TRANSACTIONAL OBJECT CONTAINER
First Claim
1. A method, comprising:
- receiving, by a processing device, a transactional object at runtime of a compiled application, the transactional object comprising first transactional logic;
determining, by the processing device, a locking strategy to use for the transactional object;
generating, by the processing device, a transactional proxy for the transactional object, the transactional proxy comprising a transactional marker, a pointer to the transactional object, and second transactional logic that supersedes the first transactional logic, the second transactional logic comprising the determined locking strategy to be implemented by the transactional proxy; and
passing, by the processing device, the transactional proxy to the application, wherein the application is to make calls on the transactional proxy instead of on the transactional object.
1 Assignment
0 Petitions
Accused Products
Abstract
A processing device receives a transactional object at runtime of a compiled application, the transactional object comprising first transactional logic. The processing device determines a locking strategy to use for the transactional object. The processing device generates a transactional proxy for the transactional object, the transactional proxy comprising a transactional marker, a pointer to the transactional object, and second transactional logic that supersedes the first transactional logic. The processing device passes the transactional proxy to the application, wherein the application is to make calls on the transactional proxy instead of on the transactional object.
19 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a processing device, a transactional object at runtime of a compiled application, the transactional object comprising first transactional logic; determining, by the processing device, a locking strategy to use for the transactional object; generating, by the processing device, a transactional proxy for the transactional object, the transactional proxy comprising a transactional marker, a pointer to the transactional object, and second transactional logic that supersedes the first transactional logic, the second transactional logic comprising the determined locking strategy to be implemented by the transactional proxy; and passing, by the processing device, the transactional proxy to the application, wherein the application is to make calls on the transactional proxy instead of on the transactional object. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing apparatus, comprising:
-
a memory; and a processing device, connected with the memory, the processing device to; receive a transactional object at runtime of a compiled application, the transactional object comprising first transactional logic; determine a locking strategy to use for transactional object; generate a transactional proxy for the transactional object, the transactional proxy comprising a transactional marker, a pointer to the transactional object, and second transactional logic that supersedes the first transactional logic, the second transactional logic comprising the determined locking strategy to be implemented by the transactional proxy; and pass the transactional proxy to the application, wherein the application is to make calls on the transactional proxy instead of on the transactional object. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to perform operations comprising:
-
receiving, by the processing device, transactional object at runtime of a compiled application, the transactional object comprising first transactional logic; determining, by the processing device, a locking strategy to use for the transactional object; generating, by the processing device, a transactional proxy for the transactional object, the transactional proxy comprising a transactional marker, a pointer to the transactional object, and second transactional logic that supersedes the first transactional logic, the second transactional logic comprising the determined locking strategy to be implemented by the transactional proxy; and passing, by the processing device, the transactional proxy to the application, wherein the application is to make calls on the transactional proxy instead of on the transactional object. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification