Browse Prior Art Database

Method and System for Controlling Time Out Functions

IP.com Disclosure Number: IPCOM000236606D
Publication Date: 2014-May-06
Document File: 2 page(s) / 156K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system is disclosed for controlling time out functions without recompiling source code. The method involves scanning deployed byte code and inserting a time out control code into entry/exit points at select locations of the deployed byte code.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 87% of the total text.

Page 01 of 2

Method and System for Controlling Time Out Functions

Disclosed is a method and system for controlling time out functions without recompiling source code. The method involves scanning deployed byte code and inserting a time out control code into entry/exit points at select locations of the deployed byte code.

In accordance with the method and system, a legacy code package is used to load source code as illustrated in Fig. 1.

Figure 1

A time out control is implemented on this source code. Results of the legacy code package are compiled and accumulated in a legacy byte code. The legacy byte code generally includes .class files.

The legacy byte code is monitored and an XML file is used to define a class that is required to be monitored. The legacy byte code is monitored using a code inspect module. The code inspect module is configured to read the XML file to monitor rules. This assists in determining the class to monitor and a time out value. A set of such monitor records may be obtained such as a

className, a methodName and a timeOutValue. The className or methodName are used as keywords to determine start and end points of the legacy byte code. Upon determining the start and end points, a function is inserted just after the start point to

1


Page 02 of 2

indicate the start point. Similarly, another function is inserted just after the end point to indicate the end point.

A final code that includes an inserted piece of byte code is an inspected byte code. Monitoring...