") for computers 14 within network 12 and includes facilities to create, store, organize, and revise such settings from configuration server 18.
- system configuration settings e.g. , in the Registry file in "WINDOWS NT” and "WINDOWS 95"
- information regarding each computer 14 is collected and stored in configuration database 20.
- Such information includes computer identity, group names, current Registry settings within each computer 14, and linking information which links or associates any group or computer with other computers in a parent/child relationship.
- the following tables illustrate the above-described information:
- the Computers and Groups Table has the following attribute definition:
- Each computer 14 or group of computers 14 within network 12 includes an entry in this table.
- the Links Table is used to define which computers or groups are contained in other groups. It is defined as follows:
- the Registry Settings Table contains all of the managed keys and values for the entire system.
- the Registry Settings Table may be the Registry or a portion thereof.
- the Registry Settings Table is defined as follows:
- the "Allow Override" field shown in the above table allows predetermined settings, such as Password Expiration Duration (PED) to be overridden globally.
- PED Password Expiration Duration
- the administrator may override all of computers 14 to set the global configuration setting of every computer 14 on the network to have the same value.
- the above "Allow Override” field would be set to "No” regarding the particular PED setting so that a local override action would not be allowed for this particular setting.
- any configuration setting that is "closer" to the computer takes precedence over any new "non-global" setting.
- AH Already-Have
- SH Should-Have
- the corresponding registry information is available for each machine, such as computers 14, and for each group of computers 14 within network 12 to provide functionality to each of computers 14, for example, to have unique features, common features, and/or mandatory features.
- computers 14 labelled A-D each computer has associated Registry settings specifying, for example, buffer size, domain name, and password expiration times.
- the registry information shown in Fig. 2 is generated in real time (i.e.
- AH Already-Have
- configuration server 18 may be routinely accessed by configuration server 18 to establish and control various features of network 12 and its components; that is, computers 14.
- computers 14 For example, all of the computers labelled A-D in Fig. 2 may be required to have a common password expiration time such as 14 days.
- different attributes may be unique or may indicate groups of computers with common functionality for specific attributes, such as having common domain names for TCP/IP connections, or common buffer sizes.
- the disclosed configuration management system 10 either automatically or in response to commands and selections from an administrator, reads and/or retrieves the AH lists corresponding to the settings of each of computers 14 shown in Fig. 2 and forms groups of computers therefrom which have common attributes.
- new groups E-H may be generated, such as group E associating all computers having the domain name R2K.COM, and group F associated with computers having the domain name LAB.NET, which may be a test domain name for use in a lab for computer system testing and research.
- computers A and D are associated with group E
- computers B and C are associated with group F.
- group G may be generated to include all computers with the password expiration set to 14 days, and in this example, group G includes computers A-D. Such attributes common to all computers may reflect globally-set attributes network- wide, such as a common password expiration duration. Otherwise, computers having different attributes are not associated in group G, and such non-group G computers may be included in group G by appropriate modification of the particular group G attribute of the non-group G computer. Such insertion into group G may be performed individually or en masse. Also, member computers of group G may have such settings modified to take an individual computer out of group G.
- group H may be formed to associate all computers having the buffer size equal to 20, such as computers A-C. As shown in Figs. 2-3, computer D is not included in group H, but another group may be formed constituting all computers having the buffer size equal to 70, of which in this case computer D would be the sole member. As shown in Fig. 3, the grouping of computers is not necessarily hierarchical.
- Such grouping of computers may not be limited to single attributes. For example, as shown in Fig. 4 wherein four computers A, B, C, and D, are divided according to common configuration settings.
- group E includes all computers (in this example, groups A and D) having a common domain name; R2K.COM.
- group F includes all computers (computers B and C) which have a LAB.NET domain name.
- Group G is a "global group" and indirectly includes all computers (A, B, C, and D) by including groups E and F, as shown.
- Group G includes any configuration settings that are common to all computers (A-D), for example, Password Expiration Duration set to 14 days.
- Hierarchical structures and trees of groupings of computers may thus be generated, and groupings of groups may be performed, as shown in Fig. 4, wherein groups E and F form group G.
- Figure 4 illustrates that the program of the present invention works efficiently to implement and manage configuration settings throughout an entire network, in part, because it seeks commonality throughout the network of computers and thereby minimizes the number of controlling paths required to control the particular configuration settings of each computer.
- an inefficient system would manage each computer of a network from a central point on a direct one-to-one basis wherein a central configuration manager controls each individual computer without regard to commonality between computers.
- the settings of computers A-D and the setting of each of the groups E-H form sublists, sub-sublists, etc. of Should-Have (SH) lists which identify common resources across multiple computers.
- SH Should-Have
- configuration server 18 may build additional sublists as additional SH lists from the AH lists and sublists generated therefrom.
- the SH lists and sublists are then stored in configuration database 20 as a master SH list, which may be at least a portion of the Registry in a "MICROSOFT" "WINDOWS NT” NOS environment.
- Such generation of AH lists, SH lists and sublists provides for efficient configuration management in configuration server 18 by utilizing predetermined and established Registry settings of each of the individual computers 14 to configure the existing network 12.
- configuration management system 10 operates using, for example, a configuration management software program, according to the steps shown in Figs. 5-6.
- Configuration management program performs at least the following functions, which may be performed in any order:
- configuration management system 10 generates the SH lists from the AH lists according to the method shown in Fig. 5, in which configuration management system 10 (a) scans the AH lists for common settings among computers in step 22, such as the AH lists shown in Fig. 2; (b) generates a SH list from the common settings in step 24, to form groups such as shown in Figs. 3-4; (c) examines the constituents of each SH list to create higher levels SH lists, such as group G of Fig.
- step 4 and (d) repeatedly generating SH lists from the constituents groupings in step 28,; (e) determines if any more commonality is found in step 30; repeats steps 26-30 until no more commonality is found; and (f) stores the SH lists in configuration database 20 in step 32.
- Registry settings and attributes may not be extracted and grouped with the groupable settings, and so may be ungroupable or may be grouped later in response to user intervention such as user selections and preferences.
- specific computers may share a common geographic location and/or a common geographic designation setting, yet a set of such computers may be independent and ungroupable with the remaining computers having the same geographic characteristics.
- the disclosed configuration management system 10 may not group all of the computers despite such common characteristics, but configuration management system 10 may include interactive prompts and subroutines for receiving user intervention in the grouping process at a later time, such as a time chosen by the configuration manager.
- network 12 may support predetermined applications such as graphics editors, and so configuration management system 10 may scan computers 14 to determine that such graphic editors are available in computers 14 at a specific geographic location.
- configuration management system 10 may scan computers 14 to determine that such graphic editors are available in computers 14 at a specific geographic location.
- specific computers may be ungroupable and/or may be prevented from being grouped by configuration management system 10 despite the common features of such computers; that is, the shared graphics editors in a common location.
- Such prohibitions on grouping specific computers or groups may be administrator-specified and able to be modified by the administrator at a later date.
- configuration server 18 operates network 12 to maintain the settings of such SH lists of each of computers 14.
- configuration management system 10 determines what the Registry settings should be from the information in configuration database 20 and then interrogates each computer 14 to retrieve the current values for the settings located in each respective computer 14.
- Registry settings may be modified by a user or an administrator during use of the computer 14 and/or during upgrades or repairs of the computer 14.
- Configuration management system 10 operates as a configuration manager by comparing the two sets of Registry settings; that is, from the stored SH lists in configuration database 20 generated as described with reference to Fig. 5, and from the current Registry settings of each computer 14. As differences between the Registry settings of each computer and the Registry settings occur, configuration management system 10 identifies the differences between the AH list and the SH list to reconcile the computer configuration with the configuration management settings of network 12. As shown in Fig.
- the method determines the registry settings from the record of the detected machine/computer 14 as described below.
- the results of this search are then stored in a Temporary Links Table in step 48.
- the method checks in step 54 whether more Parents are available, and if so, steps 50-52 are repeated until no more Parents are found.
- step 58 if no more settings are present, the KEY and NAME entries are added to the Temporary Registry Settings Table in step 60, and then the method proceeds to step 61; ANY MORE SETTINGS, as discussed above.
- the steps 34-6 la may be repeated until all unique Parents have been processed.
- step 62 the method then accesses the Registry of the specific computer whose NAME was found in steps 34-40. For each KEY and NAME in the temporary registry settings table, the method retrieves the current data in step 62 from the current registry of the specific computer, and the method then compares such current data in step 64 with the DATA from the temporary registry settings table. If it is different, the method displays the difference in step 66; for example, by outputting a line or message, such as a dialog box in a graphic user interface, to the user or administrator of network 12. The message may include the computer name, the registry key and name, the data from the database, and the current data from the machine. Steps 34-66 may then be repeated for each computer in the computers and groups table. At the end of this method, the user has a complete list of differences between the registry settings in the database and the current settings for each computer 14 listed in configuration database 20. According to another embodiment of the invention, referring to Figs. 6 and 7, an
- each setting in the temporary registry settings table includes an allow override setting. If the allow override setting is set to "No”, then the current setting is replaced by the new setting. If the allow override setting is not set to "No”, then the settings are not changed, i.e. , the "closer” setting takes precedence as described above. Referring to Fig. 7, steps 56-62 include such steps 59 and 63 to perform the allow override checking. In step 59, the allow override setting is checked to determine if it is set to "No”. If it is set to "No”, the method proceeds to a REPLACE step 63, wherein the current setting is replaced with the selected setting. After step 63 in Fig.
- step 61 of Fig. 6 the method proceeds to step 61 of Fig. 6 and continues as shown in Fig. 6 and described above. If, in step 59 (referring to Fig. 7), the allow override setting is not set to "No" , then the process returns to step 56 of Fig. 6, and proceeds as shown in Fig. 6 and described above.
- the method for reconfiguring each computer includes the step of accessing the specific computer, according to the Computer Name, which corresponds to each difference found during the Registry Retrieval and Comparison operation described above, which includes the Computer Name, Registry Key and Name, Database Data, and Current Data.
- configuration management system 10 sets the registry of the computer such that the Registry Key and Registry Name are set to the Current Data for the computer.
- Configuration management system 10 may be interfaced with an external Version Control System (VCS) such that Registry settings are exported out of configuration database 20 into a format which can be accepted and stored by the VCS. Retrievals from the VCS can be imported into configuration database 20 so that the modifications of configuration database 20 are performed by configuration management system 10 by comparing the database settings with the settings of the current computers 14 for automatically adjusting configuration database 20 or the configuration of the computers.
- VCS Version Control System
- the differences between the Registry in configuration database 20 and the Registry settings or AH list of each computer are displayed to the user of the corresponding computer to perform user intervention and reconciliation of the differences. Accordingly, in step 66 above, the differences are displayed to a GUI associated with the user such as a GUI on a display of the user's computer. At that time, the user may then determine if the current Registry settings of the specific computer should be conformed to or reconciled with new Registry settings specified by the Registry in configuration database 20.
- configuration management system 10 may automatically perform the reconciliation by, for example, updating the registry of the computer.
- One option available to the user is the ability to command configuration management system 10 to automatically accept the AH of the user's computer into configuration database 20.
- the user may command configuration management system 10 to delete the entry of the user's computer from the conflicting SH list, thus removing the conflict.
- Both reconfiguration options selectable by the user may require configuration management system 10 to revise the SH lists of network 12.
- Such optional and selectable reconfiguration methods improve the management of network 12, since the SH lists may include errors causing SH discrepancies with the user's computer, which the user may remedy as such SH discrepancies occur.
- Some computers may have special assignments so that their configuration must be different, as is understood by the user at the local level, or perhaps at the domain level. In such instances, the particular settings of the user's computer would not be conformed and the current Registry settings of a specific computer would remain.
- an administrator may annotate the entries in the Registry in configuration database 20 for any of computers 14, groups of computers, or Registry settings to record a reason why any changes were made.
- These annotations may be stored as separate entries in configuration database 20 which automatically store the date and time, the administrator's system identification, as well as the annotations made, which may be in the form of a text message.
- Configuration management system 10 may also generate reports on the history of changes to configuration database 20 according to any overriding user selections and/or according to the stored annotations.
- the SH lists may correspond to groups, and so SH lists of computers of one group may be subsets of a SH list of an encompassing group. As groups are modified and computers 14 are incorporated or removed from network 12, and even as Registry settings are modified, SH lists throughout network 12 may be generated listing different settings for a particular computer. Accordingly, such conflicting SH lists may adversely affect the performance of network 12.
- FIG. 8 an illustrative embodiment is shown to define term "closer” and "closeness" used above.
- computers A, B, C, and D are shown grouped according to common configuration settings, as discussed above.
- computers B and C are grouped together because they have other common configuration setting (not shown).
- Each local site "educates” the enterprise level regarding Registry settings as they may be “tested” in the field, and so the enterprise level controlled by configuration management system 10 respects the selected operability of the locally determined Registry settings. Accordingly, priority and cardinality values may be adjusted to control the precedence of SH lists.
- An important feature of the disclosed configuration management system 10 and method is that the registry files of a large number of computers, for example, thousands of interconnected computers, may be set to desired and customized configurations so the individual computers efficiently work together in a distributed computing environment. If particular files at any local or domain site throughout an enterprise become corrupt, and Registry settings become faulty, implementation of the disclosed configuration management system 10 and method manages and effectively "resets" the configuration files of each computer so that any local problems can be corrected.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU71165/98A AU7116598A (en) | 1997-04-14 | 1998-04-14 | Registry management system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US4364397P | 1997-04-14 | 1997-04-14 | |
US60/043,643 | 1997-04-14 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1998047057A2 true WO1998047057A2 (en) | 1998-10-22 |
WO1998047057A3 WO1998047057A3 (en) | 1999-01-21 |
Family
ID=21928160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/007495 WO1998047057A2 (en) | 1997-04-14 | 1998-04-14 | Registry management system |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU7116598A (en) |
WO (1) | WO1998047057A2 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2339934A (en) * | 1998-07-17 | 2000-02-09 | Ibm | Configuring computer network operations based upon one-time interactive entriesinto a server of data required by multiple clients |
WO2000036503A2 (en) * | 1998-12-17 | 2000-06-22 | Pcfirst.Com, Inc. | Automatic and selective transfer of software and configuration information from a source computer to a target computer and automatic upgrade of software |
WO2002039257A2 (en) * | 2000-10-31 | 2002-05-16 | Loudcloud, Inc. | Automated provisioning framework for internet site servers |
EP1265139A1 (en) * | 2001-06-08 | 2002-12-11 | Hewlett Packard Company, a Delaware Corporation | A method of restoring an impaired software image associated with a networked computer |
WO2005013119A2 (en) * | 2003-07-31 | 2005-02-10 | International Business Machines Corporation | Method, system and program product for preserving mobile device user settings |
US7028019B2 (en) * | 1998-11-11 | 2006-04-11 | Wise Solutions, Inc. | Method and system of managing software conflicts in computer system that receive, processing change information to determine which files and shared resources conflict with one another |
US7124289B1 (en) | 2000-10-31 | 2006-10-17 | Opsware Inc. | Automated provisioning framework for internet site servers |
EP2093964A1 (en) * | 2008-02-21 | 2009-08-26 | Siemens Aktiengesellschaft | Method for dynamic configuration of application components |
US7668831B2 (en) | 2005-10-27 | 2010-02-23 | International Business Machines Corporation | Assigning unique identification numbers to new user accounts and groups in a computing environment with multiple registries |
US7743147B2 (en) | 2001-04-20 | 2010-06-22 | Hewlett-Packard Development Company, L.P. | Automated provisioning of computing networks using a network database data model |
