-
公开(公告)号:US20170357524A1
公开(公告)日:2017-12-14
申请号:US15582700
申请日:2017-04-30
Applicant: AppDynamics LLC
Inventor: Jonathan Newcomb Swirsky Whitney , Ido Carmel , Steffen Yount
CPC classification number: G06F9/44505 , G06F8/60 , G06F8/71 , G06F9/44521
Abstract: A system uses agents to monitor a distributed business transaction as well as monitor changes in software configuration. An agent may detect a file load, such a class load, obtain portions of the file such as functions, and perform a hash on the byte code functions. A hash tree may then be constructed and compared to previous states of the system. The hash tree may be generated, for example, at each file loading detected, so that system states can be compared. Differences in hash trees are detected and the changes are reported to an administrator of the system that provides the distrusted business transaction.
-
公开(公告)号:US10216527B2
公开(公告)日:2019-02-26
申请号:US15582700
申请日:2017-04-30
Applicant: AppDynamics LLC
Inventor: Jonathan Newcomb Swirsky Whitney , Ido Carmel , Steffen Yount
Abstract: A system uses agents to monitor a distributed business transaction as well as monitor changes in software configuration. An agent may detect a file load, such a class load, obtain portions of the file such as functions, and perform a hash on the byte code functions. A hash tree may then be constructed and compared to previous states of the system. The hash tree may be generated, for example, at each file loading detected, so that system states can be compared. Differences in hash trees are detected and the changes are reported to an administrator of the system that provides the distrusted business transaction.
-
公开(公告)号:US09811356B2
公开(公告)日:2017-11-07
申请号:US14611024
申请日:2015-01-30
Applicant: AppDynamics LLC
Inventor: Jonathan Whitney , Ido Carmel , Steffen Yount
CPC classification number: G06F9/44505 , G06F8/60 , G06F8/71 , G06F9/44521
Abstract: A system uses agents to monitor a distributed business transaction as well as monitor changes in software configuration. An agent may detect a file load, such a class load, obtain portions of the file such as functions, and perform a hash on the byte code functions. A hash tree may then be constructed and compared to previous states of the system. The hash tree may be generated, for example, at each file loading detected, so that system states can be compared. Differences in hash trees are detected and the changes are reported to an administrator of the system that provides the distrusted business transaction.
-
-