Policy based composite file system and method
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/00
H04L-029/06
출원번호
US-0264747
(2005-10-31)
등록번호
US-8099758
(2012-01-17)
발명자
/ 주소
Schaefer, Stuart
Schmeidler, Yonah
Levin, Ilya
출원인 / 주소
Microsoft Corporation
대리인 / 주소
Woodcock Washburn LLP
인용정보
피인용 횟수 :
25인용 특허 :
168
초록▼
A policy configurable file system includes a computer system upon which the policy configurable file system operates, a policy source for providing the configuration policies, and one or more file servers. The computer system includes software for enforcing one or more configuration policies. The po
A policy configurable file system includes a computer system upon which the policy configurable file system operates, a policy source for providing the configuration policies, and one or more file servers. The computer system includes software for enforcing one or more configuration policies. The policy source is typically either a policy server such that the policy is derived from the policy server, or a policy configurable file system, such that the policy is embedded in the policy configurable file system. The one or more file servers each uses a protocol, wherein the protocols of the one or more file servers are not all the same. In one case, the one or more of the configurable policies are separable from the policy configurable file system. In another case, the one or more configurable policies are downloadable to the computer system.
대표청구항▼
1. A policy configurable system, comprising: a processor;a computer readable storage medium coupled to the processor, the computer readable storage medium including: instructions for effectuating a local file system associated with a first policy, wherein the local file system manages local files st
1. A policy configurable system, comprising: a processor;a computer readable storage medium coupled to the processor, the computer readable storage medium including: instructions for effectuating a local file system associated with a first policy, wherein the local file system manages local files stored in the computer readable storage medium;instructions for downloading a second file system associated with a second policy including an application and a configuration file for the application;instructions for downloading the second policy, the second policy configured to identify a location remote from the second file system to store modifications to the configuration file;instructions for effectuating a virtual file system, the virtual file system configured to integrate the local files with files in the second file system into a common namespace;instructions for integrating the first policy with the second policy to form an integrated policy;instructions for executing the application;instructions for receiving a request to modify the configuration file; andinstructions for copying the configuration file and modifying the copy of the configuration file in accordance with the request;instructions for storing the modified copy of the configuration file in the location remote from the second file system in accordance with the second policy. 2. The policy configurable system of claim 1, wherein each policy is formed from one or more separate policies. 3. The policy configurable system of claim 1, wherein the second policy is downloaded from a policy server via a public network. 4. The policy configurable system of claim 1, wherein the integrated policy is formed from the second policy, the second policy having been downloaded from the policy server and the first policy, the first policy having been stored in the computer readable storage medium. 5. The policy configurable system of claim 1, wherein the computer readable storage medium further comprises: instructions for a file system interface configured to receive file system access calls and send them to the virtual file system. 6. The policy configurable system of claim 5, wherein the integrated policy defines how registry entries are stored. 7. The policy configurable system of claim 1, wherein the computer readable storage medium further comprises: instructions for selecting the second policy in accordance with information that identifies a logged in user account. 8. The policy configurable system of claim 1, wherein the second file system comprises a BRIQ. 9. A computer implemented method, comprising: executing a first file system on a computer system, wherein the first file system includes a first set of one or more files and is associated with a first policy;downloading a second file system that includes a second set of one or more files for an application;downloading a second policy, wherein the second policy indicates that modifications to configuration data for the application are stored within a file in the first file system;integrating, by a virtual file system, the first set of one or more files and the second set of one or more files into a common namespace;integrating the first policy and the second policy into an integrated policy;receiving a request to modify configuration data for the application; andstoring the modifications to the configuration data for the application within the file in the first file system. 10. The composite file system method of claim 9, wherein files stored in the downloaded second file system include at least one read-only part and at least one read-write part. 11. The composite file system method of claim 9, wherein the integrated policy is formed from the second policy and the first policy, the first policy being locally resident on the computer system. 12. The composite file system method of claim 9, wherein the downloaded file system includes application configuration files. 13. The composite file system method of claim 9, wherein the first file system includes user configuration files including user preference information for the application. 14. The composite file system method of claim 9, wherein the integrated policy controls data read and write operations. 15. The composite file system method of claim 9, wherein the integrated policy defines how registry entries are stored. 16. The composite file system method of claim 9, wherein the second policy is selected in accordance with information that identifies a logged in user account. 17. The composite file system method of claim 16, wherein the second policy is downloaded from the one or more servers. 18. The composite file system method of claim 16, wherein the second policy is downloaded from a plurality of locations. 19. A computer readable storage medium including computer executable instructions that upon execution by a processor cause the processor to: execute a first file system associated with a first policy;download a second file system, wherein the second file system includes an application and a configuration file for the application;download a second policy associated with the second file system;determine that modifications to the configuration file for the application are stored in the first file system based on information in the second policy and information identifying a user account logged into the operating system;execute a virtual file system that integrates the first file system and the second files system into a common namespace;integrate the first policy with a second policy;receive a request to modify the configuration file for the application;store the modifications to the configuration file in the first file system in accordance with the second policy. 20. The computer readable storage medium of claim 19, further comprising instructions that upon execution by the processor cause the processor to: store a copy of a modified configuration file in the first file system. 21. The computer readable storage medium of claim 19, further comprising instructions that upon execution by the processor cause the processor to: store blocks of changed data that are indicative of the modifications in the first file system. 22. The computer readable storage medium of claim 21, wherein the second policy is downloaded from the one or more servers. 23. The computer readable storage medium of claim 19, further comprising instructions that upon execution by the processor cause the processor to: integrate the first file system and the second file system into the common namespace in accordance with information in a symlink. 24. The computer readable storage medium of claim 19, further comprising instructions that upon execution by the processor cause the processor to: integrate the first file system and the second file system into the common namespace, wherein the common namespace is common across a plurality of remote volumes. 25. The computer readable storage medium of claim 19, wherein each volume includes a downloadable file system. 26. The computer readable storage medium of claim 19, wherein the remote volume includes application configuration files.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (168)
Hoang Thao M., Adaptive interface controller that can operate with segments of different protocol and transmission rates in a single integrated device.
Belove Edward (Cambridge MA) Johnson R. Patrick (Manchester MA) Leland ; III O. Stevens (Hudson MA) Mendez Deborah (Malden MA) Zagieboylo Stephen (Norfolk MA), Apparatus using circuit manager to associate a single circuit with each host application where the circuit is shared by.
Hind John Raithel ; Lindquist David Bruce ; Nanavati Pratik Biharilal ; Tan Yih-Shin ; Wesley Ajamu Akinwunmi, Applet redirection for controlled access to non-orginating hosts.
Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
Schmidt, Rene W.; Muller, Hans E.; Violet, Scott R., Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer.
Drewry Raymond G. ; George David ; Epperson Dirk, Client/server system with methods for prefetching and managing semantic objects based on object-based prefetch primitive.
Amstein Peter R. ; Blumer Thomas P. ; Coburn ; IV Arthur L. ; Forgaard Randy J. ; Schulert Andrew J. ; Stefanik Ted ; Mauceri Robert J., Computer system and computer-implemented process for creation and maintenance of online services.
Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Robert G. Atkinson ; James W. Kelly, Jr. ; Bryan W. Tuttle ; Robert M. Price ; Robert P. Reichel, Embedding certifications in executable files for network transmission.
Meisner, Gregory P.; Pinkerton, Frederick E.; Meyer, Martin S.; Balogh, Michael P.; Kundrat, Matthew D., Imide/amide hydrogen storage materials and methods.
Moezzi Saied ; Katkere Arun ; Jain Ramesh, Immersive video, including video hypermosaicing to generate from multiple video views of a scene a three-dimensional v.
Boucher Laurence B. ; Blightman Stephen E. J. ; Craft Peter K. ; Higgen David A. ; Philbrick Clive M. ; Starr Daryl D., Intelligent network interface system method for protocol processing.
Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
Dale Geoffrey W. ; Swenson Eric J. ; Skok Michael J. ; Stave Matthew ; Boehm Jeffrey S. ; Poonen Sanjay J., Mechanism for automatically establishing connections between executable components of a hypertext-based application.
Sambamurthy Namakkal S. ; Tripathi Devendra K. ; Deb Alak K. ; Truong Linh Tien ; Kumar Praveen D., Media access control receiver and network management system.
Pashupathy Anand ; Korn Rodney A., Method and apparatus for automating a software delivery system by locating, downloading, installing, and upgrading of viewer software.
Pistriotto Joseph C. ; Montinola Katrina, Method and apparatus for configuring a client to redirect requests to a caching proxy server based on a category ID with the request.
Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
Cooper Thomas Edward ; Philips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryptio.
Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
Bittinger Reed Richard ; Housel ; III Barron Cornelius ; Lindquist David Bruce ; Munson Jonathan Paul, Method and apparatus for optimal rebasing of web page transmission using a plurality of different rebasing tests and a Cost-Effectiveness determination.
Laursen Andrew ; Olkin Jeffrey C. ; Porter Mark A. ; Nazem Farzad ; Bailey William ; Moore Mark, Method and apparatus for scalable, high bandwidth storage retrieval and transportation of multimedia data on a network.
Lambert Mark L. ; van der Rijn Daniel J. G. ; Kemper David J. ; Verkler Jay L., Method and apparatus for storing and delivering documents on the internet.
Alexander ; III William Preston ; Berry Robert Francis ; Mulvey Donald L. ; Urquhart Robert John, Method and apparatus for structured profiling of data processing systems and applications.
Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
Boyle Stephen S. ; Fox Mark A. ; Ramasubramani Seetharaman ; Schwartz Bruce V. ; Martin ; Jr. Bruce K. ; King Peter F. ; Liao Hanqing, Method and system for pushing and pulling data using wideband and narrowband transport systems.
Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
Dean Jeffrey ; Eustace Robert A. ; Hicks James E. ; Waldspurger Carl A. ; Weihl William E., Method for estimating execution rates of program execution paths.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Igawa,Masaru; Takiyasu,Yoshihiro, Method of and an apparatus for controlling a web server, a web server control program, and a storage medium on which the web server control program is stored.
Cox David E. ; Hayes ; Jr. Kent F. ; Kaminsky David L. ; Lindquist David B., Methods, systems and computer program products for management of configurable application programs on a network.
McDonald John Maurice,CAX ; Hillson Andrew Raines,CAX ; Fielding Bruce Allen,CAX ; Judd James Marshall ; Isgro Nick,CAX ; Jansen Bernard Gerald,CAX, Multimedia public communication services distribution method and apparatus with distribution of configuration files.
Jewett Douglas E. (Austin TX), Multiprocessor system with each processor executing the same instruction sequence and hierarchical memory providing on d.
Tzelnic Percy ; Vahalia Uresh K ; Ting Dennis P.J. ; Gupta Uday, Network file server using a cached disk array storing a network file directory including file locking information and da.
Eshel Marc ; Kienzle Martin Gerhard ; McNabb Daniel Lloyd ; Rose Raymond Edward ; Schmuck Frank Bernhard, Phantom files for dynamic read bandwidth measurements of computer disks.
Butman Ronald A. ; Ramachandran Raja ; Burns Thomas A. ; Malone Thomas J. ; Kmiec Michael D. ; Dougherty Joseph C., Publication network control system using domain and client side communications resource locator lists for managing infor.
Hooper Donald F. (Shrewsbury MA) Goldman Matthew S. (Marlborough MA) Bixby Peter C. (Westborough MA) Krishnamoorthy Suban (Shrewsbury MA), Segmented video on demand system.
Toyouchi Junichi,JPX ; Mori Kinji,JPX ; Kawano Katsumi,JPX ; Honda Yoshinori,JPX ; Hirasawa Shigeki,JPX, Service providing system for providing services suitable to an end user request based on characteristics of a request, attributes of a service and operating conditions of a processor.
Franklin D. Chase ; Remington Darren B. ; Saliba Bassam ; Speelpenning Bert ; Cockrill Michael, System and method for conducting commerce over a distributed network.
Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
Steven W Rogers ; George M. Gill ; Jean de Belleuille ; Michael J. Kling, III ; Michael L. Baird, System and method for distributed computer automotive service equipment.
Atkin Steven Edward ; Borgendale Kenneth Wayne ; Howard John D, System and method for managing multiple cultural profiles in an information handling system.
Brian Kenner ; Kenneth W. Colby ; Lonnie J. Brownell ; Guy P. Weathersby, System and method for selection and retrieval of diverse types of video data on a computer network.
Kells Timothy Roger ; Peebles Thomas Frank, System and method for supporting distributed computing mechanisms in a local area network server environment.
Lynn Erich Peterson ; Mack Edward Phelps ; Gary Roy Shippy ; John Douglas Wright, System and method for transferring information over a computer network.
Viswanathan Srinivasan ; Nazari Siamak ; Swaroop Anil ; Khalidi Yousef, System and method for transparent, global access to physical devices on a computer cluster.
Dunn James M. ; Ganek Alan G. ; Stern Edith H. ; Willner Barry E., System and method of operation for providing user's security on-demand over insecure networks.
Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
Marlin James Warden ; Knudson Raymond Lowell ; Ruehle Thomas Michael ; Stuart Anthony Franke ; Hughes ; III Edward Thomas, System for extending the desktop management interface at one node to a network by using pseudo management interface, ps.
Dan Asit ; Tetzlaff William H. ; Sitaram Dinkar, System for providing custom functionality to client systems by redirecting of messages through a user configurable filt.
Fishler Leonard R. ; Zargham Bahman, System for transferring a data stream to a requestor without copying data segments to each one of multiple data source/s.
Croman,Joe D.; Anderson,Christopher N.; Rees,Robert; Silverman,Seth; Sered,Yishai; Eichin,Mark W., Systems and methods for delivering content over a computer network.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
Boisjolie, Darren Ronald; Haadsma, David Kent; Balasubramaniam, Gandhi; Berkemeyer, Jr., Van A.; Cotter, Amy L.; Cotter, Robert B.; Covington, Gary S.; Majoran, Raymond, Systems and methods for multi-layered packet filtering and remote management of network devices.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Laurence B. Boucher ; Stephen E. J. Blightman ; Peter K. Craft ; David A. Higgen ; Clive M. Philbrick ; Daryl D. Starr, TCP/IP offload network interface device.
Chiles Anthony A. ; Chiles David C. ; Manbeck ; Jr. Jackie Lee ; Nguyen Vu Hoanh, Technique for automatically updating software stored on a client computer in a networked client-server environment.
Granger, Mark J.; Smith, Cyrus E.; Hoffman, Matthew I., Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications.
Sampat Ketan (Portland OR) Kembel John (Lake Oswego OR), User interface, method, and apparatus selecting and playing channels having video, audio, and/or text streams.
Hooper Donald F. (Shrewsbury MA) Goldman Matthew S. (Marlborough MA) Bixby Peter C. (Westborough MA) Krishnamoorthy Suban (Shrewsbury MA), Video on demand with memory accessing and or like functions.
Cai, Hao; Michels, Timothy S.; Szabo, Paul I., Hardware assisted flow acceleration and L2 SMAC management in a heterogeneous distributed multi-tenant virtualized clustered system.
Amir, Arnon; Imaino, Wayne I.; Pease, David A.; Richter, Rainer, Primary storage media with associated secondary storage media for efficient data management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.