WO2010081742A1 (en) * | 2009-01-19 | 2010-07-22 | University College Dublin, National Univerity Of Ireland, Dublin | Method and system for analysing most recently used (mru) registry keys |
US9015296B2 (en) * | 2000-10-19 | 2015-04-21 | Nokia Solutions And Networks Oy | Method of managing network element settings |
US9100283B2 (en) | 2002-06-12 | 2015-08-04 | Bladelogic, Inc. | Method and system for simplifying distributed server management |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5247683A (en) * | 1990-06-28 | 1993-09-21 | International Business Machines Corporation | System and method for installing software and updating configuration files |
US5282273A (en) * | 1989-03-15 | 1994-01-25 | Hitachi, Ltd. | Enterprise information system having three level hierarchy of data bases and communication paths |
US5581764A (en) * | 1993-04-30 | 1996-12-03 | Novadigm, Inc. | Distributed computer network including hierarchical resource information structure and related method of distributing resources |
US5664170A (en) * | 1990-05-07 | 1997-09-02 | Next Computer, Inc. | Flexible distributed network database containing configuration information for a network divided into domains |
US5724509A (en) * | 1996-04-22 | 1998-03-03 | Motorola, Inc. | Method and apparatus for synchronizing implementation of configuration information in a communication system |
US5796951A (en) * | 1995-12-22 | 1998-08-18 | Intel Corporation | System for displaying information relating to a computer network including association devices with tasks performable on those devices |
-
1998
- 1998-04-14 AU AU71165/98A patent/AU7116598A/en not_active Abandoned
- 1998-04-14 WO PCT/US1998/007495 patent/WO1998047057A2/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5282273A (en) * | 1989-03-15 | 1994-01-25 | Hitachi, Ltd. | Enterprise information system having three level hierarchy of data bases and communication paths |
US5664170A (en) * | 1990-05-07 | 1997-09-02 | Next Computer, Inc. | Flexible distributed network database containing configuration information for a network divided into domains |
US5247683A (en) * | 1990-06-28 | 1993-09-21 | International Business Machines Corporation | System and method for installing software and updating configuration files |
US5581764A (en) * | 1993-04-30 | 1996-12-03 | Novadigm, Inc. | Distributed computer network including hierarchical resource information structure and related method of distributing resources |
US5796951A (en) * | 1995-12-22 | 1998-08-18 | Intel Corporation | System for displaying information relating to a computer network including association devices with tasks performable on those devices |
US5724509A (en) * | 1996-04-22 | 1998-03-03 | Motorola, Inc. | Method and apparatus for synchronizing implementation of configuration information in a communication system |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6209031B1 (en) | 1998-07-17 | 2001-03-27 | International Business Machines Corporation | Configuring computer network operations based upon a sequence of interactive user entries into a network server computer with a one time entry of data commonly required by multiple clients |
GB2339934A (en) * | 1998-07-17 | 2000-02-09 | Ibm | Configuring computer network operations based upon one-time interactive entriesinto a server of data required by multiple clients |
GB2339934B (en) * | 1998-07-17 | 2003-05-28 | Ibm | Configuring computing network operations based upon a sequenece of interactive user entries into a network server computer with a one time entry of data commo |
US7028019B2 (en) * | 1998-11-11 | 2006-04-11 | Wise Solutions, Inc. | Method and system of managing software conflicts in computer system that receive, processing change information to determine which files and shared resources conflict with one another |
WO2000036503A2 (en) * | 1998-12-17 | 2000-06-22 | Pcfirst.Com, Inc. | Automatic and selective transfer of software and configuration information from a source computer to a target computer and automatic upgrade of software |
WO2000036503A3 (en) * | 1998-12-17 | 2000-10-26 | Pcfirst Com Inc | Automatic and selective transfer of software and configuration information from a source computer to a target computer and automatic upgrade of software |
US9015296B2 (en) * | 2000-10-19 | 2015-04-21 | Nokia Solutions And Networks Oy | Method of managing network element settings |
US7124289B1 (en) | 2000-10-31 | 2006-10-17 | Opsware Inc. | Automated provisioning framework for internet site servers |
WO2002039257A2 (en) * | 2000-10-31 | 2002-05-16 | Loudcloud, Inc. | Automated provisioning framework for internet site servers |
WO2002039257A3 (en) * | 2000-10-31 | 2003-05-22 | Loudcloud Inc | Automated provisioning framework for internet site servers |
US7743147B2 (en) | 2001-04-20 | 2010-06-22 | Hewlett-Packard Development Company, L.P. | Automated provisioning of computing networks using a network database data model |
EP1265139A1 (en) * | 2001-06-08 | 2002-12-11 | Hewlett Packard Company, a Delaware Corporation | A method of restoring an impaired software image associated with a networked computer |
US7062672B2 (en) | 2001-06-08 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | Method of and computer network arrangement for restoring an impaired software image |
US9100283B2 (en) | 2002-06-12 | 2015-08-04 | Bladelogic, Inc. | Method and system for simplifying distributed server management |
US9794110B2 (en) | 2002-06-12 | 2017-10-17 | Bladlogic, Inc. | Method and system for simplifying distributed server management |
US10659286B2 (en) | 2002-06-12 | 2020-05-19 | Bladelogic, Inc. | Method and system for simplifying distributed server management |
WO2005013119A3 (en) * | 2003-07-31 | 2006-04-13 | Ibm | Method, system and program product for preserving mobile device user settings |
US7822831B2 (en) | 2003-07-31 | 2010-10-26 | International Business Machines Corporation | Method, system and program product for preserving and restoring mobile device user settings |
WO2005013119A2 (en) * | 2003-07-31 | 2005-02-10 | International Business Machines Corporation | Method, system and program product for preserving mobile device user settings |
US7668831B2 (en) | 2005-10-27 | 2010-02-23 | International Business Machines Corporation | Assigning unique identification numbers to new user accounts and groups in a computing environment with multiple registries |
EP2093964A1 (en) * | 2008-02-21 | 2009-08-26 | Siemens Aktiengesellschaft | Method for dynamic configuration of application components |
WO2010081742A1 (en) * | 2009-01-19 | 2010-07-22 | University College Dublin, National Univerity Of Ireland, Dublin | Method and system for analysing most recently used (mru) registry keys |
Also Published As
Publication number | Publication date |
---|---|
WO1998047057A3 (en) | 1999-01-21 |
AU7116598A (en) | 1998-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3590688B2 (en) | Method and system for constructing an installation plan object for installing an application | |
US6115549A (en) | Directory-services-based software distribution apparatus and method | |
KR100550758B1 (en) | A method and system for managing configuration changes in a data processing system | |
US6023586A (en) | Integrity verifying and correcting software | |
US6769124B1 (en) | Persistent storage of information objects | |
US7013461B2 (en) | Systems and methods for service and role-based software distribution | |
US5745897A (en) | Method and system for compiling management information base specifications | |
US5586322A (en) | Workgroup organized network manager with workstation comparison system | |
US7233940B2 (en) | System for processing at least partially structured data | |
US7861243B2 (en) | Automatically deploying program units to a cluster of networked servers | |
US6587124B1 (en) | Apparatus and method for generating configuration data for a device to access a service | |
US7499933B1 (en) | System and method for managing enterprise application configuration | |
US20150269276A1 (en) | Service desk data transfer interface | |
US8321548B2 (en) | Method and system for specifying planned changes to a communications network | |
US7441007B1 (en) | System and method for allowing applications to retrieve properties and configuration information from a persistent store | |
AU742324B2 (en) | Automatic generation of reconfiguration scripts for telecommunication devices | |
EP0507110A2 (en) | Network management system and relational database therefore | |
US20030065501A1 (en) | System for automatically creating a context information providing configuration | |
US20060085461A1 (en) | System & method for using web based applications to manipulate data with manipulation functions | |
WO1998047057A2 (en) | Registry management system | |
KR20010071933A (en) | System and method for selectively defining accesss to application features | |
US8185562B2 (en) | Business object browser for business query language | |
US10148486B2 (en) | Object version management | |
KR20040101538A (en) | Method and system for managing a computer system | |
US20030028521A1 (en) | Configuration for a storage network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1998544211 Format of ref document f/p: F |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: CA |