Transactional object container
First Claim
Patent Images
1. A method, comprising:
- receiving, by a processing device, a non-transactional object at runtime of a compiled application, wherein the non-transactional object is a component of the application that does not include transactional logic;
generating, by the processing device, a transactional proxy for the non-transactional object, the transactional proxy including the transactional logic not included in the non-transactional object, a transactional marker and a pointer to the non-transactional object;
determining, by the processing device, a locking strategy to use for the non-transactional object, the locking strategy to be implemented by the transactional proxy; and
passing, by the processing device, the transactional proxy to the application, wherein the application to make calls on the transactional proxy instead of on the non-transactional object.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device receives an object at runtime of a compiled application, wherein the object is a component of the application. The computing device generates a transactional proxy for the object, the transactional proxy including transactional logic, a transactional marker and a pointer to the object. The transactional proxy is passed to the application, wherein the application to make calls on the transactional proxy instead of on the object.
-
Citations
21 Claims
-
1. A method, comprising:
-
receiving, by a processing device, a non-transactional object at runtime of a compiled application, wherein the non-transactional object is a component of the application that does not include transactional logic; generating, by the processing device, a transactional proxy for the non-transactional object, the transactional proxy including the transactional logic not included in the non-transactional object, a transactional marker and a pointer to the non-transactional object; determining, by the processing device, a locking strategy to use for the non-transactional object, the locking strategy to be implemented by the transactional proxy; and passing, by the processing device, the transactional proxy to the application, wherein the application to make calls on the transactional proxy instead of on the non-transactional object. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing apparatus, comprising:
-
a memory; and a processing device, connected with the memory, the processing device being configured to; receive a non-transactional object at runtime of a compiled application, wherein the non-transactional object is a component of the application that does not include transactional logic; generate a transactional proxy for the non-transactional object, the transactional proxy including the transactional logic not included in the non-transactional object, a transactional marker and a pointer to the non-transactional object; determine, by the processing device, a locking strategy to use for the non-transactional object, the locking strategy to be implemented by the transactional proxy; and pass the transactional proxy to the application, wherein the application to make calls on the transactional proxy instead of on the non-transactional object. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to perform a method comprising:
-
receiving, by the processing device, a non-transactional object at runtime of a compiled application, wherein the non-transactional object is a component of the application that does not include transactional logic; generating, by the processing device, a transactional proxy for the non-transactional object, the transactional proxy including the transactional logic not included in the non-transactional object, a transactional marker and a pointer to the non-transactional object; determining, by the processing device, a locking strategy to use for the non-transactional object, the locking strategy to be implemented by the transactional proxy; and passing, by the processing device, the transactional proxy to the application, wherein the application to make calls on the transactional proxy instead of on the non-transactional object. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification