$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for accessing a remote file in a directory structure associated with an application program executing locally 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
  • G06F-015/16
출원번호 UP-0246019 (2005-10-07)
등록번호 US-7779034 (2010-09-06)
발명자 / 주소
  • Pedersen, Bradley J.
  • Nord, Joseph H.
  • Hoy, David Randal
출원인 / 주소
  • Citrix Systems, Inc.
대리인 / 주소
    Choate, Hall & Stewart LLP
인용정보 피인용 횟수 : 30  인용 특허 : 121

초록

A method and system for accessing a file in a directory structure associated with an application includes a method of accessing a file in a directory structure associated with an application. A request by an application for access to a file is intercepted. The request is redirected to a first isolat

대표청구항

What is claimed is: 1. A method for accessing a file in a directory structure associated with an application, the method comprising: intercepting, by a filter driver executing on a computing machine, a request by an application for access to a file; redirecting, by the filter driver, the request to

이 특허에 인용된 특허 (121)

  1. Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
  2. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  3. Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques.
  4. Antonov Vadim, Apparatus and method for sharing data and routing messages between a plurality of workstations in a local area network.
  5. Demsey,Seth M.; Holden,Scott K.; Zintel,William Michael; Smith,Brian J.; Huynh,Tuan, Associating a native resource with an application.
  6. Chang April S. ; Large Andrew R. ; Snyder Alan, Authentication and access control in a management console program for managing services in a computer network.
  7. Parker Marsten Hugh ; Kepple Laurence Ralph ; Sklar Leah Ruth ; Laroche David Christopher, Automated GUI interface testing.
  8. Pollin Robert E. (19107 Grotto La. Germantown MD 20874), Automated payment system.
  9. Pollin Robert E., Automated payment system and method.
  10. Patel, Amit; Pujare, Sanjay; Ryan, Nicholas; Lin, David, Client installation and execution system for streamed applications.
  11. Trower ; II Tandy W. ; Weinberg Mark Jeffrey ; Merrill John Wickens Lamb, Client server animation system for managing interactive user interface characters.
  12. Pettus Christopher E. (San Francisco CA) Loomis Donald R. (Saratoga CA) Warren Christina E. (Cupertino CA), Client server system and method of operation including a dynamically configurable protocol stack.
  13. Hayes ; Jr. Kent Fillmore, Client-server system with central application management and providing export agent capability for retrofitting existing hardware and applications into the system.
  14. Shah, Lacky Vasant; Arai, Daniel Takeo; Benitez, Manuel Enrique; Holler, Anne Marie; Wohlgemuth, Robert Curtis, Client-side performance optimization system for streamed applications.
  15. Russell Edward A. (Acton MA) Tang Raymond Ting-Foo (Chelmsford MA), Client/server connection sharing.
  16. Johnson Donavon W. (Georgetown TX) Shaheen-Gouda Amal A. (Austin TX) Smith Todd A. (Austin TX), Distributed file access structure lock.
  17. Norris David (Portland OR), Dynamic network configuration.
  18. Gainer Patrick J. ; Hamilton James R. ; Verma Surendra, Dynamic symbolic links for computer file systems.
  19. Parker Robert D. ; Holloway Matthew S., File privilege administration apparatus and methods.
  20. Adams, Thomas L.; Chorley, Will R.; Cunetto, Philip C.; Doherty, James M.; LeMay, John E.; Mueller, Stephen M.; Parolkar, Satish; Schroeder, Timothy P.; Slaten, Charles B., Flexible network platform and call processing system.
  21. Alford, Jr.,Jack Allen; Beesley,James Bruce; Nasypany,Stephen Raymond, Graphical user interface for visualization of sampled data compared to entitled or reference levels.
  22. Goldberg Robert P. (Newton Highlands MA), Hardware virtualizer for supporting recursive virtual computer systems on a host computer system.
  23. Bendert Edward Joseph (Vestal NY) Bennett Robert Bradley (Endwell NY) Berman Eve Suzanne (Binghamton NY) Farrell Susan Marie (Vestal NY) Johnson Eugene (Vestal NY) Nugent Robert Michael (Nichols NY) , Heterogeneous filing system with common API and reconciled file management rules.
  24. Wies Evan F. ; Chang Dean C. ; Rosenberg Louis B. ; Tan Sian W. ; Mallett Jeffrey R., Implementing force feedback over the World Wide Web and other computer networks.
  25. Raz Uri, Information transfer systems and method with dynamic distribution of data, control and management of information.
  26. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
  27. Hao Ming C. ; Karp Alan H ; Garfinkel Daniel ; Young Charles ; Fincher Thomas G., Mechanism to control and use window events among applications in concurrent computing.
  28. Crowley Paul ; Jaugilas John ; Nash Alex ; Natesan Senthil ; Lampert David S., Memory management for navigation system.
  29. Zhao, Yan, Method and an apparatus for providing personalized service.
  30. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
  31. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  32. Kumar Vijay P. (Freehold NJ) Stahl Mark E. (Pittsburgh PA), Method and apparatus for executing a distributed algorithm or service on a simple network management protocol based comp.
  33. Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
  34. Rogers Steven W. ; Kodosky Jeffrey L. ; Luick Dean A., Method and apparatus for more efficient function synchronization in a data flow program.
  35. Fell, Jr., Channing W., Method and apparatus for network resource access request redirection.
  36. Craycroft Timothy J., Method and apparatus for organizing window groups and windows in a table.
  37. Schmidt,Brian Keith, Method and apparatus for providing virtual namespaces for active computing environments.
  38. Schmeidler,Yonah; Atkins,Derek; Eichin,Mark W.; Rostcheck,David J., Method and apparatus for secure content delivery over broadband access networks.
  39. Johnson Lucinda L. (Oakdale MN) Peltier Clayton A. (Chisago City MN) Kuehn Scott H. (St. Paul MN) Frank William D. (New Brighton MN), Method and apparatus for using an independent transaction processing application as a service routine.
  40. Bobby G. Doran, Jr. ; Bill Hyden ; Terry Wayne Liles, Method and apparatus for windows-based installation for installing software on build-to-order computer systems.
  41. Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
  42. Foulkes, Jonathan; Steinmann, Frank, Method and system for a session allocation manager ("SAM").
  43. Cummings Christopher R., Method and system for allowing a single-user application executing in a multi-user environment to create objects having both user-global and system global visibility.
  44. Turpin Kevin J. ; Clark Christopher P., Method and system for client/server and peer-to-peer disk imaging.
  45. Cook David Philip, Method and system for custom manufacture and delivery of a data product.
  46. Eylon, Dan; Ramon, Amit; Volk, Yehuda; Raz, Uri; Melamed, Shmuel, Method and system for executing network streamed application.
  47. Tracy William X. ; Roslak Thomas K. ; Murrah Judith ; Riso Francis ; Beach Robert ; Sandler Robert, Method and system for presenting item information using a portable data terminal.
  48. Young, Jeff; Copeland, Bruce W., Method and system for remote client installation.
  49. Romm, Amnon, Method for caching information between work sessions.
  50. Baisley, Donald Edward, Method for controlling access to a multiplicity of objects using a customizable object-oriented access control hook.
  51. Gupta, Arun Kumar, Method for controlling access to information.
  52. Czajkowski, Grzegorz J., Method for improving the performance of safe language multitasking.
  53. Heizer Isaac J. (Little Silver NJ), Method of and apparatus for operating a client/server computer network.
  54. Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., Method of redirecting a client service session to a second application server without interrupting the session by forwa.
  55. Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Burghfield Common NH GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA), Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment.
  56. Cox, David E.; Hayes, Jr., Kent F.; Lindquist, David B.; McGarvey, John R.; Salahshour, Abdi, Methods, systems and computer program products for centralized management of application programs on a network.
  57. Koved Lawrence, Multiple resource or security contexts in a multithreaded application.
  58. Kouya Shimura JP, Network computer system and substitute compile server.
  59. Hughes, Trevor, Networked computer system.
  60. Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA 4), Object container transfer system and method in an object based computer operating system.
  61. Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object oriented representation of network requests in a client server model.
  62. Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA), Object transferring system and method in an object based computer operating system.
  63. Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object-oriented communication interface for network protocol access using the selected newly created protocol interface.
  64. Pettus Christopher E. (San Francisco CA), Object-oriented networking system with dynamically configurable communication links.
  65. Gish Sheri L., Object-oriented system, method and article of manufacture for a client-server event driven message framework in an interprise computing framework system.
  66. Gish Sheri L., Object-oriented system, method and article of manufacture for migrating a client-server application (#5).
  67. Schaefer,Stuart, Operating system abstraction and protection layer.
  68. Yakov Rekhter ; Eric C. Rosen, Peer-model support for virtual private networks with potentially overlapping addresses.
  69. Legvold Vernon J. (Tucson AZ) Wellons Stephen O. (Tucson AZ), Peripheral subsystem initialization method and apparatus.
  70. Dasan Vasanthan S., Personalized information retrieval using user-defined profile.
  71. Kekic Miodrag M. ; Lu Grace N. ; Carlton Eloise H., Platform independent computer network management client.
  72. Eylon, Dan; Ramon, Amit; Volk, Yehuda, Preprocessed applications suitable for network streaming applications and method for producing same.
  73. Bennett John G. ; Dalal Ketan, Processing multiple database transactions in the same process to reduce process overhead and redundant retrieval from database servers.
  74. Wilner,David N.; Fogelin,John C.; Long,Kent D.; Preyssler,Thierry C.; Koning,Maarten A.; Gordon,John; Myers,Cy H., Protection domains for a computer operating system.
  75. Oppermann Charles ; Butler Laura J. ; Donie Steven M. ; Wong Peter Kam-Ho, Providing access to user interface elements of legacy application programs.
  76. Romm, Amnon; Elkoni, Avi, Registry emulation.
  77. Yoshiyama Shunji (Tokyo JPX), Ring network with temporary master node for collecting data from slave nodes during failure.
  78. Artsy Yeshayahu (Nashua NH), Routing objects on action paths in a distributed computing system.
  79. Czajkowski, Grzegorz J., Safe language static variables initialization in a multitasking system.
  80. Jonathan Scott Greenfield ; John Ryan McGarvey, Securely sharing log-in credentials among trusted browser-based applications.
  81. Wood, David L.; Pratt, Thomas; Dilger, Michael B.; Norton, Derk; Nadiadi, Yunas, Security architecture with environment sensitive credential sufficiency evaluation.
  82. Moreh Jahanshah ; Olkin Terry M., Security system for event based middleware.
  83. Cowan Richard ; Eckley Gordon P. ; Panchangam Prasad V. R. ; Leong Winston C. W., Server for starting client application on client if client is network terminal and initiating client application on ser.
  84. East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
  85. Czajkowski, Grzegorz J., Small memory footprint system and method for separating applications within a single virtual machine.
  86. Czajkowski, Grzegorz J., Small memory footprint system and method for separating applications within a single virtual machine.
  87. Freivald Matthew P. ; Richards Mark S. ; Noble Alan C., Spreadsheet user-interface for an internet-document change-detection tool.
  88. Raz Uri ; Volk Yehuda,ILX ; Melamed Shmuel,ILX, Streaming modules.
  89. Hunt Gary T., Supporting multiple client-server sessions from a protocol stack associated with a single physical adapter through use.
  90. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
  91. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  92. Kirchner Michael ; Krishnaswamy Sridhar ; Kult George ; Sackett Jeff ; Young Greg, System and method for accessing a service on a services network.
  93. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  94. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  95. Belani, Eshwar; Katiyar, Dinesh; Garg, Suneet, System and method for controlling access to resources in a distributed environment.
  96. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  97. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  98. Jonathan Virgil Ziebell, System and method for incorporating changes as a part of a software release.
  99. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  100. Czajkowski, Grzegorz J., System and method for minimizing inter-application interference among static synchronized methods.
  101. Conner Mike H. (Austin TX) Martin Andrew R. (Austin TX) Raper Larry K. (Austin TX), System and method for parent class shadowing in a statically linked object hierarchy.
  102. Subrahmanyam, Pratap, System and method for remote file access by computer.
  103. Bale Richard C. (Alpharetta GA) Rich William L. (Stone Mountain GA) Shackelford Floyd W. (Beauford GA), System and method for run time configuration of objects in an object oriented computing environment.
  104. Walls Jeffrey J. ; Sweetser David J., System and method for selective and continuous index generation.
  105. Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
  106. Nanja,Sekaran, System for configuration of dynamic computing environments using a visual interface.
  107. East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
  108. Henson Larry W. (Austin) Shaheen-Gouda Amal A. (Austin) Smith Todd A. (Austin TX), System for file and record locking between nodes in a distributed data processing environment maintaining one copy of ea.
  109. Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
  110. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  111. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  112. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  113. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
  114. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
  115. Appiah, Madan Mohan R.; Wang, Huei Chung; Brockway, Tad D., Systems and methods for unified remote control access.
  116. Yu Kin C., Virtual local area network well-known port routing mechanism for mult--emulators in an open system environment.
  117. Rekhter, Yakov; Rosen, Eric C., Virtual private network employing tag-implemented egress-channel selection.
  118. Beloussov,Serguei M.; Protassov,Stanislav S.; Tormasov,Alexander G., Virtual private server with enhanced security.
  119. Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
  120. Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.
  121. Shrader Theodore Jack London ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shi Shaw-Ben, Web server account manager plug-in for monitoring resources.

이 특허를 인용한 특허 (30)

  1. Yin, Min; Zhai, Shumin, Delivering unified user experience by automatically teaming up information appliances with general purpose PC through internet.
  2. Bai, Zhenguo, File folder transmission on network.
  3. Bai, Zhenguo, File folder transmission on network.
  4. Bai, Zhenguo, File folder transmission on network.
  5. Bai, Zhenguo, File folder transmission on network.
  6. Zhuang, Xiao; Lv, Su; Li, Ling; Hu, Xiaozhou; Li, Zhenglin; Zhu, Yaoyao, File type recognition analysis method and system.
  7. Conlan, Patrick Michael; Jimenez-Salgado, Rolando; Balmori Labra, Juan Gabriel; Haugen, Todd; Jones, Brian Michael, Identification of host-compatible downloadable applications.
  8. Bansod, Aditya; Brantner, Brian; Simpson, John, Initializing an application on an electronic device.
  9. Laborczfalvi, Lee; Roychoudhry, Anil; Borzycki, Andrew; Muir, Jeffrey; Chin, Huai; Mazzaferri, Richard; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  10. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  11. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  12. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  13. Sanders, James, Method and system for creation of streamed files on-demand.
  14. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method for accessing, by application programs, resources residing inside an application isolation scope.
  15. Yu, Zhou; Wang, Shaoyong, Method for data backup, device and system.
  16. Liu, Geng; Lu, Yipeng, Method, apparatus and system for file transfer based on file directory.
  17. Augenstein, Oliver; Prause, Thomas, Methods and infrastructure for performing repetitive data protection and a corresponding restore of data.
  18. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for accessing, by application programs, resources provided by an operating system.
  19. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
  20. Rowley, Peter Andrew, Multi-master referential integrity.
  21. Franke, Michael; McDonald, Michael, Network protocol proxy.
  22. Franke, Michael; McDonald, Michael, Network protocol proxy.
  23. Viripaeff, Alexis; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
  24. Viripaeff, Lexi; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
  25. Viripaeff, Lexi; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
  26. Rajagopal, Ramesh; Petry, Scott M.; Tosh, James K.; Lund, Peter K.; Cox, Fredric L.; Moore, Adam P., Secure web container for a secure online user environment.
  27. Amegadzie, Augustine; Compton, James T.; Gross, Jerald W.; Rago, Stephen A; Stacey, Christopher H.; Zimran, Eyal, Selection of migration methods including partial read restore in distributed storage management.
  28. Momchilov, Georgy; Mir, Abraham, Shell integration for an application executing remotely on a server.
  29. Momchilov, Georgy; Mir, Abraham, Shell integration for an application executing remotely on a server.
  30. Shwartz, Larisa; Grabarnik, Genady; Surendra, Maheswaran; Ayachitula, Naga A., System and method for matching multi-node software system provisioning requirements and capabilities using rough set theory.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로