Analyzing Problem Signatures
First Claim
Patent Images
1. A method of analyzing problem data from a computer application comprising:
- evaluating a memory dump;
identifying call stacks within the memory dump that are related to application failures;
creating a hash of the identified call stack; and
adding the hash to a database.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of analyzing problem data from a computer application is disclosed. The method evaluates a memory dump, identifying call stacks within the memory dump that are related to application failures, creates a hash of the identified call stack and adds the hash to a database. The database may then be evaluated to look for trends in the error data such as whether the same call stack is causing problems.
52 Citations
20 Claims
-
1. A method of analyzing problem data from a computer application comprising:
-
evaluating a memory dump; identifying call stacks within the memory dump that are related to application failures; creating a hash of the identified call stack; and adding the hash to a database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer storage medium storing computer executable code for analyzing problem data from a computer application, the computer executable code comprising:
-
evaluating a memory dump; identifying call stacks within the memory dump that are related to application failures; creating a hash of the identified call stack wherein creating a hash further comprises concatenating an application module name and function name for each frame as an input to the hash function; and adding the hash to a database. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer system comprising a processor for executing computer executable instructions, a memory for storing computer executable instructions and an input output circuit, the processor being physically configured to execute computer executable code for analyzing problem data from a computer application, the computer executable code comprising code for:
-
evaluating a memory dump; identifying call stacks within the memory dump that are related to application failures; creating a hash of the identified call stack wherein creating a hash further comprises concatenating an application module name and function name for each frame as an input to the hash function; adding the hash to a database; and performing data mining analysis on the database to further analyze the problem data. - View Dependent Claims (20)
-
Specification