Transactional object container
First Claim
Patent Images
1. A method, comprising:
- receiving, by a processing device, a transactional object at runtime of a compiled application, the transactional object comprising a first transactional logic;
monitoring behavior of the transactional object;
determining, by the processing device, a locking strategy to use for the transactional object;
generating, by the processing device, a transactional proxy for the transactional object, the transactional proxy comprising a transactional marker, a pointer to the transactional object, and a second transactional logic that supersedes the first transactional logic, the second transactional logic comprising the determined locking strategy to be implemented by the transactional proxy in view of the monitoring; and
passing, by the processing device, the transactional proxy to the compiled application, wherein the compiled application is to make calls on the transactional proxy instead of on the transactional object.
1 Assignment
0 Petitions
Accused Products
Abstract
A processing device receives a transactional object at runtime of a compiled application, the transactional object comprising first transactional logic. The processing device determines a locking strategy to use for the transactional object. The processing device generates a transactional proxy for the transactional object, the transactional proxy comprising a transactional marker, a pointer to the transactional object, and second transactional logic that supersedes the first transactional logic. The processing device passes the transactional proxy to the application, wherein the application is to make calls on the transactional proxy instead of on the transactional object.
-
Citations
17 Claims
-
1. A method, comprising:
-
receiving, by a processing device, a transactional object at runtime of a compiled application, the transactional object comprising a first transactional logic; monitoring behavior of the transactional object; determining, by the processing device, a locking strategy to use for the transactional object; generating, by the processing device, a transactional proxy for the transactional object, the transactional proxy comprising a transactional marker, a pointer to the transactional object, and a second transactional logic that supersedes the first transactional logic, the second transactional logic comprising the determined locking strategy to be implemented by the transactional proxy in view of the monitoring; and passing, by the processing device, the transactional proxy to the compiled application, wherein the compiled application is to make calls on the transactional proxy instead of on the transactional object. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computing apparatus, comprising:
-
a memory; and a processing device, operatively connected with the memory, the processing device to; receive a transactional object at runtime of a compiled application, the transactional object comprising a first transactional logic; monitor behavior of the transactional object; determine a locking strategy to use for transactional object; generate a transactional proxy for the transactional object, the transactional proxy comprises a transactional marker, a pointer to the transactional object, and a second transactional logic that supersedes the first transactional logic, the second transactional logic comprises the determined locking strategy to implement by the transactional proxy in view of the monitored behavior; and pass the transactional proxy to the compiled application, wherein the compiled application is to make calls on the transactional proxy instead of on the transactional object. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A non-transitory computer readable storage medium comprising instructions to cause a processing device to:
-
receive, by the processing device, transactional object at runtime of a compiled application, the transactional object comprising a first transactional logic; monitor behavior of the transactional object; determine, by the processing device, a locking strategy to use for the transactional object; generate, by the processing device, a transactional proxy for the transactional object, the transactional proxy comprises a transactional marker, a pointer to the transactional object, and a second transactional logic that supersedes the first transactional logic, the second transactional logic comprises the determined locking strategy to implement by the transactional proxy in view of the monitored behavior; and pass, by the processing device, the transactional proxy to the compiled application, wherein the compiled application is to make calls on the transactional proxy instead of on the transactional object. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification