×

Tracing with a workload distributor

  • US 10,178,031 B2
  • Filed: 02/09/2015
  • Issued: 01/08/2019
  • Est. Priority Date: 01/25/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a computer processor, the method comprising:

  • receiving, in a secure environment that includes a plurality of execution environments, a stream of input for an application, the input stream comprising discrete units of work, each discrete unit of work being either an application input item or a request made to the application, wherein a first discrete unit of work is a call to a function of the application, which call includes input parameters for the application'"'"'s function, and wherein each discrete unit of work is structured to enable concurrent analysis thereof by multiple execution environments;

    in the secure environment, receiving a status from each execution environment included in the plurality of execution environments, each status comprising a determined availability to perform work;

    in the secure environment, receiving a configuration definition defining conditions for executing the discrete units of work among the plurality of execution environments, the configuration definition comprising a load balancing objective and a data gathering objective;

    in the secure environment, (1) parsing the input stream to identify the discrete units of work, (2) determining a first data gathering objective for a first work unit, and (3) causing the first work unit to be executed on a first execution environment according to the first data gathering objective;

    in the secure environment, tagging a result obtained from executing the first unit of work to include a set of one or more source code annotations which include a name of a function that was used when the first unit of work was executed such that the function name is tagged to the result;

    in the secure environment, determining that the result obtained from executing the first work unit according to the first data gathering objective includes at least some sensitive data; and

    in the secure environment, obfuscating the at least some sensitive data and then transmitting the obfuscated at least some sensitive data to a different environment for analysis, the different environment having a security level that is different than a security level of the secure environment.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×