US20030167182A1 - Method and apparatus for providing symbolic mode checking of business application requirements - Google Patents

Method and apparatus for providing symbolic mode checking of business application requirements Download PDF

Info

Publication number
US20030167182A1
US20030167182A1 US10/201,114 US20111402A US2003167182A1 US 20030167182 A1 US20030167182 A1 US 20030167182A1 US 20111402 A US20111402 A US 20111402A US 2003167182 A1 US2003167182 A1 US 2003167182A1
Authority
US
United States
Prior art keywords
specifications
model
objects
actions
business process
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/201,114
Inventor
Bard Bloom
Ian Simmonds
Paul Keyser
Mark Wegman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US10/201,114 priority Critical patent/US20030167182A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SIMMONDS, IAN D., WEGMAN, MARK N., BLOOM, BARD, KEYSER, PAUL T.
Publication of US20030167182A1 publication Critical patent/US20030167182A1/en
Priority to US12/544,933 priority patent/US10310819B2/en
Priority to US12/545,275 priority patent/US20090313073A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/10Requirements analysis; Specification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0637Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0637Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
    • G06Q10/06375Prediction of business process outcome or impact based on a proposed change
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/067Enterprise or organisation modelling
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Definitions

  • the invention relates generally to the field of business applications and more particularly to a method and apparatus for performing preliminary checking of business application models to detect potential defects.
  • a business application which automatically processes employee travel vouchers must be capable of evaluating a plurality of contingent conditions (e.g., employee status, employee travel allocations, expenditure ceilings, approval requirements, etc.) and of processing or routing requests based on the evaluation of those conditions.
  • business applications necessarily rely heavily on human action, such as when human judgment is essential to a resolution of an atypical transaction.
  • Well-designed business systems have escape commands in which privileged users (e.g., managers) can “violate” the general requirements and invariants of the system as necessary in order to deal with reality.
  • Model checking is a preferred method for formally evaluating the behavior of a business application.
  • model checking such as is detailed in the publications entitled Model Checking by E. M. Clarke, et al , MIT Press, (Cambridge, Mass., 1999) and Model Checking Large Software Specifications by N. Carriero, et al, IEEE Transactions on Software Engineering, pages 498-519 (July 1998), a system is described as a finite-state model and a desired property of the system is expressed as a logical formula. Having the finite-state model and the logical formula, it can be determined whether the system has the desired property. While computationally complex applications cannot realistically be fully modeled, due to exponential expansion of the possible decision paths, many useful cases can be analyzed.
  • OBDDs Ordered Boolean Decision Diagrams
  • the model must be phrased as Boolean formulas, for example, with the state s as a vector of Boolean variables, formulas St(s) describe the possible start states, and Trans(s,t) describing when the system can take a transition from s to t.
  • the multi-step behavior of the system can then be computed from these (e.g., the set of reachable states is computed from the transitive closure:
  • Temporal logic formulas (e.g., Computation Tree Logic or CTL), can also be expressed as OBDDs. Checking whether or not the model satisfies the formula then becomes a matter of calculation. In many useful cases, OBDD calculations can be done quickly. This approach has verified properties of system with immense numbers of states, currently up to 10 120 for well-designed systems and properties. Model checking with such systems, however, takes a significant amount of human work in setting up the problem. Therefore, while model checking has theoretical potential in many arenas, it has primary usefulness in the areas of protocol checking and circuit checking, wherein the models are inherently small and of regular structure. Model checking has had limited applicability in checking routine software.
  • model checking has been used not for verification but for so-called falsifying of properties, wherein selected bugs in the system can be targeted and found. For example, one may see if a protocol can deadlock or a memory management chip can lose a page. Clearly, these are important properties to identify and correct. Checking a handful of well-chosen properties can catch many errors, and can increase confidence that remaining errors are scattered and more benign. Some properties, however, may simply be too hard to check.
  • model checking Additional shortcomings of model checking include the fact that the models must be kept as small as possible, due to the fact that even a bit or two in the wrong place can greatly increase computation time. By reducing model size, however, one necessarily sacrifices some degree of certainty that the model is adequate for its checking purposes. It must also be recognized that the real system (i.e., the business application being checked) is must larger than the model and that verification via the model which concludes that an application does not produce errors in its execution of four consecutive processes cannot predict that the application will not lock upon execution of the fifth process.
  • Yet another object of the invention is to provide a method which gives a total, programmatic description of classes and activities of a business application as well as a partial, logical description of specifications therein.
  • the present invention comprising a system and method for determining if a business process satisfies certain properties, the method comprising building a model for the business process, the model comprising a plurality of actions each having a precondition and a postcondition, constructing specifications for the properties which describe both the states of the business process and the order in which they may occur, and determining if the model satisfies the specifications, wherein failure to satisfy the specifications indicates that the model (and the underlying business application) is problematic and requires some modification.
  • FIG. 1 illustrates a chart of quantifiers which can be used with the present invention
  • FIG. 2 illustrates the conversion from the inventive language to SMV
  • FIG. 3 illustrates a process flow for implementing the inventive process
  • FIG. 4 illustrates a process flow for specifying a business process in the inventive language.
  • business data is multiply, dynamically categorized.
  • Multiple categorization models the fact that a person might be an employee or a customer, both, or neither.
  • Dynamic categorization captures the fact that a person can be hired or fired.
  • Standard object models, even multiple inheritance models, don't capture this every well, since employee and customer cannot usefully be made subclasses of person in most programming languages. Nonetheless, experience suggests that multiple dynamic classification is a good way to think about and describe business data.
  • Classes classify information such as person, employee, customer, male, female. Aspects group mutually exclusive sets of classes, for example person.gender includes male and female, and models the fact that a given person can be at most only one of the two at any instant. An aspect with only one element represents an option: for example, person.employment denotes the single aspect employee. An object may have classes in different aspects at the same time, such that a given person may be both an employee and a male.
  • Changing one class may trigger changes to others, for example firing an employee involves removing their employee classification. If x is a manager (and hence an employee), firing him removes his manager classification as well as his employee classification. Conversely, hiring someone to be a manager turns them into an employee as well.
  • a travel reimbursement form might have classifications including Submitted, Approved, Paid, which may track the progress of the form through the process, and LowPrice, NormalPrice, HighPrice, based on the amount being sought.
  • Submitted Approved
  • Paid which may track the progress of the form through the process
  • LowPrice NormalPrice
  • HighPrice based on the amount being sought.
  • Models of business application have been built (cf: IS010746-2,IS010165-7) for explanation but not implemented.
  • a system consists of a data model and a control model.
  • Data is a collection of objects, together with some relationship between them.
  • the objects are in a multiple dynamic classification hierarchy, they have many classes, and they can change classes as the application proceeds.
  • the running example of the travel invoice processing system will be used as an example:
  • Paid is a subclassification of Approved, and Approved and Rejected are mutually exclusive.
  • the model also permits mappings (partial or total functions) and general relationships between entries. For example, a suitable definition of sets of objects TRAVELFORMS and PEOPLE is assumed. In some systems, these will simply be all entities of type TravelForm and Person.
  • Control consists of a collection of activities, running asynchronously.
  • An activity represents some agent (human or automated) using a subsystem, such as: a manager using the application to approve travel forms, a program evaluating applications and routing them to the correct people, and so on. Activities may correspond to highly abstracted versions of large subsystems (e.g., invocations of legacy applications).
  • Activities have preconditions under which they can execute and have outcomes. Outcomes perform some computation, thereby changing entity classifications and relationships. An activity may have several outcomes and some agent, human or computer, will choose one of the outcomes each time the activity is executed. Activities are assumed to be atomic, and non atomic events can be modeled as sequences of activities.
  • the judgeTravelForm activity applies to submitted, medium-cost travel forms. Once the traveler fills out the form, the result is an entity tf which is in state Submitted and MediumCost. When that happens, the activity may fire (i.e., proceed to the next step). Other activities may be enabled as well, of course. When an activity fires, one of two things will happen: the travel form may be approved with appr recorded as the one who approved it, or it may be rejected.
  • the model is good for describing business applications in a reasonable level of detail.
  • the description can serve as a specification of the system, and can be a basis for a more detailed analysis.
  • the act of description has value, for it forces people to think about their needs and requirements in detail.
  • the modeling language consists of definitions of data and activities, plus some specifications which should be checked.
  • Data comprises entities and relationships. Entities are statically described as a multiple dynamic classification hierarchy, with classification and aspect definitions as detailed above.
  • Object is the built-in root class;
  • Object.sub is a built-in aspect of it used for subclasses in the object orientation (00) sense.
  • class Person, Auctionable Object.sub: aspect age, job, online: Person; class Adult : Person.age; // x is a child if x is not an adult class Buyer, Seller, Admin: Person.job; class On; Off: Person.online.
  • Entities must be declared explicitly, with permanent and initial classes given. This declares a Person, an Adult and Buyer who is initially Off(line). That person will stay an Adult and Buyer forever, but the online status may change. For example:
  • Entities may be grouped into domains, which are static structures used for abstraction. Domains can overlap and be heterogeneous. To illustrate:
  • Domain ADULT (Arwen, Huw, Cefyn);
  • [0059] defines the relationship owns, which will be used to model who owns what. Initially Arwen owns a carved spoon, though this may change as the system computes. Relations may be declared to be reflexive, irreflexive, symmetric, and/or unchanging. All of these declarations save bits in the model checker, and provide useful invariants that are automatically enforced. For example: rel nextTo: (PERSON, PERSON) irreflexive, symmetric;
  • [0060] describes who is next to whom. None is next to themselves (hence the relation is reflexive); and if one person is next to another, the other is next to the one (hence it is symmetric).
  • Maps model total or partial functions such as:
  • map owner AUCTIONABLE ⁇ PERSON
  • Maps may be partial, unchanging, initialized, or have symmetries between selected sets of arguments, as shown below:
  • map spouse PERSON ⁇ PERSON, partial
  • the expressive language of the invention is tuned for writing specifications for modeling of business applications.
  • Boolean expression are the heart of business applications, expressing the conditions under which an activity is available, or the requirements on the system, and can get quite complex.
  • the Boolean operations for the present invention are designed to cut down on parentheses, redundant subexpressions, and visual ambiguity.
  • Boolean implication and equivalence are not associative operations.
  • the inventive language has a nonstandard but useful meaning for iterated ⁇ and ⁇ .
  • a ⁇ B ⁇ C is interpreted as (A ⁇ B) & (B ⁇ C), and similarly for ⁇ . This allows specifying nested predicates, e.g., saying that the high bidder in an auction must have made some high bid in that auction, and that in turn means she has looked at the auction, as shown below
  • braces ⁇ ⁇ and brackets [ ] are allowed, as well as parentheses.
  • the low precedence operations are useful in long conditions, which usually consist of several joined clauses.
  • the invention also allows quantifications over domains, to wit:
  • one x AUCTIONABLES such that owns (p,x), forSale(x) holds when exactly one auctionable item owned by p is for sale.
  • Quantifiers allow multiple variables, ordered or unordered. For example:
  • Comparisons with respect to the domain of quantifications, may be used as well. For example:
  • Each activity has a precondition, and a body of code.
  • the body of code may include choices between several outcomes. Many things may be done at the same time, with the body being considered a sequence of transactions, each done atomically. The distinction between sequential and simultaneous composition is made very explicit.
  • Choices made by agents describe the possible transitions of the system. This models, for example, presenting the user with a form, and buttons marked “APPROVE” and “REJECT”. Some outcomes may be conditional, such that the APPROVE button may only be usable when the travel form is within corporate guidelines. Outcomes are named by way of documentation. Hence: pick outcome APPROVE when travelForm:MeetsGuidelines :> now travelForm:Approved outcome REJECT :> now travelForm:Rejected; end-pick
  • the inventive system only allows one choice to be made at a time.
  • An activity can include several picks, separated by the sequencing operation AND-THEN. Sequencing is somewhat more expensive than simultaneous composition, so the invention provides a somewhat longer syntax for that.
  • Activities have preconditions which describe when they can be performed, plus bodies which are commands to be performed. act logOn(p: PERSON) pre p !: On; pick outcome successfulLogon :> now p:On; outcome failedLogonAttempt :> skip; end-pick end-act.
  • the activity When the system is running, the activity is enabled when the precondition evaluates to true for some instantiation of the formal parameters with entities from the suitable domains.
  • the rest of the activity is a sequence of instantaneous commands and pick commands, which may be executed as above. Only one activity will fire at a time.
  • the specification language uses CTL connectives to explore the tree.
  • Each temporal modality has two parts. The first part quantifies over the set of possible next states; the second part is a temporal connective like “eventually”.
  • CTL traditionally uses single letters for modalities. Background research suggested that few businessmen were instantly comfortable with “EF” and “AG”, therefore a more verbose but suggestive syntax is employed.
  • the branching component of a modality is either surely (CTL's A) or somehow (CTL's E).
  • the temporal component may be henceforth (CTL's G), eventually (CTL's F), next (CTL's X), until (CTL's U), or until-maybe (a weak until, a derived operation in CTL).
  • CTL's G may be henceforth
  • CTL's F may be henceforth
  • CTL's F next
  • CTL's X next
  • CTL's U until-maybe (a weak until, a derived operation in CTL).
  • the inventive system and method also allows always as a synonym for AG, but only as the outer more temporal modality. Always is useful for specifying invariants. It is not allowed, however, in nested modalities, because it causes confusion whereby “always” is misinterpreted to mean “for all time, past as well as future” instead of the correct “for all future time”. For example: spec NobodyEverFixesCarvedSpoons :> // inner ‘always’ is illegal always (CarvedSpoon:Broken-> always CarvedSpoon:Broken);
  • Temporal connectives may be nested.
  • the example of NobodyEverFixesCarvedSpoons is a typical nesting for a monotonicity property; once a certain fact (CarvedSpoonBroken) has been established, it remains true forever after.
  • Other nestings are useful as well, as shown below: spec SubmittedFormsCanGetPaid :> always, all f:TravelForm, f:Submitted & f !: Rejected --> (possibly f:Paid);
  • the travel form example is one of the smallest useful business applications which can readily be used as an example.
  • One person, the traveler fills out a form after going on a trip. His manager must approve or reject it. The manager may pass the form along to the manager's manager instead. The top manager of the organization cannot pass the form further along, of course.
  • the travel form object is described as follows. It has states including FilledOut, Submitted, Approved, and Rejected.
  • the states Approved and Rejected are implemented as subclasses of the state Submitted because a form can only be approved or rejected after it has been submitted. To illustrate:
  • class Manager Person.management
  • entity Dafyd Person Manager
  • the actual management hierarchy is expressed as a relation, as shown below: rel manages : (PERSON, PERSON), irreflexive, init (Bran, Arwen), (Cefyn, Bran), (Dafyd, Cefyn);
  • entity tfb:TravelForm: TravelForm
  • domain TF [tfa, tfb]: // Their travel forms. rel owns : (TRAV, TF); init (Arwen, tfa), (Bran, tfb);
  • Travel forms may be filled out, as characterized below: act fillOut(p : TRAV, tf : TF) pre tf !: FilledOut; now tf : FilledOut; end-act;
  • travel forms may be submitted to the traveler's Manager, as follows: act submit (p : TRAV,tf:TF, mgr, PERSON) pre tf : FilledOut && owns(p,, tf) && tf !: Submitted && manages (mgr, p); now tf:submitted, judging(mgr, tf); end-act;
  • the main activity of the application is when some manager mgr judges some travel form tf. This can only happen when the manager is the one judging the travel form, and when no judgment has been made on the form.
  • the manager may choose to approve or reject it, or choose to pass the buck.
  • model checking provides a useful form of regression testing. Once a problem has been identified and solved and recorded as a spec, the system will continue to test it as the system evolves. So, the problem will either stay solved or the system will alert the user that it has “become” unsolved again.
  • the example also allows system exploration. For example, if a personnel subsystem is added, which allows hiring, firing, promotion, and demotion, it must be recognized that several of these functions will break the travel reimbursement process. In the running example, if Cefyn is demoted at the same time that Bran is confused by a travel form, the travel form could fall between the cracks. The system specs will detect the problem so that when organizational structure changes, suitable measures can be taken to update unfinished processes.
  • Strix inventive language has been implemented only as tylluan, a version of which was written explicitly for the invention yet translates correctly back to tylluan.
  • the differences are largely syntactic (e.g., tylluan does not have chained variables in quantifiers or multiple picks in a single activity).
  • the system has a straightforward parser written in javacc; the parsed program is translated to SMV, and run through the existing SMV model checker.
  • SMV is a BDD-based checker. Described herein are only the features which are used, and the SMV language description is mixed with the description of the translation.
  • An SMV program consists of a number of modules, each of which declares some variables, and describes a part of the transition relation.
  • Scalar variables may have Boolean or symbolic values from some fixed set; variables can also be instances of modules.
  • the inventive classes become SMV modules, used to aggregate data. SMV has no inheritance, so each class becomes a distinct SMV module, with local variables for each bit of data that the class might need.
  • the inventive language/process translates the person type by a module cls-person, with variables for the person's management and importance. These variables range over codes for all the subtypes in the management and importance aspects of person (e.g., the manager class is represented here by id-person-management-Manager-and another value for the case that the object has no classification in that aspect).
  • Modules take formal parameters which are used to provide the initial values of these variable. Each module defines a part of the state-transition relation. The init( . . .
  • Instances of classes are declared as variables of the main program, initialized suitably.
  • VAR Arwen cls-Person(none-Person-management, None-Person-importance)
  • the DEFINE clause names an expression.
  • the case expression is a conditional expression, taking the first branch whose condition is true.
  • VAR p-filledout-tfa process proc-filledOut(tfa)
  • Each relation is implemented by a module, the manages relation by the rel-manages module.
  • the relation module is used entirely for holding data. Queries on the relation become SMV accesses to members: manages(Bran-Arwen) becomes manages.at-Bran-Arwen, and changes to the relation become assignments to members. Note that each vector of arguments costs one bit. The reflexivity and symmetry conditions eliminate possible vectors of arguments (e.g., sorting them, so that married(Bran-Arwen) and married(Arwen-Bran) would be stored as at-Arwen-Bran), and thus conserve bits. Unchanging relations are compiled away completely.
  • Quantifiers are expanded.
  • the translations for one and at-most-one are quadratic, as are the translations of and #.
  • SMV determines whether a spec is satisfied or not, it prints out the first few characters. It also prints out a counterexample for unsatisfied specs. Since an SMV program may have many specs, and since the specs that SMV uses may look quite different from the inventive language forms, in extreme case, the first few characters of the SMV spec may be all “(''s—a module is defined called “spec” with constants for each specification name, and include that constant as the first conjunct of the specification:
  • Model checking engines are based on NP-hard problems, and are quite sensitive to their inputs. Adding an entity or an activity may increase the running time from a few seconds to a few hours to a few eons. Experience with the language has lead to a number of programming patterns that sometimes can turn it back from hours to seconds.
  • Each vector of possible arguments to an activity generates one SMV process. So, the number of processes can be as bad as the product of the sizes of the domains.
  • the language does no compile-time analysis, if the precondition of an activity instance can be determined to be false, then it does not generate a process for it. It is generally worth cutting down on the number of formal parameters to an activity.
  • the “confusedBy” relation with the pickup activity that it triggers, is programmatic way to avoid a third argument in the judge activity. In the travel form example with four people, the three-argument version takes about twice as long. Similarly, a for loop is used to turn off confusedBy(q,tf) for all possible “confuses” q, rather than mentioning the one person who was actually confused as an argument.
  • SMV does not simply calculate whether a spec is true or false. If it is false, SMV attempts to produce a counterexample, in the form of a trace of the system execution which violates the spec. Some specifications, of course, do not have counterexample traces. For example, a counterexample to forevermore x:Blue is a trace leading to a state in which x is not Blue, but no single trace is a good counterexample for possibly x: Blue.
  • SMV also produces counterexample traces in terms of SMV variables and processes.
  • the translation scheme is as transparent as possible, such that the name of the SMV process is built from the name of and binding of the inventive language process.
  • the inventive checking process is applied by the process flow which is illustrated in FIG. 3.
  • the first step at 301 , is building a model for the business process, the model comprising a plurality of actions each having a precondition and a postcondition.
  • specifications for the properties which describe both the states of the business process and the order in which they may occur are constructed at step 302 (further detailed with reference to FIG. 4).
  • the final step is determining if the model satisfies the specifications, wherein failure to satisfy the specifications indicates that the model (and the underlying business application) is problematic and requires some modification. The determination is made at decision box 303 . If the specifications are satisfied, as indicated by the YES response, then the process exits at 304 .
  • a problem is indicated to the user/system by notification in step 305 .
  • a series of iterations may be conducted with variations on the model or the specification being invoked to more definitively locate the source of potential problems.
  • FIG. 4 provides a process flow for specifying a business process.
  • objects are described using a dynamic, multi-classification model as detailed above.
  • the system describes actions that can take place in terms of the classifications of the potential objects used in the action.
  • actions e.g., the buck passing example.
  • an application is generated that ensures that actions take place when valid, at step 404 .
  • the language for the business application has been specified, one can utilize that as a precondition for performing model checking, as well as for writing the execution engine for the application.
  • the invention provides the language for modeling business applications and the process for specifying the business process. Additionally, the invention provides the process for using model-checking technology to verify temporal-logic specifications.
  • the language is tuned for the issues and concepts of relevance to high-level business analysis. While the inventive language is not a general-purpose programming language, the programs are executable, either with or without user intervention.
  • the language interpreter will have panes to show the classification hierarchies and relationships of all the entities, and a list of activities and their outcomes that can fire. This lets the user execute and explore the model. For extra ability to explore, the interpreter should allow saving and restoring system states, and going backward as well as forward.
  • One embodiment which is particularly desirable is doing simulation running the program automatically, making random choices of activity and outcome. If the activities and outcomes are annotated by costs and probabilities, the program can be run without human intervention and the cost of the process can be estimated.
  • the simulator should be quite efficient, making hundreds of runs per second, accumulating statistics about the system's costs and bottlenecks.

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Educational Administration (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A system and method for providing symbolic mode checking of business application requirements. A language allows for building a model for the business process, the model comprising a plurality of actions, with each action having a precondition and a postcondition or outcome. Specifications are constructed for the properties of the business application, with the specifications describing both the states of the business process and the order in which they may occur. Finally, the model and the specifications are analyzed to determine if the model satisfies the specifications. If the model fails to satisfy the specifications, a problem may be indicated in the business application. The process can be automated to permit the system to make assumptions for conducting a thorough analysis of selected potential problem areas in the application.

Description

    FIELD OF THE INVENTION
  • The invention relates generally to the field of business applications and more particularly to a method and apparatus for performing preliminary checking of business application models to detect potential defects. [0001]
  • BACKGROUND OF THE INVENTION
  • Business applications have gained widespread use, despite their complexity and the difficulty in accurately projecting their performance. Businesses use applications for tasks including reimbursing employees for travel expenses, ordering notebooks and other office supplies, allocating office and cubicle space, and other routine trivia, as well as for more complex tasks such as the bookkeeping and organizational procedures by which on-line auction houses organize auctions, banks handle checks, insurance companies decide what sort of policy to issue, railroad companies track trains' locations and contents, etc. Business applications need to be flexible in ways that more typical, linear computer programs do not. As an example, a business application which automatically processes employee travel vouchers must be capable of evaluating a plurality of contingent conditions (e.g., employee status, employee travel allocations, expenditure ceilings, approval requirements, etc.) and of processing or routing requests based on the evaluation of those conditions. Further, business applications necessarily rely heavily on human action, such as when human judgment is essential to a resolution of an atypical transaction. Well-designed business systems have escape commands in which privileged users (e.g., managers) can “violate” the general requirements and invariants of the system as necessary in order to deal with reality. [0002]
  • For preliminary diagnostic purposes, with the intent of eliminating “bugs” during software design, it is desirable to create models of the software which demonstrate where problems may occur in the finished product. Due to the nature of business applications, the behavior of fully-developed business applications is somewhat unpredictable and tends to be difficult to model. Nonetheless, given the fact that business applications are expensive to develop and use, and generally even more expensive to retrofit when bugs have been detected after the applications are in use, it is prudent to evaluate the applications in the early design to locate detectable defects by modeling the behavior of the application. The desire for detecting defects is realistically offset by the practicalities of modeling. Clearly not all behaviors can be checked unless the entire application is executed, which would be a prohibitively lengthy and intensive modeling process. [0003]
  • Model checking is a preferred method for formally evaluating the behavior of a business application. In model checking, such as is detailed in the publications entitled [0004] Model Checking by E. M. Clarke, et al , MIT Press, (Cambridge, Mass., 1999) and Model Checking Large Software Specifications by N. Carriero, et al, IEEE Transactions on Software Engineering, pages 498-519 (July 1998), a system is described as a finite-state model and a desired property of the system is expressed as a logical formula. Having the finite-state model and the logical formula, it can be determined whether the system has the desired property. While computationally complex applications cannot realistically be fully modeled, due to exponential expansion of the possible decision paths, many useful cases can be analyzed.
  • Ordered Boolean Decision Diagrams (OBDDs) have been a very successful approach to model checking, providing a compact canonical notation for Boolean expressions, in which all the basic operations are efficiently computable. The model must be phrased as Boolean formulas, for example, with the state s as a vector of Boolean variables, formulas St(s) describe the possible start states, and Trans(s,t) describing when the system can take a transition from s to t. The multi-step behavior of the system can then be computed from these (e.g., the set of reachable states is computed from the transitive closure: [0005]
  • {r |∃s .St (sTrans (s,t)). [0006]
  • Temporal logic formulas (e.g., Computation Tree Logic or CTL), can also be expressed as OBDDs. Checking whether or not the model satisfies the formula then becomes a matter of calculation. In many useful cases, OBDD calculations can be done quickly. This approach has verified properties of system with astounding numbers of states, currently up to 10[0007] 120 for well-designed systems and properties. Model checking with such systems, however, takes a significant amount of human work in setting up the problem. Therefore, while model checking has theoretical potential in many arenas, it has primary usefulness in the areas of protocol checking and circuit checking, wherein the models are inherently small and of regular structure. Model checking has had limited applicability in checking routine software.
  • With regard to software checking, model checking has been used not for verification but for so-called falsifying of properties, wherein selected bugs in the system can be targeted and found. For example, one may see if a protocol can deadlock or a memory management chip can lose a page. Clearly, these are important properties to identify and correct. Checking a handful of well-chosen properties can catch many errors, and can increase confidence that remaining errors are scattered and more benign. Some properties, however, may simply be too hard to check. [0008]
  • Additional shortcomings of model checking include the fact that the models must be kept as small as possible, due to the fact that even a bit or two in the wrong place can greatly increase computation time. By reducing model size, however, one necessarily sacrifices some degree of certainty that the model is adequate for its checking purposes. It must also be recognized that the real system (i.e., the business application being checked) is must larger than the model and that verification via the model which concludes that an application does not produce errors in its execution of four consecutive processes cannot predict that the application will not lock upon execution of the fifth process. [0009]
  • Therefore, it is desirable, and is an object of the present invention, to provide a method and apparatus for checking a business application for detectable defects in the early application design using model checking. [0010]
  • It is another object of the invention to provide a method and apparatus for applying model checking for verification of selected aspects of business application software. [0011]
  • Yet another object of the invention is to provide a method which gives a total, programmatic description of classes and activities of a business application as well as a partial, logical description of specifications therein. [0012]
  • SUMMARY OF THE INVENTION
  • The foregoing and other objectives are realized by the present invention comprising a system and method for determining if a business process satisfies certain properties, the method comprising building a model for the business process, the model comprising a plurality of actions each having a precondition and a postcondition, constructing specifications for the properties which describe both the states of the business process and the order in which they may occur, and determining if the model satisfies the specifications, wherein failure to satisfy the specifications indicates that the model (and the underlying business application) is problematic and requires some modification.[0013]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention will now be described in greater detail with specific reference to the appended drawings wherein: [0014]
  • FIG. 1 illustrates a chart of quantifiers which can be used with the present invention; [0015]
  • FIG. 2 illustrates the conversion from the inventive language to SMV; [0016]
  • FIG. 3 illustrates a process flow for implementing the inventive process; and [0017]
  • FIG. 4 illustrates a process flow for specifying a business process in the inventive language.[0018]
  • DETAILED DESCRIPTION OF THE INVENTION
  • To model business applications, it is first to be recognized that business software tends to be very data-driven. A great many human-computer interactions involve recording data, entering names and addresses on applications, recording boxes of supplies received at loading docks, etc. The program's decisions, and the decisions that it presents to users, are typically conditioned on data. For example, a travel reimbursement for less than $100/day might be automatically accepted and paid, whereas a more expensive one might need a manger's approval, and one for $1500/day might require a series of approvals at higher management levels. [0019]
  • Partially as a consequence of this, under the present invention, business data is multiply, dynamically categorized. Multiple categorization models the fact that a person might be an employee or a customer, both, or neither. Dynamic categorization captures the fact that a person can be hired or fired. Standard object models, even multiple inheritance models, don't capture this every well, since employee and customer cannot usefully be made subclasses of person in most programming languages. Nonetheless, experience suggests that multiple dynamic classification is a good way to think about and describe business data. [0020]
  • Business data can be described by Classes and Aspects. The Classes classify information such as person, employee, customer, male, female. Aspects group mutually exclusive sets of classes, for example person.gender includes male and female, and models the fact that a given person can be at most only one of the two at any instant. An aspect with only one element represents an option: for example, person.employment denotes the single aspect employee. An object may have classes in different aspects at the same time, such that a given person may be both an employee and a male. [0021]
  • Changing one class may trigger changes to others, for example firing an employee involves removing their employee classification. If x is a manager (and hence an employee), firing him removes his manager classification as well as his employee classification. Conversely, hiring someone to be a manager turns them into an employee as well. [0022]
  • Business decisions are generally guided or constrained by the categorization. Insurance policies have different behavior depending upon the gender, marital status, etc. A travel reimbursement form might have classifications including Submitted, Approved, Paid, which may track the progress of the form through the process, and LowPrice, NormalPrice, HighPrice, based on the amount being sought. When the form is Submitted and NormalPrice, it will be given to a Manager for approval; and, upon approval, will be switched to the Approved classification. [0023]
  • Models of business application have been built (cf: IS010746-2,IS010165-7) for explanation but not implemented. A system consists of a data model and a control model. Data is a collection of objects, together with some relationship between them. The objects are in a multiple dynamic classification hierarchy, they have many classes, and they can change classes as the application proceeds. The running example of the travel invoice processing system will be used as an example: [0024]
  • //Define a classification for travel forms . . . class TravelForms [0025]
  • //the status of a form tells where it is [0026]
  • //in the approval application aspect status:TravelForm; [0027]
  • class Submitted,Approved,Rejected:TravelForm.status; [0028]
  • //The cost of a form tells whether the amount [0029]
  • //being asked for is reasonable. [0030]
  • aspect cost:TravelForm; [0031]
  • class LowCost,MediumCost,HighCost:TravelForm.cost; [0032]
  • Once a form is Approved, it may at some point be Paid: [0033]
  • aspect payment: Approved; [0034]
  • Class Paid : Approved.status [0035]
  • Note that it is impossible for tf to be both Paid and Rejected. Paid is a subclassification of Approved, and Approved and Rejected are mutually exclusive. [0036]
  • The model also permits mappings (partial or total functions) and general relationships between entries. For example, a suitable definition of sets of objects TRAVELFORMS and PEOPLE is assumed. In some systems, these will simply be all entities of type TravelForm and Person. [0037]
  • //Relationship: who submitted the form? map submitter: (TRAVELFORM→PERSON, partial; [0038]
  • //Relationship: management rel manages:PERSON *PERSON; [0039]
  • //Also keep track of who approved what rel signedOffOn : TRAVELFORM→PERSON; [0040]
  • Control consists of a collection of activities, running asynchronously. An activity represents some agent (human or automated) using a subsystem, such as: a manager using the application to approve travel forms, a program evaluating applications and routing them to the correct people, and so on. Activities may correspond to highly abstracted versions of large subsystems (e.g., invocations of legacy applications). [0041]
  • Activities have preconditions under which they can execute and have outcomes. Outcomes perform some computation, thereby changing entity classifications and relationships. An activity may have several outcomes and some agent, human or computer, will choose one of the outcomes each time the activity is executed. Activities are assumed to be atomic, and non atomic events can be modeled as sequences of activities. For example: [0042]
    act judgeTravelForm (tf: TRAVELFORM, subm :PERSON
    appr: PERSON)
    pre
    (tf :MediumCost) & (tf: Submitted)
    & (submitter(tf) = subm
    & (manager(appr, subm))
    pick
    outcome DoAcceptance :>
    now tf : Approved, signedOffOn(tf, appr);
    outcome DoRejection :>
    now tf : Rejected;
    end-pick
    end-act
  • The judgeTravelForm activity applies to submitted, medium-cost travel forms. Once the traveler fills out the form, the result is an entity tf which is in state Submitted and MediumCost. When that happens, the activity may fire (i.e., proceed to the next step). Other activities may be enabled as well, of course. When an activity fires, one of two things will happen: the travel form may be approved with appr recorded as the one who approved it, or it may be rejected. [0043]
  • There is no explicit sequencing between activities; however, preconditions can provide implicit sequencing since one set of activities can wait for a condition that another one sets. [0044]
  • Once the model is defined, specifications may be added. The system will test them, and will report either that they are true or will give a (partial) counterexample. For example, it may be desirable that, if a travel form has not already been rejected, it might eventually be paid, as shown below: [0045]
    spec outcomeIsAlwaysPossible:>
    always, all tf: TF.
    ! (tf:Rejected) -> (somehow eventually tf:Paid);
  • The foregoing general style of model, allowing some flexibility in the details, has been quite useful in describing business application. The descriptions are quite abstract, describing data and computation fairly coarsely (for example, the actual cost of the trip will not be recorded at this point in the modeling). This methodology emphasizes recording the important criteria, the distinctions upon which the decisions are to be made, while suppressing details that will not be relevant until later in the implementation. [0046]
  • The model is good for describing business applications in a reasonable level of detail. The description can serve as a specification of the system, and can be a basis for a more detailed analysis. The act of description has value, for it forces people to think about their needs and requirements in detail. [0047]
  • The description of a complex system in necessarily inadequate since it is hard to understand or predict how the system as a whole will behave. The single-step behavior from a particular state is easy to understand since it is clear which activities and outcomes will fire (i.e., if A, then B). However, the multi-step behavior can be difficult to model (i.e., if A, then B or C or D; and if B, then Q, if C then R, and if D then S). Using the example of an online auction system, it is recognized that one activity may allow an administrator to stop an auction at any time, which is a crucial capability, particularly since an auction house must be able to deal summarily with illegal or immoral auctions. Other activities allow buyers to pay sellers on-line and for sellers to deliver digital auction items on-line. As an example, it would be unreasonable to have a system-wide requirement that an item must be delivered once paid for, since there may be instances (e.g., death of a seller) where such is unreasonable. It would be reasonable, though, to have a system requirement that the system not prevent a seller from sending a payed-for item. [0048]
  • Clearly the requirements in the foregoing examples, if formalized in the most obvious way, are inconsistent. If the administrator stops the auction after the buyer has paid and before the seller has delivered, then the seller cannot deliver. Such an issue is not hard to address once it has been identified. However, identifying it by looking at the specification for the application can be quite difficult, particularly because the relevant activities are only a few among dozens of candidate scenarios and are widely separated in terms of definition and anticipated reaction/result. Therefore, the foregoing is best characterized as a temporal specification, to wit, “If the buyer has paid and the seller has not delivered, then it is possible that the seller eventually delivers”. Note that the delivery need not be enabled at that instant, it must simply be possible at some future time. [0049]
  • It is, therefore, proposed that specifications at this level of development of the application are good subjects for model checking for the following reasons: fairly abstract models can be done at a size and degree of formality which is technologically suitable for symbolic model checking; the model of computation which is most suitable for describing business application is data-driven; and, model checking of business application specifications can occur early in the “lifecycle” of the application, thereby allowing for relatively easy and inexpensive correction. Since model checking research has largely focused on circuits and protocols, current languages are largely tuned for those domains. Therefore, a new language is needed which is aimed at describing business application in terms with which business application modelers are familiar. The language is constrained in ways that ensure that all specifications are finite state programs and thus checkable modulo resources which can be checked against CTL specifications or can be executed by hand in an interpreter. [0050]
  • The modeling language consists of definitions of data and activities, plus some specifications which should be checked. Data comprises entities and relationships. Entities are statically described as a multiple dynamic classification hierarchy, with classification and aspect definitions as detailed above. Object is the built-in root class; Object.sub is a built-in aspect of it used for subclasses in the object orientation (00) sense. To illustrate: [0051]
    class Person, Auctionable :Object.sub:
    aspect age, job, online: Person;
    class Adult : Person.age;
    // x is a child if x is not an adult
    class Buyer, Seller, Admin: Person.job;
    class On; Off: Person.online.
  • Entities must be declared explicitly, with permanent and initial classes given. This declares a Person, an Adult and Buyer who is initially Off(line). That person will stay an Adult and Buyer forever, but the online status may change. For example: [0052]
  • Entity Arwen:Adult, Buyer:=Off; [0053]
  • Entities may be grouped into domains, which are static structures used for abstraction. Domains can overlap and be heterogeneous. To illustrate: [0054]
  • Domain BUYER=(Arwen, Eleri) [0055]
  • Domain ADULT=(Arwen, Huw, Cefyn); [0056]
  • It is occasionally useful to have things in domains which are not entities, but which can be used in relations and maps, as shown below: [0057]
    nonentity CardiffBay; MountSnowdon;
    domain WELSHTHING = (Arwen, Eleri, Huw, Cefyn,
    CardiffBay, MountSnowdon);
  • The ordering of elements in a domain is significant. It is to be noted that entities do not have attributes or properties. Data about individual entities is expressed as classifications and data relating several entities is expressed as relations and maps. Relations and maps are essentially mutable versions of the mathematical constructs. To illustrate: [0058]
    rel owns: (PERSON, AUCTIONABLE);
    init (Arwen, CarvedSpoon);
  • defines the relationship owns, which will be used to model who owns what. Initially Arwen owns a carved spoon, though this may change as the system computes. Relations may be declared to be reflexive, irreflexive, symmetric, and/or unchanging. All of these declarations save bits in the model checker, and provide useful invariants that are automatically enforced. For example: [0059]
    rel nextTo: (PERSON, PERSON)
    irreflexive, symmetric;
  • describes who is next to whom. Nobody is next to themselves (hence the relation is reflexive); and if one person is next to another, the other is next to the one (hence it is symmetric). [0060]
  • Maps model total or partial functions, such as: [0061]
  • map owner:AUCTIONABLE→PERSON; [0062]
  • which is one way to say who currently owns what. Maps may be partial, unchanging, initialized, or have symmetries between selected sets of arguments, as shown below: [0063]
  • map spouse:PERSON→PERSON, partial; [0064]
  • The expressive language of the invention is tuned for writing specifications for modeling of business applications. The primitive expressions are directly related to the kinds of data: [0065]
    p = On // True iff p is logged on
    // (vix., if p has class On)
    P ! : Buyer//True if p is not the Buyer
    owns (p,q)//true if p owns q
    owner (q) = p //true if the owner of q is p
    spouse (p) = undefined //true if p has no spouse
    p= Arwen //true if p is Arwen
  • Domains are ordered, and the order can be queried. Since objects can belong to several domains, and may be in different orders in different domains, the domain of comparison must be specified. Comparisons also may be chained, as shown below: [0066]
  • p<Arwen<=q IN PEOPLE [0067]
  • Boolean expression are the heart of business applications, expressing the conditions under which an activity is available, or the requirements on the system, and can get quite complex. The Boolean operations for the present invention are designed to cut down on parentheses, redundant subexpressions, and visual ambiguity. [0068]
  • Six Boolean combinators are used, including &, |, →, and ⇄, for conjunction, disjunction, implication, and equivalence, as is usual in many systems. The others are n-ary operations: ABC . . . Z is true when precisely one of A,B,C . . . ,Z is true, and A#B#C# . . . #Z is true when at most one of them is true. These frequently need to be said in specifications, and are hard to say compactly and readably with only the standard operations. [0069]
  • Boolean implication and equivalence are not associative operations. The inventive language has a nonstandard but useful meaning for iterated → and ⇄. A→B→C is interpreted as (A→B) & (B→C), and similarly for ⇄. This allows specifying nested predicates, e.g., saying that the high bidder in an auction must have made some high bid in that auction, and that in turn means she has looked at the auction, as shown below [0070]
  • highBidderIn(b,a)→hasBidIn(b,a)→hasLookedAt(b,a) [0071]
  • Expressions of the form A & B|C look ambiguous. They are not ambiguous in any actual computer language, but it can be hard to remember which operation takes precedence, or which way it associates if neither takes precedence. It would be even harder to keep track of precedence relations among the six combinators. The inventive language does not allow this sort of visual ambiguity: A & B|C is syntactically illegal. (A & B)|C and A & (B|C) are legal, of course. [0072]
  • However, this could easily lead to masses of parentheses, unambiguous but confusing. The issue is addressed in two ways. First, braces { } and brackets [ ] are allowed, as well as parentheses. Second, and more interestingly, there are three precedence levels of the Boolean operations. && and &&& are conjunction, like &, but with medium and low precedence. So, A && B|C is allowed, and means A & (B|C), and A & B||C means (A & B)|C. A && B||C is illegal, just as A & B|C is. The low precedence operations are useful in long conditions, which usually consist of several joined clauses. To illustrate: [0073]
    item : MediumPrice | item : LowPrice
    // It's cheap
    &&& I ! : BoughtSomething
    // I haven't bought anything yet
    &&& I : LowOnCash -->
    item: LowPrice| have (I, GiftCertificate)
    // I can afford it!
  • These syntactic tools, if used with common sense, allow users to write complex Boolean expressions reasonably readably, without too many parentheses or ambiguous-looking clauses. [0074]
  • The invention also allows quantifications over domains, to wit: [0075]
  • (all x in PEOPLE, x: AWAKE). [0076]
  • Since domains are finite and fixed at compile time, quantification is a convenience rather than a qualitative necessity. There are five quantifiers, as are shown in the chart in FIG. 1, including some, all, no, one, and at-most-one. Quantifiers may work on subsets of their domain. For example: [0077]
  • one x : AUCTIONABLES such that owns (p,x), forSale(x) holds when exactly one auctionable item owned by p is for sale. [0078]
  • Quantifiers allow multiple variables, ordered or unordered. For example: [0079]
  • no x !+y : PERSON, x:HighBidder & y:HighBidder holds when there are not two people marked as HighBidder. [0080]
  • Comparisons, with respect to the domain of quantifications, may be used as well. For example: [0081]
  • some x<y : PERSON, canWorkTogether (x,y) holds if and only if some pair of distinct people can work together. A quantifier with !=would mean the same, but would induce an expression which would be twice as long. [0082]
  • There are activities which represent agents interacting with subsystems, typically making decisions. Each activity has a precondition, and a body of code. The body of code may include choices between several outcomes. Many things may be done at the same time, with the body being considered a sequence of transactions, each done atomically. The distinction between sequential and simultaneous composition is made very explicit. [0083]
  • Instantaneous commands are considered to happen atomically, as if executing inside a transaction. A great deal of computation can happen instantly with the present invention. The now command modifies entities' classifications, and maps and relations. [0084]
  • now Arwen: On //Change Arwen's class [0085]
  • now Huw!: Adult //Remove Huw's Adult class [0086]
  • now nextTo(Arwen, Huw); //set a relation [0087]
  • now !nextTo (Huw, Eleri); //remove a relation [0088]
  • now owner(CarvedSpoon)=Huw; //change a map [0089]
  • now spouse(Huw) =undefined; //Divorce Huw; [0090]
  • Looping and conditional branding have a fairly familiar syntax. Instantaneous commands may be executed simultaneously, modulo contradictions; with * (or “together-withs”) being used as the operator for simultaneous composition. So, when two people get married, they stop being married to everyone else. For example: [0091]
    now married(x,y)
    *
    for z = PERSON do
    if z != y then now !married(x,z) fi
    *
    if z != x then now !married(z,y) fi
    rof
  • Note that all the changes to married, including those from the different iterations of a loop are simultaneous. A single for can represent nested loops over related variables over the same domain. For example: [0092]
  • for x<y : PERSON do now !nextTo(x,y) rof moves everybody apart. Just as for quantifiers, it avoids repeated work, since each distinct pair is only considered once, and pairs where x=y are not considered at all. [0093]
  • Choices made by agents describe the possible transitions of the system. This models, for example, presenting the user with a form, and buttons marked “APPROVE” and “REJECT”. Some outcomes may be conditional, such that the APPROVE button may only be usable when the travel form is within corporate guidelines. Outcomes are named by way of documentation. Hence: [0094]
    pick
    outcome APPROVE when travelForm:MeetsGuidelines :>
    now travelForm:Approved
    outcome REJECT :> now travelForm:Rejected;
    end-pick
  • The inventive system only allows one choice to be made at a time. An activity can include several picks, separated by the sequencing operation AND-THEN. Sequencing is somewhat more expensive than simultaneous composition, so the invention provides a somewhat longer syntax for that. [0095]
  • Activities have preconditions which describe when they can be performed, plus bodies which are commands to be performed. [0096]
    act logOn(p: PERSON)
    pre p !: On;
    pick
    outcome successfulLogon :> now p:On;
    outcome failedLogonAttempt :> skip;
    end-pick
    end-act.
  • When the system is running, the activity is enabled when the precondition evaluates to true for some instantiation of the formal parameters with entities from the suitable domains. The rest of the activity is a sequence of instantaneous commands and pick commands, which may be executed as above. Only one activity will fire at a time. [0097]
  • Specifications are statements in branching temporal logic. The system checks each specification, printing a message that it is true, or hints at a counterexample when it is false. The semantics describe a program as a forking tree of states. At each state, some set of activities can fire. Each outcome of each enabled activity induces a transaction to another state. [0098]
  • The specification language uses CTL connectives to explore the tree. Each temporal modality has two parts. The first part quantifies over the set of possible next states; the second part is a temporal connective like “eventually”. CTL traditionally uses single letters for modalities. Background research suggested that few businessmen were instantly comfortable with “EF” and “AG”, therefore a more verbose but suggestive syntax is employed. [0099]
  • The branching component of a modality is either surely (CTL's A) or somehow (CTL's E). The temporal component may be henceforth (CTL's G), eventually (CTL's F), next (CTL's X), until (CTL's U), or until-maybe (a weak until, a derived operation in CTL). For example: [0100]
    spec CarvedSpoonCanBeBought :>
    somehow eventually, some p:PERSON
    hasBought (p,CarvedSpoon);
  • specifies that it is possible on some computation path (EF) to find a state where the carved spoon has been bought. Similarly, [0101]
    spec NobodyFixesCarvedSpoonIfTheyStartBroken :>
    CarvedSpoon:Broken ->
    (surely henceforth CarvedSpoon:Broken);
  • says that, if the carved spoon starts out broken, it will stay that way on all computation paths for all time (AG). There are also two combination modalities: forevermore=AG=surely henceforth, and possibly=EF=somehow eventually. [0102]
  • The inventive system and method also allows always as a synonym for AG, but only as the outer more temporal modality. Always is useful for specifying invariants. It is not allowed, however, in nested modalities, because it causes confusion whereby “always” is misinterpreted to mean “for all time, past as well as future” instead of the correct “for all future time”. For example: [0103]
    spec NobodyEverFixesCarvedSpoons :>
    // inner ‘always’ is illegal
    always (CarvedSpoon:Broken->
    always CarvedSpoon:Broken);
  • was misinterpreted as implying that if the carved spoon ever broke, it had to have been broken from the beginning. [0104]
    spec NobodyEverFixesCarvedSpoons :> //this is OK
    always (CarvedSpoon:Broken->
    forevermore CarvedSpoon:Broken);
  • The words “henceforth” and “forevermore”, though stilted, at least have fewer wrong connotations. [0105]
  • Temporal connectives may be nested. The example of NobodyEverFixesCarvedSpoons is a typical nesting for a monotonicity property; once a certain fact (CarvedSpoonBroken) has been established, it remains true forever after. Other nestings are useful as well, as shown below: [0106]
    spec SubmittedFormsCanGetPaid :>
    always, all f:TravelForm,
    f:Submitted & f !: Rejected -->
    (possibly f:Paid);
  • says that, in any state in which a travel form has been submitted, and hasn't been rejected, there is some computation path which can lead to it getting paid. [0107]
  • The travel form example is one of the smallest useful business applications which can readily be used as an example. One person, the traveler, fills out a form after going on a trip. His manager must approve or reject it. The manager may pass the form along to the manager's manager instead. The top manager of the organization cannot pass the form further along, of course. [0108]
  • The travel form object is described as follows. It has states including FilledOut, Submitted, Approved, and Rejected. The states Approved and Rejected are implemented as subclasses of the state Submitted because a form can only be approved or rejected after it has been submitted. To illustrate: [0109]
  • class TravelForm:Object.sub; [0110]
  • aspect filledOutNess. Status:TravelForm; [0111]
  • class FilledOut:TravelForm.filledOutNess [0112]
  • class Submitted:TravelForm.status [0113]
  • aspect status:Submitted; [0114]
  • class Approved, Rejected:Submitted.status; [0115]
  • The two aspects are connected by an invariant, if a form is approved, it must be filled out, such that: [0116]
    spec onlyFilledOutFormsAreApproved :>
    always, all tf:TF, tf:Approved -> tf:FilledOut;
  • People, too, are given a very small description, they are either managers or not for this exercise. For an example, there are four people, as shown below: [0117]
  • class Person:Object.sub; [0118]
  • aspect management:Person; [0119]
  • class Manager:Person.management; [0120]
  • entity Arwen:Person:=Person; [0121]
  • entity Bran:Person:=Manager; [0122]
  • entity Cefyn:Person:=Manager; [0123]
  • entity Dafyd:Person Manager; [0124]
  • domain PERSON=(Arwen, Bran, Cefyn, Dafyd); [0125]
  • The actual management hierarchy is expressed as a relation, as shown below: [0126]
    rel manages : (PERSON, PERSON), irreflexive,
    init (Bran, Arwen), (Cefyn, Bran), (Dafyd, Cefyn);
  • Additionally provided is an invariant which ensures that only Managers actually manage people. It has been found to be extremely valuable to write this sort of invariant to explain the intended meaning of the pieces of the model. Accordingly, [0127]
    spec onlyManagersManage :>
    always all p: PERSON,
    (some q:PERSON, manages (p,Q)) -->p:Manager;
  • Travelers are then connected to travel forms, as shown below: [0128]
  • domain TRAV=[Arwen, Bran]; //Persons who travel [0129]
  • entity tfa:TravelForm TravelForm; [0130]
  • entity tfb:TravelForm:=TravelForm; [0131]
    domain TF = [tfa, tfb]: // Their travel forms.
    rel owns : (TRAV, TF);
    init (Arwen, tfa), (Bran, tfb);
  • After a form has been submitted, someone will judge it. This relationship has an invariant as well, since at most one person may be judging the form at a given time. Accordingly: [0132]
    rel judging : (PERSON, TF);
    spec onlyOneJudge :>
    (surely henceforth, all tf:TF,
    at-most-one p : PERSON,
    judging (p, tf));
  • Travel forms may be filled out, as characterized below: [0133]
    act fillOut(p : TRAV, tf : TF)
    pre tf !: FilledOut;
    now tf : FilledOut;
    end-act;
  • Further, once the travel forms are filled out, they may be submitted to the traveler's Manager, as follows: [0134]
    act submit (p : TRAV,tf:TF, mgr, PERSON)
    pre tf : FilledOut && owns(p,, tf)
    && tf !: Submitted && manages (mgr, p);
    now tf:submitted, judging(mgr, tf);
    end-act;
  • The conjunct tf !: Submitted prevents a form from being submitted repeatedly. [0135]
  • An auxiliary relation is used to represent the act of one manager “passing the buck” to another manager. The term confusedBy (Bran, tfa) indicates that Bran has just given up on travel form A in confusion and that Bran's manager Cefyn must now judge the form. The term: [0136]
  • rel confusedBy:(PERSON, TF); [0137]
  • shows the buck passing. [0138]
  • The main activity of the application is when some manager mgr judges some travel form tf. This can only happen when the manager is the one judging the travel form, and when no judgment has been made on the form. The manager may choose to approve or reject it, or choose to pass the buck. However, people who have no managers cannot pass the buck, therefore, the confusing outcome has an extra test, as shown below: [0139]
    set judge (mgr : PERSON, tf : TF)
    pre judging(mgr, tf) && tf !: Approved
    & tf !: Rejected:
    pick
    outcome good :>
    now !judging(mgr, tf), tf: Approved
    outcome bad :>
    now !judging(mgr, tf), tf: Rejected
    outcome confusing
    when (some sup : PERSON, manages(sup,mgr)) :>
    now !judging(mgr, tf), conductedBy(mgr, tf);
    end-pick
    end-act;
  • When one person is confused by tf, then that person's manager must pick tf up and start working on it. Simultaneously, the confusion flag is turned off. To illustrate: [0140]
    act pickUp (mgr : PERSON, tf:TF)
    pre (some p: PERSON)
    (manages(mgr, p) & confusedBy(p, tf)));
    now judging(mgr,tf);
    //these two things happen at once.
    for q : PERSON do
    now !confusedBy(q,tf): //unconfuse everyone
    rof
    end-act.
  • At this point, a number of useful specifications are possible. Further program invariants may be asserted, such as that nobody is simultaneously listed as judging and confused by a form, and that nobody should ever judge their own form. This is conveniently expressed with the “at most one of” operation #, shown below: [0141]
    spec onlyOneUseOfForm:>
    [surely henceforth, all p: PERSON, all tf:TF,
    owns (p,tf) # judging(p, tf) # confusedBy(p, tf) ];
  • A more crucial property of the system is that it never gets stuck. Real approval systems have been known to violate this property. Specifically, it should always be the case that a travel form can get approved or rejected, as is shown below: [0142]
    spec formsCanAlwaysGetDealtWith :>
    (surely henceforth,
    all tf : TF,
    somehow eventually.
    tf:Approved | tf:Rejected
    );
  • It is also useful to have specifications to check intuition. Specifically, in the running example, while it seems obvious that the “buck” can be passed, it must be actually possible and the specification should test to make sure that the top manager might have to deal with the form. For example: [0143]
    spec maybeDafydHasToDoIt :>
    (somehow eventually, judging(Dafyd, tfa));
  • The inventive approach to specifications has been applied to cover aspects of program behavior including a few variants, and a few properties for diagnosis. As the model was being developed in testing, several times a specification was violated. Violation of a specification can indicate any one of the following: that there is a problem in the business process, such as a missing precondition on an activity; that there may be a problem in the specification itself, indicating a problem in the specification writers' understanding of the business application being evaluated; or, that there was a false positive which indicates that the business process is incomplete. [0144]
  • Working with the model checker gives a sense of confidence in the business process. Ordinary business process models give only a single description of the business process. The present model provides both a total, programmatic description of classes and activities and a partial, logical description of specifications. Getting the two descriptions to agree reveals a number of bugs and omissions. While the final application may still have some undiagnosed bugs and omissions, there is some assurance that the system will at least exhibit some desirable behaviors in spite of bugs. [0145]
  • Also, model checking provides a useful form of regression testing. Once a problem has been identified and solved and recorded as a spec, the system will continue to test it as the system evolves. So, the problem will either stay solved or the system will alert the user that it has “become” unsolved again. [0146]
  • The example also allows system exploration. For example, if a personnel subsystem is added, which allows hiring, firing, promotion, and demotion, it must be recognized that several of these functions will break the travel reimbursement process. In the running example, if Cefyn is demoted at the same time that Bran is confused by a travel form, the travel form could fall between the cracks. The system specs will detect the problem so that when organizational structure changes, suitable measures can be taken to update unfinished processes. [0147]
  • The so-called Strix inventive language has been implemented only as tylluan, a version of which was written explicitly for the invention yet translates correctly back to tylluan. The differences are largely syntactic (e.g., tylluan does not have chained variables in quantifiers or multiple picks in a single activity). The system has a straightforward parser written in javacc; the parsed program is translated to SMV, and run through the existing SMV model checker. [0148]
  • SMV is a BDD-based checker. Described herein are only the features which are used, and the SMV language description is mixed with the description of the translation. An SMV program consists of a number of modules, each of which declares some variables, and describes a part of the transition relation. Scalar variables may have Boolean or symbolic values from some fixed set; variables can also be instances of modules. [0149]
  • The inventive classes become SMV modules, used to aggregate data. SMV has no inheritance, so each class becomes a distinct SMV module, with local variables for each bit of data that the class might need. For example, the inventive language/process translates the person type by a module cls-person, with variables for the person's management and importance. These variables range over codes for all the subtypes in the management and importance aspects of person (e.g., the manager class is represented here by id-person-management-Manager-and another value for the case that the object has no classification in that aspect). Modules take formal parameters which are used to provide the initial values of these variable. Each module defines a part of the state-transition relation. The init( . . . ) assignments provide initial values for the variables; next( . . . ) assignments describe how variables change state across transitions. To illustrate in code: [0150]
    MODULE cls-Person(formal-Person-management, formal-
    Person-importance)
    VAR
    v-Person-management : (none-Person-management,
    id-Person-management-Manager)
    v-Person-importance : (none-Person-importance,
    id-person-management-VIP);
    ASSIGN
    init(v-Person-management) := formal-Person-
    management
    next (v-Person-management) := v-Person-management;
    init (v-Person-importance) := formal-Person-
    importance;
    next(v-Person-importance) := v-Person-importance
  • Instances of classes are declared as variables of the main program, initialized suitably. For example: [0151]
    VAR
    Arwen : cls-Person(none-Person-management,
    None-Person-importance)
  • System activities are converted to SMV modules used as asynchronously-parallel subprocesses. One transaction for the fillout process looks like the following: [0152]
    MODULE proc-fillOut(tfa)
    DEFINE
    precond := tfa.v-TravelForm-filledOutNess=id-
    TravelForm-filledOutNess-FilledOut;
    ASSIGN
    next(tfa.v-TravelForm-filledOutNess) := case
    precond : id-TravelForm-filledOutNess-
    FilledOut;
    !precond: tfa.v-TravelForm-filledOutNess;
    //***
    esac;
  • The DEFINE clause names an expression. The case expression is a conditional expression, taking the first branch whose condition is true. [0153]
  • There is no separate concurrent composition construct in SMV. Concurrent processes are module instances marked by the process keyword, as shown below: [0154]
  • VAR p-filledout-tfa:process proc-filledOut(tfa) [0155]
  • As an additional complexity, the parameters of an SMV module are bound at compile time, not run time. Therefore, an instance of each SMV process must be started for each possible assignment of arguments. The fillOut activity takes a TRAV and a TF as arguments, so |TRAV|X|TF| process instances will be needed. The translation can thus get extremely expensive, creating vase numbers of processes very quickly. [0156]
  • Each instance of each outcome of an activity defined by the inventive language/process turns into a separate SMV process. Therefore SMV fairness constraints are needed saying that each activity is allowed to run infinitely often. (Note that, if an activity's preconditions are not satisfied, running the corresponding SMV process does not changes anything, see the *** line above. [0157]
  • Each relation is implemented by a module, the manages relation by the rel-manages module. In code: [0158]
    MODULE rel-manages
    VAR
    at-Arwen-Bran: boolean;
    // ...
    at-Bran-Arwen: boolean;
    // ...
    ASSIGN
    init(at-Arwen-Bran) :=0;
    next(at-Arwen-Bran) :=at-Arwen-Bran;
    //...
    init(at-Bran-Arwen) := 1;
    next) at-Bran-Arwen) := at-Bran-Arwen;
  • The relation module is used entirely for holding data. Queries on the relation become SMV accesses to members: manages(Bran-Arwen) becomes manages.at-Bran-Arwen, and changes to the relation become assignments to members. Note that each vector of arguments costs one bit. The reflexivity and symmetry conditions eliminate possible vectors of arguments (e.g., sorting them, so that married(Bran-Arwen) and married(Arwen-Bran) would be stored as at-Arwen-Bran), and thus conserve bits. Unchanging relations are compiled away completely. [0159]
  • Basic expressions become the natural calculations on SMV data (e.g., tf:approved becomes (tf.v-Submitted-status=Id-Submitted-status-Approved)). SMV has many of the boolean connectives which are used above. The others can be programmed (e.g., ABCD is translated as !(A&B) & !(A&C) & !(A&D) & !(B&C) & !(B&D) & !(C&D) & (A|B|C|D), where the last clause requires that at least one of the expressions be true, and the others say that no two are true. [0160]
  • Quantifiers are expanded. The inventive domains are fixed and known at compile time. For example, suppose DOM=[a,b,c], (all x:DOM, p(x)) will be translated as (p(a) & p(b) & p(c)). The translations for one and at-most-one are quadratic, as are the translations of and #. [0161]
  • Both languages uses CTL as their underlying temporal logic. Translation of temporal modalities is mostly a matter of turning surely into A and henceforth into G. The inventive language has the weak until-p-until-maybe q holds when p remains true until q first becomes true, or forever if q never becomes true-but that is easily expressed in CTL. Each of the inventive specifications therefore becomes one SMV specification. The conversion is illustrated in pseudo-code in FIG. 2 with the inventive language being referred to as STRIX. [0162]
  • When SMV determines whether a spec is satisfied or not, it prints out the first few characters. It also prints out a counterexample for unsatisfied specs. Since an SMV program may have many specs, and since the specs that SMV uses may look quite different from the inventive language forms, in extreme case, the first few characters of the SMV spec may be all “(''s—a module is defined called “spec” with constants for each specification name, and include that constant as the first conjunct of the specification: [0163]
  • MODULE spec [0164]
  • DEFINE onlyManagersManage:=1; [0165]
  • Model checking engines are based on NP-hard problems, and are quite sensitive to their inputs. Adding an entity or an activity may increase the running time from a few seconds to a few hours to a few eons. Experience with the language has lead to a number of programming patterns that sometimes can turn it back from hours to seconds. [0166]
  • Each vector of possible arguments to an activity generates one SMV process. So, the number of processes can be as bad as the product of the sizes of the domains. The language does no compile-time analysis, if the precondition of an activity instance can be determined to be false, then it does not generate a process for it. It is generally worth cutting down on the number of formal parameters to an activity. The “confusedBy” relation, with the pickup activity that it triggers, is programmatic way to avoid a third argument in the judge activity. In the travel form example with four people, the three-argument version takes about twice as long. Similarly, a for loop is used to turn off confusedBy(q,tf) for all possible “confuses” q, rather than mentioning the one person who was actually confused as an argument. [0167]
  • SMV does not simply calculate whether a spec is true or false. If it is false, SMV attempts to produce a counterexample, in the form of a trace of the system execution which violates the spec. Some specifications, of course, do not have counterexample traces. For example, a counterexample to forevermore x:Blue is a trace leading to a state in which x is not Blue, but no single trace is a good counterexample for possibly x: Blue. [0168]
  • SMV also produces counterexample traces in terms of SMV variables and processes. The translation scheme is as transparent as possible, such that the name of the SMV process is built from the name of and binding of the inventive language process. [0169]
  • The inventive checking process is applied by the process flow which is illustrated in FIG. 3. The first step, at [0170] 301, is building a model for the business process, the model comprising a plurality of actions each having a precondition and a postcondition. Next, specifications for the properties which describe both the states of the business process and the order in which they may occur are constructed at step 302 (further detailed with reference to FIG. 4). With the model and specifications in place, the final step is determining if the model satisfies the specifications, wherein failure to satisfy the specifications indicates that the model (and the underlying business application) is problematic and requires some modification. The determination is made at decision box 303. If the specifications are satisfied, as indicated by the YES response, then the process exits at 304. If however, the specification are not satisfied, as shown by a NO out of decision box 303, then a problem is indicated to the user/system by notification in step 305. In an automated version of the system, discussed below, a series of iterations may be conducted with variations on the model or the specification being invoked to more definitively locate the source of potential problems.
  • FIG. 4 provides a process flow for specifying a business process. At [0171] step 401, objects are described using a dynamic, multi-classification model as detailed above. At step 402, the system describes actions that can take place in terms of the classifications of the potential objects used in the action. Next, it is described, at step 403, how the classification of objects may change during actions (e.g., the buck passing example). Finally, an application is generated that ensures that actions take place when valid, at step 404. Clearly, once the language for the business application has been specified, one can utilize that as a precondition for performing model checking, as well as for writing the execution engine for the application.
  • The invention provides the language for modeling business applications and the process for specifying the business process. Additionally, the invention provides the process for using model-checking technology to verify temporal-logic specifications. The language is tuned for the issues and concepts of relevance to high-level business analysis. While the inventive language is not a general-purpose programming language, the programs are executable, either with or without user intervention. The language interpreter will have panes to show the classification hierarchies and relationships of all the entities, and a list of activities and their outcomes that can fire. This lets the user execute and explore the model. For extra ability to explore, the interpreter should allow saving and restoring system states, and going backward as well as forward. [0172]
  • One embodiment which is particularly desirable is doing simulation running the program automatically, making random choices of activity and outcome. If the activities and outcomes are annotated by costs and probabilities, the program can be run without human intervention and the cost of the process can be estimated. The simulator should be quite efficient, making hundreds of runs per second, accumulating statistics about the system's costs and bottlenecks. [0173]
  • The invention has been described with specific reference to several preferred implementations. It is to be understood that modifications can be made without departing from the spirit and scope of the invention as set forth in the appended claims. [0174]

Claims (20)

Having thus described the invention, what is claimed is:
1. A method for determining if a business process satisfies certain properties, said method comprising the steps of:
building a model for the business process, the model comprising a plurality of actions each having at least one of a precondition and a postcondition;
constructing specifications for the properties, said specifications indicating both the states of the system and the order in which they may occur; and
determining if the model satisfies the specifications.
2. The method of claim 1 wherein said constructing specifications comprises consructing specifications in temporal logic for said model.
3. The method of claim 1 wherein failure to satisfy the specifications properties indicates a problem and wherein said method further comprising modifying at least one of said model, said business process, and said specifications to eliminate said problem.
4. The method of claim 1 wherein said determining if the model satisfies the specifications comprises the steps of:
comparing the outcomes of each of said plurality of actions to said specifications; and
verifying that said outcomes do not violate said states and said order.
5. The method of claim 1 wherein said constructing specifications for the properties comprises the steps of:
describing objects in multiple, dynamic classifications;
describing process actions in terms of the classifications of the objects used in the actions; and
describing how the classifications of objects change during actions.
6. The method of claim 5 wherein said describing objects comprises expressing data about individual objects in classification and expressing data about several entities in terms of relationships and maps.
7. The method of claim 1 wherein said determining if said model satisfies said specifications comprises running said specifications through an SMV model checking.
8. The method of claim 7 further comprising converting said specifications to SMV language prior to said running.
9. The method of claim 1 further comprising building an execution engine for said business process.
10. A method of specifying a business process comprising the steps of:
describing a multiple, dynamic classification scheme for objects; and
describing actions of the business process, each action having preconditions on the classifications of objects involved in the action, and specifying how objects' classifications change with performance of the action.
11. The method of claim 10 further comprising the step of generating an application that ensures that actions take place when valid.
12. The method of claim 10 further comprising building an execution engine for said business process.
13. A method for checking a business process for operating on a plurality of objects, said process being capable of attaining a plurality of states, comprising the steps of:
describing objects of said process using a dynamic multi-classification model;
describing actions that can take place in said process in terms of the classifications of the objects used in said actions;
describing how the classification of objects changes during actions; and
determining whether selected states of the business process are reachable based on said actions.
14. A program storage device readable by machine tangibly embodying a program of instructions executable by said machine for performing a method of determining if a business process satisfies certain properties, said method comprising the steps of:
building a model for the business process, the model comprising a plurality of actions each having at least one of a precondition and a postcondition;
constructing specifications in temporal logic for said model; and
determining if the model satisfies the specifications.
15. A program storage device readable by machine tangibly embodying a program of instructions executable by said machine for performing a method for specifying a business process, said method comprising the steps of:
describing a multiple, dynamic classification scheme for objects; and
describing actions of the business process, each action having preconditions on the classifications of objects involved in the action, and specifying how objects' classifications change with performance of the action.
16. The program storage device of claim 15 wherein said method further comprises the step of generating an application that ensures that actions take place when valid.
17. The program storage device of claim 15 wherein said method further comprises building an execution engine for said business process.
18. A program storage device readable by machine tangibly embodying a program of instructions executable by said machine for performing a method for checking a business process for operating on a plurality of objects, said process being capable of attaining a plurality of states, said method comprising the steps of:
describing objects of said process using a dynamic multi-classification model;
describing actions that can take place in said process in terms of the classifications of the objects used in said actions;
describing how the classification of objects changes during actions; and
determining whether selected states of the business process are reachable based on said actions.
19. A system for determining if a business process satisfies certain properties, comprising:
at least one building component for building a model for the business process, the model comprising a plurality of actions each having at least one of a precondition and a postcondition;
at least one specificatin component for constructing specifications for the properties, said specifications indicating both the states of the system and the order in which they may occur; and
at least one processing component for determining if the model satisfies the specifications.
20. A system for specifying a business process comprising the steps of:
at least one component for describing a multiple, dynamic classification scheme for objects; and
at least one component for describing actions of the business process, each action having preconditions on the classifications of objects involved in the action and for specifying how objects' classifications change with performance of the action.
US10/201,114 2001-07-23 2002-07-22 Method and apparatus for providing symbolic mode checking of business application requirements Abandoned US20030167182A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US10/201,114 US20030167182A1 (en) 2001-07-23 2002-07-22 Method and apparatus for providing symbolic mode checking of business application requirements
US12/544,933 US10310819B2 (en) 2001-07-23 2009-08-20 Method and apparatus for providing symbolic mode checking of business application requirements
US12/545,275 US20090313073A1 (en) 2001-07-23 2009-08-21 Method and apparatus for providing symbolic mode checking of business application requirements

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US30719001P 2001-07-23 2001-07-23
US10/201,114 US20030167182A1 (en) 2001-07-23 2002-07-22 Method and apparatus for providing symbolic mode checking of business application requirements

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US12/544,933 Division US10310819B2 (en) 2001-07-23 2009-08-20 Method and apparatus for providing symbolic mode checking of business application requirements
US12/545,275 Division US20090313073A1 (en) 2001-07-23 2009-08-21 Method and apparatus for providing symbolic mode checking of business application requirements

Publications (1)

Publication Number Publication Date
US20030167182A1 true US20030167182A1 (en) 2003-09-04

Family

ID=27807506

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/201,114 Abandoned US20030167182A1 (en) 2001-07-23 2002-07-22 Method and apparatus for providing symbolic mode checking of business application requirements
US12/544,933 Expired - Lifetime US10310819B2 (en) 2001-07-23 2009-08-20 Method and apparatus for providing symbolic mode checking of business application requirements
US12/545,275 Abandoned US20090313073A1 (en) 2001-07-23 2009-08-21 Method and apparatus for providing symbolic mode checking of business application requirements

Family Applications After (2)

Application Number Title Priority Date Filing Date
US12/544,933 Expired - Lifetime US10310819B2 (en) 2001-07-23 2009-08-20 Method and apparatus for providing symbolic mode checking of business application requirements
US12/545,275 Abandoned US20090313073A1 (en) 2001-07-23 2009-08-21 Method and apparatus for providing symbolic mode checking of business application requirements

Country Status (1)

Country Link
US (3) US20030167182A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114164A1 (en) * 2003-11-26 2005-05-26 Lyons Stephen J. Method of and system for coordinating events between applications of a customer relationship management system
US20070157180A1 (en) * 2005-12-30 2007-07-05 Microsoft Corporation Approximating finite domains in symbolic state exploration
US20090313091A1 (en) * 2001-07-23 2009-12-17 International Business Machines Corporation Method and apparatus for providing symbolic mode checking of business application requirements
US20100179847A1 (en) * 2009-01-15 2010-07-15 International Business Machines Corporation System and method for creating and expressing risk-extended business process models
WO2011149553A1 (en) * 2010-05-27 2011-12-01 The Mathworks, Inc. Partitioning block diagrams into executable contextual models
US20150012475A1 (en) * 2012-03-29 2015-01-08 Fujitsu Limited Determination method, system and recording medium
US10318653B1 (en) 2015-02-26 2019-06-11 The Mathworks, Inc. Systems and methods for creating harness models for model verification
CN110311902A (en) * 2019-06-21 2019-10-08 北京奇艺世纪科技有限公司 A kind of recognition methods of abnormal behaviour, device and electronic equipment
US10521197B1 (en) 2016-12-02 2019-12-31 The Mathworks, Inc. Variant modeling elements in graphical programs
US10657208B2 (en) 2010-05-27 2020-05-19 The Mathworks, Inc. Analyzing model based on design interest
US10719645B1 (en) 2010-05-27 2020-07-21 The Mathworks, Inc. Model structure analysis with integration of transformed slice
US20210217097A1 (en) * 2015-09-30 2021-07-15 Sensormatic Electronics, LLC Sensor based system and method for augmenting underwriting of insurance policies
US11829689B1 (en) 2020-06-09 2023-11-28 The Mathworks, Inc. Systems and methods for creating variant regions in acausal simulation models

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080133293A1 (en) * 2006-07-05 2008-06-05 Gordon K Scott Method for producing on-time, on-budget, on-spec outcomes for IT software projects
US8831926B2 (en) * 2012-05-11 2014-09-09 Dassault Systemes Simulia Corp. Verification of cyber-physical systems using optimization algorithms
US10169291B2 (en) * 2016-05-23 2019-01-01 International Business Machines Corporation Reusable modeling for solving problems
CN110752939B (en) * 2018-07-24 2022-09-16 成都华为技术有限公司 Service process fault processing method, notification method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5019961A (en) * 1989-04-05 1991-05-28 Cadware, Inc. Computer apparatus and method for logical modelling
US5490097A (en) * 1993-03-22 1996-02-06 Fujitsu Limited System and method for modeling, analyzing and executing work process plans
US6289502B1 (en) * 1997-09-26 2001-09-11 Massachusetts Institute Of Technology Model-based software design and validation
US6393386B1 (en) * 1998-03-26 2002-05-21 Visual Networks Technologies, Inc. Dynamic modeling of complex networks and prediction of impacts of faults therein
US20020169658A1 (en) * 2001-03-08 2002-11-14 Adler Richard M. System and method for modeling and analyzing strategic business decisions
US20020178423A1 (en) * 2001-01-12 2002-11-28 International Business Machines Corporation Time-memory tradeoff control in counterexample production
US7120568B1 (en) * 1999-09-23 2006-10-10 Marvell Semiconductor Israel Ltd. Identification of missing properties in model checking

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5734837A (en) * 1994-01-14 1998-03-31 Action Technologies, Inc. Method and apparatus for building business process applications in terms of its workflows
US5768498A (en) * 1996-01-23 1998-06-16 Lucent Technologies Protocol verification using symbolic representations of queues
DE69719269T2 (en) * 1996-08-01 2003-10-30 International Business Machines Corp., Armonk Ensuring indivisibility for a collection of transactional work steps in a workflow management system
US6216098B1 (en) * 1997-04-30 2001-04-10 Institute For Research On Learning Simulating work behavior
US6405159B2 (en) * 1998-06-03 2002-06-11 Sbc Technology Resources, Inc. Method for categorizing, describing and modeling types of system users
US6308163B1 (en) * 1999-03-16 2001-10-23 Hewlett-Packard Company System and method for enterprise workflow resource management
US6789252B1 (en) * 1999-04-15 2004-09-07 Miles D. Burke Building business objects and business software applications using dynamic object definitions of ingrediential objects
US6662355B1 (en) * 1999-08-11 2003-12-09 International Business Machines Corporation Method and system for specifying and implementing automation of business processes
US7289964B1 (en) * 1999-08-31 2007-10-30 Accenture Llp System and method for transaction services patterns in a netcentric environment
US6725431B1 (en) * 2000-06-30 2004-04-20 Intel Corporation Lazy symbolic model checking
US7925527B1 (en) * 2000-08-16 2011-04-12 Sparta Systems, Inc. Process control system utilizing a database system to monitor a project's progress and enforce a workflow of activities within the project
US7503032B2 (en) * 2001-06-15 2009-03-10 International Business Machines Corporation Method and framework for model specification, consistency checking and coordination of business processes
US20030167182A1 (en) * 2001-07-23 2003-09-04 International Business Machines Corporation Method and apparatus for providing symbolic mode checking of business application requirements
US20040103396A1 (en) * 2002-11-20 2004-05-27 Certagon Ltd. System for verification of enterprise software systems
US20050187809A1 (en) * 2004-01-15 2005-08-25 Falkenhainer Brian C. Adaptive process systems and methods for managing business processes
US8209667B2 (en) * 2006-01-11 2012-06-26 International Business Machines Corporation Software verification using hybrid explicit and symbolic model checking
US20070244910A1 (en) * 2006-04-12 2007-10-18 Microsoft Corporation Business process meta-model
US20090222249A1 (en) * 2008-03-03 2009-09-03 Nec Laboratories America, Inc. Modular verification of web services using efficient symbolic encoding and summarization

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5019961A (en) * 1989-04-05 1991-05-28 Cadware, Inc. Computer apparatus and method for logical modelling
US5490097A (en) * 1993-03-22 1996-02-06 Fujitsu Limited System and method for modeling, analyzing and executing work process plans
US6289502B1 (en) * 1997-09-26 2001-09-11 Massachusetts Institute Of Technology Model-based software design and validation
US6393386B1 (en) * 1998-03-26 2002-05-21 Visual Networks Technologies, Inc. Dynamic modeling of complex networks and prediction of impacts of faults therein
US7120568B1 (en) * 1999-09-23 2006-10-10 Marvell Semiconductor Israel Ltd. Identification of missing properties in model checking
US20020178423A1 (en) * 2001-01-12 2002-11-28 International Business Machines Corporation Time-memory tradeoff control in counterexample production
US20020169658A1 (en) * 2001-03-08 2002-11-14 Adler Richard M. System and method for modeling and analyzing strategic business decisions

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090313091A1 (en) * 2001-07-23 2009-12-17 International Business Machines Corporation Method and apparatus for providing symbolic mode checking of business application requirements
US10310819B2 (en) * 2001-07-23 2019-06-04 International Business Machines Corporation Method and apparatus for providing symbolic mode checking of business application requirements
US20050114164A1 (en) * 2003-11-26 2005-05-26 Lyons Stephen J. Method of and system for coordinating events between applications of a customer relationship management system
US20070157180A1 (en) * 2005-12-30 2007-07-05 Microsoft Corporation Approximating finite domains in symbolic state exploration
US8533680B2 (en) * 2005-12-30 2013-09-10 Microsoft Corporation Approximating finite domains in symbolic state exploration
US10275730B2 (en) 2009-01-15 2019-04-30 International Business Machines Corporation Method for creating and expressing risk-extended business process models
US20100179847A1 (en) * 2009-01-15 2010-07-15 International Business Machines Corporation System and method for creating and expressing risk-extended business process models
US8862491B2 (en) * 2009-01-15 2014-10-14 International Business Machines Corporation System and method for creating and expressing risk-extended business process models
US10691578B2 (en) 2010-05-27 2020-06-23 The Mathworks, Inc. Deriving contextual information for an execution constrained model
US10657208B2 (en) 2010-05-27 2020-05-19 The Mathworks, Inc. Analyzing model based on design interest
US8812276B2 (en) 2010-05-27 2014-08-19 The Mathworks, Inc. Determining model components suitable for verification analysis
US10719645B1 (en) 2010-05-27 2020-07-21 The Mathworks, Inc. Model structure analysis with integration of transformed slice
WO2011149553A1 (en) * 2010-05-27 2011-12-01 The Mathworks, Inc. Partitioning block diagrams into executable contextual models
US10657029B2 (en) 2010-05-27 2020-05-19 The Mathworks, Inc. Partitioning block diagrams into executable contextual models
US20150012475A1 (en) * 2012-03-29 2015-01-08 Fujitsu Limited Determination method, system and recording medium
US9971968B2 (en) * 2012-03-29 2018-05-15 Fujitsu Limited Determination method, system and recording medium
US10318653B1 (en) 2015-02-26 2019-06-11 The Mathworks, Inc. Systems and methods for creating harness models for model verification
US20210217097A1 (en) * 2015-09-30 2021-07-15 Sensormatic Electronics, LLC Sensor based system and method for augmenting underwriting of insurance policies
US10545731B1 (en) 2016-12-02 2020-01-28 The Mathworks, Inc. Variant modeling elements in graphical programs
US10521197B1 (en) 2016-12-02 2019-12-31 The Mathworks, Inc. Variant modeling elements in graphical programs
US10866789B1 (en) 2016-12-02 2020-12-15 The Mathworks, Inc. Variant modeling elements in graphical programs
US11126407B1 (en) 2016-12-02 2021-09-21 The Mathworks, Inc. Variant modeling elements in graphical programs
US11360747B1 (en) 2016-12-02 2022-06-14 The Mathworks, Inc. Variant modeling elements in graphical programs
US11409504B1 (en) 2016-12-02 2022-08-09 The Mathworks, Inc. Variant modeling elements in graphical programs
CN110311902A (en) * 2019-06-21 2019-10-08 北京奇艺世纪科技有限公司 A kind of recognition methods of abnormal behaviour, device and electronic equipment
US11829689B1 (en) 2020-06-09 2023-11-28 The Mathworks, Inc. Systems and methods for creating variant regions in acausal simulation models

Also Published As

Publication number Publication date
US20090313073A1 (en) 2009-12-17
US20090313091A1 (en) 2009-12-17
US10310819B2 (en) 2019-06-04

Similar Documents

Publication Publication Date Title
US10310819B2 (en) Method and apparatus for providing symbolic mode checking of business application requirements
Basin et al. Automated analysis of security-design models
Dardenne et al. Goal-directed requirements acquisition
Elaasar et al. An overview of UML consistency management
France et al. Multi-view software evolution: a UML-based framework for evolving object-oriented software
Li et al. VERIFAS: A practical verifier for artifact systems
Glinz A lightweight approach to consistency of scenarios and class models
Zhang et al. Automated Unit Testing for Agent Systems.
US20080229261A1 (en) Design rule system for verifying and enforcing design rules in software
Eshuis et al. A real-time execution semantics for UML activity diagrams
Baroni Formal definition of object-oriented design metrics
Almasri et al. Toward automatically quantifying the impact of a change in systems
Guanciale et al. : A tool chain for choreographic design
Montali et al. Abductive logic programming as an effective technology for the static verification of declarative business processes
Haarmann et al. Cross-case data objects in business processes: Semantics and analysis
Fredlund et al. A testing-based approach to ensure the safety of shared resource concurrent systems
Mahdian et al. Regression testing with UML software designs: a survey
Ernst Software Evolution: a Requirements Engineering Approach
Davis System testing: Implications of requirements specifications
Lima et al. Verifying deadlock and nondeterminism in activity diagrams
Liu Formal modeling and analysis techniques for high level Petri nets
Bloom Seeing By Owl-light
Barat et al. A safety criterion for reusing a business process in the desired integrated
Jeya Mala et al. Classifying Critical Software Components Using Multi-Level Formalization and Knowledge Graphs
Kchaou et al. A New Approach for Traceability between UML Models.

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BLOOM, BARD;SIMMONDS, IAN D.;KEYSER, PAUL T.;AND OTHERS;REEL/FRAME:013509/0644;SIGNING DATES FROM 20021008 TO 20021111

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION