AUTOMATED SOFTWARE CONFIGURATION MANAGEMENT
    1.
    发明申请

    公开(公告)号:US20170357524A1

    公开(公告)日:2017-12-14

    申请号:US15582700

    申请日:2017-04-30

    CPC classification number: G06F9/44505 G06F8/60 G06F8/71 G06F9/44521

    Abstract: A system uses agents to monitor a distributed business transaction as well as monitor changes in software configuration. An agent may detect a file load, such a class load, obtain portions of the file such as functions, and perform a hash on the byte code functions. A hash tree may then be constructed and compared to previous states of the system. The hash tree may be generated, for example, at each file loading detected, so that system states can be compared. Differences in hash trees are detected and the changes are reported to an administrator of the system that provides the distrusted business transaction.

    Automated software configuration management

    公开(公告)号:US10216527B2

    公开(公告)日:2019-02-26

    申请号:US15582700

    申请日:2017-04-30

    Abstract: A system uses agents to monitor a distributed business transaction as well as monitor changes in software configuration. An agent may detect a file load, such a class load, obtain portions of the file such as functions, and perform a hash on the byte code functions. A hash tree may then be constructed and compared to previous states of the system. The hash tree may be generated, for example, at each file loading detected, so that system states can be compared. Differences in hash trees are detected and the changes are reported to an administrator of the system that provides the distrusted business transaction.

    Automated software configuration management

    公开(公告)号:US09811356B2

    公开(公告)日:2017-11-07

    申请号:US14611024

    申请日:2015-01-30

    CPC classification number: G06F9/44505 G06F8/60 G06F8/71 G06F9/44521

    Abstract: A system uses agents to monitor a distributed business transaction as well as monitor changes in software configuration. An agent may detect a file load, such a class load, obtain portions of the file such as functions, and perform a hash on the byte code functions. A hash tree may then be constructed and compared to previous states of the system. The hash tree may be generated, for example, at each file loading detected, so that system states can be compared. Differences in hash trees are detected and the changes are reported to an administrator of the system that provides the distrusted business transaction.

Patent Agency Ranking