Method and system for accessing a remote file in a directory structure associated with an application program executing locally
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/30
G06F-015/16
출원번호
UP-0246019
(2005-10-07)
등록번호
US-7779034
(2010-09-06)
발명자
/ 주소
Pedersen, Bradley J.
Nord, Joseph H.
Hoy, David Randal
출원인 / 주소
Citrix Systems, Inc.
대리인 / 주소
Choate, Hall & Stewart LLP
인용정보
피인용 횟수 :
30인용 특허 :
121
초록▼
A method and system for accessing a file in a directory structure associated with an application includes a method of accessing a file in a directory structure associated with an application. A request by an application for access to a file is intercepted. The request is redirected to a first isolat
A method and system for accessing a file in a directory structure associated with an application includes a method of accessing a file in a directory structure associated with an application. A request by an application for access to a file is intercepted. The request is redirected to a first isolation environment. A determination is made that the requested file does not exist in the first isolation environment. The request is redirected to a second isolation environment responsive to a determination that the file is identified in an enumeration of a directory structure including a plurality of application files residing on a remote machine. The requested file is retrieved from a file server, responsive to a determination that the second isolation environment does not contain the file and that the file is identified in the enumeration.
대표청구항▼
What is claimed is: 1. A method for accessing a file in a directory structure associated with an application, the method comprising: intercepting, by a filter driver executing on a computing machine, a request by an application for access to a file; redirecting, by the filter driver, the request to
What is claimed is: 1. A method for accessing a file in a directory structure associated with an application, the method comprising: intercepting, by a filter driver executing on a computing machine, a request by an application for access to a file; redirecting, by the filter driver, the request to a first isolation environment including an application isolation layer and a user isolation layer; determining, by the filter driver, that the requested file does not exist in the first isolation environment; redirecting, by the filter driver, the request to a second isolation environment including an application isolation layer and a user isolation layer, responsive to a determination that the file is identified in an enumeration of a directory structure including a plurality of application files residing on a remote machine; receiving, by a transceiver executing on the computing machine, the requested file from the remote machine, responsive to a determination that the second isolation environment does not contain the file and that the file is identified in the enumeration; responding to the intercepted request with the retrieved file; and intercepting a request to access the file made by a second application executing in a third isolation environment; redirecting the request to the second isolation environment, responsive to determination that the file is identified in the enumeration and that the second isolation environment contains the file; and providing, by the second isolation environment, the second application with access to the file. 2. The method of claim 1, wherein intercepting a request further comprises intercepting a request by an application for access to an executable file. 3. The method of claim 1, where intercepting a request further comprises intercepting a request by an application for access to a file, a portion of the application executing on a local machine. 4. The method of claim 1, wherein intercepting a request further comprises intercepting a request for access to a file by an application capable of receiving an application stream. 5. The method of claim 1, wherein intercepting a request further comprises intercepting the request by the application, wherein at least one portion of the application resides in a first isolation environment on a local machine. 6. The method of claim 1, wherein retrieving the requested file further comprises retrieving the requested file from a second remote machine. 7. The method of claim 1, wherein retrieving the requested file further comprises streaming, by the remote machine, the requested file to a local machine. 8. The method of claim 1, wherein retrieving the requested file further comprises storing the retrieved file in the second isolation environment. 9. The method of claim 1, wherein retrieving the requested file further comprises encrypting the retrieved file. 10. The method of claim 1, wherein retrieving the requested file further comprises storing the retrieved file in an encrypted form. 11. The method of claim 1 further comprising redirecting the request for the file to an environment outside the first isolation environment and outside the second isolation environment, responsive to a determination that the file is not identified in the enumeration. 12. The method of claim 1, wherein providing access to the file further comprises storing the file in the third isolation environment. 13. A system for accessing a file in a directory structure associated with an application executing on a computing machine, the system comprising: a first isolation environment on a computing machine, the first isolation environment including an application isolation layer and a user isolation layer, a first application executing on the computing machine and within the first isolation environment, and requesting access to a file; a second isolation environment on the computing machine, the second isolation environment storing an enumeration of a directory structure associated with a plurality of application files installed on a remote machine, the second isolation environment including an application isolation layer and a user isolation layer; a third isolation environment on the computing machine, the third isolation environment including an application isolation layer and a user isolation layer and a second application executing on the computing machine and within the third isolation environment, the second application requesting access to the file; a filter driver executing on the computing machine, the filter driver; intercepting the request of the first application for access to the file, redirecting the request of the first application to the first isolation environment, determining that the requested file does not exist in the first isolation environment, redirecting the request of the first application to the second isolation environment, responsive to a determination that the file is identified in the enumeration of the directory structure, intercepting the request of the second application for access to the file, and redirecting the request of the second application to the second isolation environment, responsive to the determination that the file is identified in the enumeration of the directory structure; and a transceiver, executing on the computing machine and communicating with the filter driver, the transceiver: transmitting the redirected request to a remote machine, receiving a stream comprising the requested file, responsive to the request and to a determination by the filter driver that the second isolation environment does not contain the file and that the file is identified in the enumeration, and providing the first and second applications access to the received stream responsive to the intercepted requests. 14. The system of claim 13, wherein the transceiver stores the streamed file in the second isolation environment. 15. The system of claim 14 wherein the filter driver: intercepts a request by a second application for access to the file, and redirects the request to the second isolation environment. 16. The system of claim 13 wherein the filter driver: intercepts a request by a second application for access to the file, and redirects the request to the second isolation environment, responsive to a determination that the transceiver stored the streamed file in the second isolation environment. 17. The system of claim 13, wherein the second isolation environment further comprises a cache memory element. 18. The system of claim 13, wherein the second isolation environment stores the enumeration of the directory structure in a cache memory element. 19. The system of claim 13, wherein the transceiver receives the stream comprising the requested file from the remote machine. 20. The system of claim 13, wherein the transceiver receives the stream comprising the requested file from a second remote machine.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (121)
Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques.
Chang April S. ; Large Andrew R. ; Snyder Alan, Authentication and access control in a management console program for managing services in a computer network.
Trower ; II Tandy W. ; Weinberg Mark Jeffrey ; Merrill John Wickens Lamb, Client server animation system for managing interactive user interface characters.
Pettus Christopher E. (San Francisco CA) Loomis Donald R. (Saratoga CA) Warren Christina E. (Cupertino CA), Client server system and method of operation including a dynamically configurable protocol stack.
Hayes ; Jr. Kent Fillmore, Client-server system with central application management and providing export agent capability for retrofitting existing hardware and applications into the system.
Shah, Lacky Vasant; Arai, Daniel Takeo; Benitez, Manuel Enrique; Holler, Anne Marie; Wohlgemuth, Robert Curtis, Client-side performance optimization system for streamed applications.
Adams, Thomas L.; Chorley, Will R.; Cunetto, Philip C.; Doherty, James M.; LeMay, John E.; Mueller, Stephen M.; Parolkar, Satish; Schroeder, Timothy P.; Slaten, Charles B., Flexible network platform and call processing system.
Alford, Jr.,Jack Allen; Beesley,James Bruce; Nasypany,Stephen Raymond, Graphical user interface for visualization of sampled data compared to entitled or reference levels.
Bendert Edward Joseph (Vestal NY) Bennett Robert Bradley (Endwell NY) Berman Eve Suzanne (Binghamton NY) Farrell Susan Marie (Vestal NY) Johnson Eugene (Vestal NY) Nugent Robert Michael (Nichols NY) , Heterogeneous filing system with common API and reconciled file management rules.
Wies Evan F. ; Chang Dean C. ; Rosenberg Louis B. ; Tan Sian W. ; Mallett Jeffrey R., Implementing force feedback over the World Wide Web and other computer networks.
Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
Hao Ming C. ; Karp Alan H ; Garfinkel Daniel ; Young Charles ; Fincher Thomas G., Mechanism to control and use window events among applications in concurrent computing.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
Kumar Vijay P. (Freehold NJ) Stahl Mark E. (Pittsburgh PA), Method and apparatus for executing a distributed algorithm or service on a simple network management protocol based comp.
Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
Johnson Lucinda L. (Oakdale MN) Peltier Clayton A. (Chisago City MN) Kuehn Scott H. (St. Paul MN) Frank William D. (New Brighton MN), Method and apparatus for using an independent transaction processing application as a service routine.
Bobby G. Doran, Jr. ; Bill Hyden ; Terry Wayne Liles, Method and apparatus for windows-based installation for installing software on build-to-order computer systems.
Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
Cummings Christopher R., Method and system for allowing a single-user application executing in a multi-user environment to create objects having both user-global and system global visibility.
Tracy William X. ; Roslak Thomas K. ; Murrah Judith ; Riso Francis ; Beach Robert ; Sandler Robert, Method and system for presenting item information using a portable data terminal.
Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., Method of redirecting a client service session to a second application server without interrupting the session by forwa.
Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Burghfield Common NH GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA), Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment.
Cox, David E.; Hayes, Jr., Kent F.; Lindquist, David B.; McGarvey, John R.; Salahshour, Abdi, Methods, systems and computer program products for centralized management of application programs on a network.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA 4), Object container transfer system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object oriented representation of network requests in a client server model.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA), Object transferring system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object-oriented communication interface for network protocol access using the selected newly created protocol interface.
Gish Sheri L., Object-oriented system, method and article of manufacture for a client-server event driven message framework in an interprise computing framework system.
Bennett John G. ; Dalal Ketan, Processing multiple database transactions in the same process to reduce process overhead and redundant retrieval from database servers.
Cowan Richard ; Eckley Gordon P. ; Panchangam Prasad V. R. ; Leong Winston C. W., Server for starting client application on client if client is network terminal and initiating client application on ser.
East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
Conner Mike H. (Austin TX) Martin Andrew R. (Austin TX) Raper Larry K. (Austin TX), System and method for parent class shadowing in a statically linked object hierarchy.
Bale Richard C. (Alpharetta GA) Rich William L. (Stone Mountain GA) Shackelford Floyd W. (Beauford GA), System and method for run time configuration of objects in an object oriented computing environment.
Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
Henson Larry W. (Austin) Shaheen-Gouda Amal A. (Austin) Smith Todd A. (Austin TX), System for file and record locking between nodes in a distributed data processing environment maintaining one copy of ea.
Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.
Shrader Theodore Jack London ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shi Shaw-Ben, Web server account manager plug-in for monitoring resources.
Yin, Min; Zhai, Shumin, Delivering unified user experience by automatically teaming up information appliances with general purpose PC through internet.
Conlan, Patrick Michael; Jimenez-Salgado, Rolando; Balmori Labra, Juan Gabriel; Haugen, Todd; Jones, Brian Michael, Identification of host-compatible downloadable applications.
Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method for accessing, by application programs, resources residing inside an application isolation scope.
Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for accessing, by application programs, resources provided by an operating system.
Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
Viripaeff, Alexis; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
Viripaeff, Lexi; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
Viripaeff, Lexi; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
Rajagopal, Ramesh; Petry, Scott M.; Tosh, James K.; Lund, Peter K.; Cox, Fredric L.; Moore, Adam P., Secure web container for a secure online user environment.
Amegadzie, Augustine; Compton, James T.; Gross, Jerald W.; Rago, Stephen A; Stacey, Christopher H.; Zimran, Eyal, Selection of migration methods including partial read restore in distributed storage management.
Shwartz, Larisa; Grabarnik, Genady; Surendra, Maheswaran; Ayachitula, Naga A., System and method for matching multi-node software system provisioning requirements and capabilities using rough set theory.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.