Method and system for locating and accessing resources
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-003/00
G06F-009/44
G06F-009/46
G06F-013/00
출원번호
US-0231370
(2005-09-19)
등록번호
US-8095940
(2012-01-10)
발명자
/ 주소
Bissett, Nicholas Alexander
Roychoudhry, Anil
Mazzaferri, Richard James
출원인 / 주소
Citrix Systems, Inc.
대리인 / 주소
Foley & Lardner LLP
인용정보
피인용 횟수 :
4인용 특허 :
163
초록▼
In a method for accessing resources provided by an operating system, a request for a resource is received by an application program executing inside an environment. A first identifier associated with the resource is acquired. A registry is consulted, responsive to an association between a first iden
In a method for accessing resources provided by an operating system, a request for a resource is received by an application program executing inside an environment. A first identifier associated with the resource is acquired. A registry is consulted, responsive to an association between a first identifier associated with the resource and a second identifier associated with the resource, the association associated with the environment. The resource and an environment on which to launch the resource are identified, responsive to consulting the registry. The second identifier is associated with the resource, with the environment, and with the environment on which to launch the resource. A registry key for the resource is stored in the registry, the registry key comprising the second identifier. The request for the resource is redirected to the identified instance of the resource, responsive to the second identifier. The request for the resource is responded to using the instance of the resource located in the environment on which the resource resides. The requested resource is launched in the identified environment, responsive to the second identifier.
대표청구항▼
1. A method for accessing resources provided by an operating system, the method comprising the steps of: (a) receiving, by an application program executing inside an isolation environment comprising an application isolation layer and a user isolation layer, a request for a resource;(b) acquiring a f
1. A method for accessing resources provided by an operating system, the method comprising the steps of: (a) receiving, by an application program executing inside an isolation environment comprising an application isolation layer and a user isolation layer, a request for a resource;(b) acquiring a first identifier associated with the resource;(c) consulting a registry, responsive to the request for the resource, for an association between the first identifier and a second identifier associated with the isolation environment;(d) identifying the resource and an application scope provided by the application isolation layer on which to launch the resource, responsive to consulting the registry;(e) associating the second identifier with the resource, the isolation environment, and the application scope on which to launch the resource;(f) storing in the registry a registry key for the resource, the registry key comprising the second identifier;(g) redirecting the request for the resource to the application scope, responsive to the second identifier;(h) responding to the request for the resource using an instance of the resource located in the application scope on which the resource resides; and(i) launching, responsive to the second identifier, the requested resource in the application scope of the isolation environment. 2. The method of claim 1, wherein step (a) comprises making, by an application program executing in an isolation environment comprising an application isolation layer and a user isolation layer, a request for a resource. 3. The method of claim 1, wherein step (c) further comprises consulting a registry in the isolation environment on which the application program resides. 4. The method of claim 1, wherein step (c) further comprises consulting a second registry in a second isolation environment comprising a second application isolation layer and a second user isolation layer. 5. The method of claim 4, wherein step (d) further comprises identifying the second isolation environment on which the resource resides. 6. The method of claim 1, wherein step (c) further comprises consulting a registry, responsive to failing to receive a second identifier from the association. 7. The method of claim 1, wherein step (e) further comprises associating the second identifier with the resource, the isolation environment, the application scope on which to launch the resource, and a description of a method for launching the resource into second isolation environment comprising a second application isolation layer and a second user isolation layer. 8. The method of claim 1, wherein step (g) further comprises transmitting to a second process the second identifier. 9. The method of claim 8, wherein step (g) further comprises executing, by the second process, the resource. 10. The method of claim 1, wherein step (g) further comprises communicating, by the application program with the resource. 11. The method of claim 1, wherein step (g) further comprises making, by the resource, a modification to a display region associated with the application program. 12. The method of claim 1, further comprising the application isolation scope and a user isolation scope provided by the user isolation layer each comprising an instance of the resource. 13. The method of claim 1, further comprising the application program storing the association of the first identifier and the resource in the registry. 14. The method of claim 13, further comprising storing the first identifier with information needed to launch the resource. 15. The method of claim 1, further comprising a mapping table storing the association of the first identifier and the resource, the second identifier, and launch parameters for the resource. 16. The method of claim 15, further comprising dynamically creating an association between a resource and an isolation scope to the second identifier. 17. The method of claim 1, wherein step (a) further comprises the request specifying an isolation scope to be used. 18. The method of claim 1, further comprising executing a resource into a isolation scope according to a pre-determined preference listing. 19. A system for accessing resources provided by an operating system executing on a computer processor, comprising: a processor;a resource provided by an operating system executing on a computer processor;an application program executing inside an isolation environment comprising an application isolation layer and a user isolation layer, receiving a request for the resource;an association between a first identifier associated with the resource and a second identifier associated with the isolation environment;a hook process acquiring the first identifier associated with the resource;identifying the resource and an application scope provided by the application isolation layer on which to execute the resource;storing in the association the second identifier;storing a registry key for the resource; anda second process, redirecting to the resource, responsive to the second identifier, the request for the resource, and launching, reponsive to the second identifier, the requested resource in the application scope of the isolation environment. 20. The system of claim 19, wherein the resource further comprises a COM server. 21. The system of claim 19, wherein the resource further comprises at least one registry entry in the isolation environment on which the resource resides. 22. The system of claim 19, wherein the resource resides on a second isolation environment comprising a second application isolation layer and a second user isolation layer. 23. The system of claim 22, wherein the application program further comprises executing inside second application scope provided by the second isolation environment. 24. The system of claim 19, wherein the application program comprises executing inside the application scope of the isolation environment. 25. The system of claim 19, wherein the application program executing inside the isolation environment comprises making a request for a resource. 26. The system of claim 19, wherein the association further comprises a mapping from the first identifier identifying at least one resource and second isolation environment comprising a second application isolation layer and a second user isolation layer in which the resource resides to the second identifier. 27. The system of claim 19, wherein the hook process further comprises consulting the association, responsive to the first identifier. 28. The system of claim 19, wherein the hook process further comprises determining, responsive to consulting the association, to consult a registry within second isolation environment comprising a second application isolation layer and a second user isolation layer. 29. The system of claim 19, wherein the hook process further comprises determining, responsive to consulting the association, to consult a registry within the application scope. 30. The system of claim 19, wherein the hook process further comprises determining, responsive to consulting the association, to consult a registry within the second isolation environment. 31. The system of claim 19, wherein the hook process further comprises identifying the resource and second isolation environment on which it resides, responsive to consulting the registry. 32. The system of claim 19, wherein the hook process and the second process are the same process.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (163)
Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques.
Joseph Kuriacose ; Jessup ; Jr. Ansley Wayne ; Dureau Vincent ; Delpuch Alain, Apparatus for transmitting and receiving executable applications as for a multimedia system.
Trower ; II Tandy W. ; Weinberg Mark Jeffrey ; Merrill John Wickens Lamb, Client server animation system for managing interactive user interface characters.
Pettus Christopher E. (San Francisco CA) Loomis Donald R. (Saratoga CA) Warren Christina E. (Cupertino CA), Client server system and method of operation including a dynamically configurable protocol stack.
Hayes ; Jr. Kent Fillmore, Client-server system with central application management and providing export agent capability for retrofitting existing hardware and applications into the system.
Shah, Lacky Vasant; Arai, Daniel Takeo; Benitez, Manuel Enrique; Holler, Anne Marie; Wohlgemuth, Robert Curtis, Client-side performance optimization system for streamed applications.
Alimpich Claudia C. ; Boldt Gerald D. ; Doescher Calvin Larry ; Goddard Joan Stagaman ; Wittig James Philip, Dynamically modifying a graphical user interface window title.
Adams, Thomas L.; Chorley, Will R.; Cunetto, Philip C.; Doherty, James M.; LeMay, John E.; Mueller, Stephen M.; Parolkar, Satish; Schroeder, Timothy P.; Slaten, Charles B., Flexible network platform and call processing system.
Alford, Jr.,Jack Allen; Beesley,James Bruce; Nasypany,Stephen Raymond, Graphical user interface for visualization of sampled data compared to entitled or reference levels.
Bendert Edward Joseph (Vestal NY) Bennett Robert Bradley (Endwell NY) Berman Eve Suzanne (Binghamton NY) Farrell Susan Marie (Vestal NY) Johnson Eugene (Vestal NY) Nugent Robert Michael (Nichols NY) , Heterogeneous filing system with common API and reconciled file management rules.
Wies Evan F. ; Chang Dean C. ; Rosenberg Louis B. ; Tan Sian W. ; Mallett Jeffrey R., Implementing force feedback over the World Wide Web and other computer networks.
Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
Hao Ming C. ; Karp Alan H ; Garfinkel Daniel ; Young Charles ; Fincher Thomas G., Mechanism to control and use window events among applications in concurrent computing.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
Kumar Vijay P. (Freehold NJ) Stahl Mark E. (Pittsburgh PA), Method and apparatus for executing a distributed algorithm or service on a simple network management protocol based comp.
Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
Johnson Lucinda L. (Oakdale MN) Peltier Clayton A. (Chisago City MN) Kuehn Scott H. (St. Paul MN) Frank William D. (New Brighton MN), Method and apparatus for using an independent transaction processing application as a service routine.
Bobby G. Doran, Jr. ; Bill Hyden ; Terry Wayne Liles, Method and apparatus for windows-based installation for installing software on build-to-order computer systems.
Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
Cummings Christopher R., Method and system for allowing a single-user application executing in a multi-user environment to create objects having both user-global and system global visibility.
Tracy William X. ; Roslak Thomas K. ; Murrah Judith ; Riso Francis ; Beach Robert ; Sandler Robert, Method and system for presenting item information using a portable data terminal.
Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., Method of redirecting a client service session to a second application server without interrupting the session by forwa.
Glaser,Howard J.; England,Laurence E.; Poole,Rebecca Lau; Xia,Chenhong, Method, system, computer program product, and article of manufacture for downloading a remote computer program according to a stored configuration.
Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Burghfield Common NH GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA), Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment.
Cox, David E.; Hayes, Jr., Kent F.; Lindquist, David B.; McGarvey, John R.; Salahshour, Abdi, Methods, systems and computer program products for centralized management of application programs on a network.
Kawabe Shigehisa,JPX ; Hashimoto Sunao,JPX ; Yamashita Ichiro,JPX ; Horikiri Kazunori,JPX, Name service apparatus using resource management, name resolution and virtual resource realization for realizing a virt.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA 4), Object container transfer system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object oriented representation of network requests in a client server model.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA), Object transferring system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object-oriented communication interface for network protocol access using the selected newly created protocol interface.
Gish Sheri L., Object-oriented system, method and article of manufacture for a client-server event driven message framework in an interprise computing framework system.
Bennett John G. ; Dalal Ketan, Processing multiple database transactions in the same process to reduce process overhead and redundant retrieval from database servers.
Cowan Richard ; Eckley Gordon P. ; Panchangam Prasad V. R. ; Leong Winston C. W., Server for starting client application on client if client is network terminal and initiating client application on ser.
East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
Conner Mike H. (Austin TX) Martin Andrew R. (Austin TX) Raper Larry K. (Austin TX), System and method for parent class shadowing in a statically linked object hierarchy.
Bale Richard C. (Alpharetta GA) Rich William L. (Stone Mountain GA) Shackelford Floyd W. (Beauford GA), System and method for run time configuration of objects in an object oriented computing environment.
Lai Meichen (San Jose CA) Lee Tony Kuen (San Jose CA) Nishimura Jenny Y. K. (San Jose CA) Shank Gerda R. (San Francisco CA), System and procedure for concurrent database access by multiple user applications through shared connection processes.
Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
Henson Larry W. (Austin) Shaheen-Gouda Amal A. (Austin) Smith Todd A. (Austin TX), System for file and record locking between nodes in a distributed data processing environment maintaining one copy of ea.
Brooks Matthew G. ; Young Russell T., System for replicating and associating file types with application programs among plurality of partitions in a server.
Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
Bennett, Brian T.; Leff, Avraham; Mikalsen, Thomas A.; Rayfield, James T.; Rouvellou, Isabelle M., Transparent general purpose object isolation for multi-tier distributed object environments.
Talati Kirit K. (Sunnyvale TX) Lackie C. Willard (Garland TX), Virtual software machine which preprocesses application program to isolate execution dependencies and uses target comput.
Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.
Shrader Theodore Jack London ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shi Shaw-Ben, Web server account manager plug-in for monitoring resources.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.