$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for virtualizing window information 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-003/048
출원번호 US-0711733 (2004-09-30)
등록번호 US-8117559 (2012-02-14)
발명자 / 주소
  • Laborczfalvi, Lee George
  • Roychoudhry, Anil
  • Borzycki, Andrew Gerard
  • Chin, Huai Chiun
  • Mazzaferri, Richard James
출원인 / 주소
  • Citrix Systems, Inc.
대리인 / 주소
    Foley & Lardner LLP
인용정보 피인용 횟수 : 2  인용 특허 : 101

초록

A method and apparatus for virtualizing access to windows includes a hooking mechanism, a window name virtualization engine, and an operating system interface. A request relating to a window from a process executing in the context of a user account is received, the request including a virtual window

대표청구항

1. A method for virtualizing access to windows, the method comprising: receiving a request relating to a window from a process executing within the context of a user isolation scope, the request including a virtual window name, and wherein the user isolation scope is provided by an isolation environ

이 특허에 인용된 특허 (101)

  1. Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
  2. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  3. Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques.
  4. Joseph Kuriacose ; Jessup ; Jr. Ansley Wayne ; Dureau Vincent ; Delpuch Alain, Apparatus for transmitting and receiving executable applications as for a multimedia system.
  5. Miloushev,Vladimir; Nickolov,Peter; Hester,Becky L.; Marinov,Borislav S., Apparatus, method and system for aggregrating computing resources.
  6. Hollander,Yona; Rachman,Ophir; Horovitz,Oded, Application program interface interception system and method.
  7. Demsey,Seth M.; Holden,Scott K.; Zintel,William Michael; Smith,Brian J.; Huynh,Tuan, Associating a native resource with an application.
  8. Parker Marsten Hugh ; Kepple Laurence Ralph ; Sklar Leah Ruth ; Laroche David Christopher, Automated GUI interface testing.
  9. Patel, Amit; Pujare, Sanjay; Ryan, Nicholas; Lin, David, Client installation and execution system for streamed applications.
  10. Shah, Lacky Vasant; Arai, Daniel Takeo; Benitez, Manuel Enrique; Holler, Anne Marie; Wohlgemuth, Robert Curtis, Client-side performance optimization system for streamed applications.
  11. Brandt, Andre R.; Frueh, Barbara; Pillai, Sajan J.; Rehder, Karl; Shearer, Donald J., Data warehousing infrastructure for web based reporting tool.
  12. Gainer Patrick J. ; Hamilton James R. ; Verma Surendra, Dynamic symbolic links for computer file systems.
  13. Alimpich Claudia C. ; Boldt Gerald D. ; Doescher Calvin Larry ; Goddard Joan Stagaman ; Wittig James Philip, Dynamically modifying a graphical user interface window title.
  14. Bluhm,Mark; Getting,Bruce; Hayft,Mark; Walz,Shirley, Electronic document repository management and access system.
  15. Masinter,Larry; Webster,Roger, File dispatcher for multiple application targets.
  16. Adams, Thomas L.; Chorley, Will R.; Cunetto, Philip C.; Doherty, James M.; LeMay, John E.; Mueller, Stephen M.; Parolkar, Satish; Schroeder, Timothy P.; Slaten, Charles B., Flexible network platform and call processing system.
  17. Alford, Jr.,Jack Allen; Beesley,James Bruce; Nasypany,Stephen Raymond, Graphical user interface for visualization of sampled data compared to entitled or reference levels.
  18. Goldberg Robert P. (Newton Highlands MA), Hardware virtualizer for supporting recursive virtual computer systems on a host computer system.
  19. Bendert Edward Joseph (Vestal NY) Bennett Robert Bradley (Endwell NY) Berman Eve Suzanne (Binghamton NY) Farrell Susan Marie (Vestal NY) Johnson Eugene (Vestal NY) Nugent Robert Michael (Nichols NY) , Heterogeneous filing system with common API and reconciled file management rules.
  20. Ikemoto Hiroyuki (Tokyo JPX), Icon display apparatus.
  21. Wies Evan F. ; Chang Dean C. ; Rosenberg Louis B. ; Tan Sian W. ; Mallett Jeffrey R., Implementing force feedback over the World Wide Web and other computer networks.
  22. Raz Uri, Information transfer systems and method with dynamic distribution of data, control and management of information.
  23. Blaser,Jared Ricks; Cook,Randall Richards, Layered computing systems and methods.
  24. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
  25. Crowley Paul ; Jaugilas John ; Nash Alex ; Natesan Senthil ; Lampert David S., Memory management for navigation system.
  26. Zhao, Yan, Method and an apparatus for providing personalized service.
  27. Liao, Hanqing; King, Peter F.; Greer, Russell S., Method and apparatus for caching credentials in proxy servers for wireless user agents.
  28. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  29. Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
  30. Fell, Jr., Channing W., Method and apparatus for network resource access request redirection.
  31. Craycroft Timothy J., Method and apparatus for organizing window groups and windows in a table.
  32. Schmidt,Brian Keith, Method and apparatus for providing virtual namespaces for active computing environments.
  33. Schmeidler,Yonah; Atkins,Derek; Eichin,Mark W.; Rostcheck,David J., Method and apparatus for secure content delivery over broadband access networks.
  34. Bobby G. Doran, Jr. ; Bill Hyden ; Terry Wayne Liles, Method and apparatus for windows-based installation for installing software on build-to-order computer systems.
  35. Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
  36. Berliner Brian, Method and computer program product to reuse directory search handles.
  37. Foulkes, Jonathan; Steinmann, Frank, Method and system for a session allocation manager ("SAM").
  38. Cummings Christopher R., Method and system for allowing a single-user application executing in a multi-user environment to create objects having both user-global and system global visibility.
  39. Hamilton,Keith S.; Jamieson,Steve, Method and system for application partitions.
  40. Turpin Kevin J. ; Clark Christopher P., Method and system for client/server and peer-to-peer disk imaging.
  41. Eylon, Dan; Ramon, Amit; Volk, Yehuda; Raz, Uri; Melamed, Shmuel, Method and system for executing network streamed application.
  42. Tracy William X. ; Roslak Thomas K. ; Murrah Judith ; Riso Francis ; Beach Robert ; Sandler Robert, Method and system for presenting item information using a portable data terminal.
  43. Young, Jeff; Copeland, Bruce W., Method and system for remote client installation.
  44. Greschler,David M.; Mysliwy,Owen; Schaefer,Stuart, Method and system for serving software applications to client computers.
  45. Romm, Amnon, Method for caching information between work sessions.
  46. Baisley, Donald Edward, Method for controlling access to a multiplicity of objects using a customizable object-oriented access control hook.
  47. Gupta, Arun Kumar, Method for controlling access to information.
  48. Peart, Franklyn, Method for distributed program execution with server-based file type association.
  49. Peart,Franklyn; Richtberg,Michael, Method for distributed program execution with web-based file-type association.
  50. Czajkowski, Grzegorz J., Method for improving the performance of safe language multitasking.
  51. Straub Eric (Kirkland WA) Dryfoos Mike (Bothell WA), Method for revising a program to obtain compatibility with a computer configuration.
  52. Bloomfield Marc A. (Lighthouse Point FL), Method of transferring programs from action oriented GUI paradigm to object oriented GUI paradigm.
  53. Peart,Franklyn, Methods for distributed program execution with file-type association in a client-server network.
  54. Cox, David E.; Hayes, Jr., Kent F.; Lindquist, David B.; McGarvey, John R.; Salahshour, Abdi, Methods, systems and computer program products for centralized management of application programs on a network.
  55. Koved Lawrence, Multiple resource or security contexts in a multithreaded application.
  56. Kawabe Shigehisa,JPX ; Hashimoto Sunao,JPX ; Yamashita Ichiro,JPX ; Horikiri Kazunori,JPX, Name service apparatus using resource management, name resolution and virtual resource realization for realizing a virt.
  57. Kouya Shimura JP, Network computer system and substitute compile server.
  58. Hughes, Trevor, Networked computer system.
  59. Gish Sheri L., Object-oriented system, method and article of manufacture for a client-server event driven message framework in an interprise computing framework system.
  60. Gish Sheri L., Object-oriented system, method and article of manufacture for migrating a client-server application (#5).
  61. Schaefer,Stuart, Operating system abstraction and protection layer.
  62. Yakov Rekhter ; Eric C. Rosen, Peer-model support for virtual private networks with potentially overlapping addresses.
  63. Eylon, Dan; Ramon, Amit; Volk, Yehuda, Preprocessed applications suitable for network streaming applications and method for producing same.
  64. Bennett John G. ; Dalal Ketan, Processing multiple database transactions in the same process to reduce process overhead and redundant retrieval from database servers.
  65. Wilner,David N.; Fogelin,John C.; Long,Kent D.; Preyssler,Thierry C.; Koning,Maarten A.; Gordon,John; Myers,Cy H., Protection domains for a computer operating system.
  66. Oppermann Charles ; Butler Laura J. ; Donie Steven M. ; Wong Peter Kam-Ho, Providing access to user interface elements of legacy application programs.
  67. Romm, Amnon; Elkoni, Avi, Registry emulation.
  68. Brittingham,Peter; Forer,Douglas; Bentley,Kevin, Remote computer capabilities querying and certification.
  69. Czajkowski, Grzegorz J., Safe language static variables initialization in a multitasking system.
  70. Jonathan Scott Greenfield ; John Ryan McGarvey, Securely sharing log-in credentials among trusted browser-based applications.
  71. Wood, David L.; Pratt, Thomas; Dilger, Michael B.; Norton, Derk; Nadiadi, Yunas, Security architecture with environment sensitive credential sufficiency evaluation.
  72. Czajkowski, Grzegorz J., Small memory footprint system and method for separating applications within a single virtual machine.
  73. Czajkowski, Grzegorz J., Small memory footprint system and method for separating applications within a single virtual machine.
  74. Hashimoto Hideki (Kanagawa-ken JPX) Nagata Yoshifumi (Kanagawa-ken JPX) Seto Shigenobu (Kanagawa-ken JPX) Takebayashi Yoichi (Kanagawa-ken JPX) Shinchi Hideaki (Kanagawa-ken JPX) Yamaguchi Koji (Chib, Speech recognition interface system suitable for window systems and speech mail systems.
  75. Raz Uri ; Volk Yehuda,ILX ; Melamed Shmuel,ILX, Streaming modules.
  76. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  77. Belani, Eshwar; Katiyar, Dinesh; Garg, Suneet, System and method for controlling access to resources in a distributed environment.
  78. Jonathan Virgil Ziebell, System and method for incorporating changes as a part of a software release.
  79. Czajkowski, Grzegorz J., System and method for minimizing inter-application interference among static synchronized methods.
  80. Fresko,Nedim, System and method for performing speculative initialization of application models for a cloned runtime system process.
  81. Friedman,George; Starek,Robert Phillip; Murdock,Carlos A., System and method for providing data security.
  82. Subrahmanyam, Pratap, System and method for remote file access by computer.
  83. Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
  84. Nanja,Sekaran, System for configuration of dynamic computing environments using a visual interface.
  85. Brooks Matthew G. ; Young Russell T., System for replicating and associating file types with application programs among plurality of partitions in a server.
  86. Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
  87. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  88. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  89. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  90. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
  91. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
  92. Appiah, Madan Mohan R.; Wang, Huei Chung; Brockway, Tad D., Systems and methods for unified remote control access.
  93. Iyoki,Yutaka, Terminal apparatus, network system and communication method including opening of received document file.
  94. Miloushev, Vladimir; Nickolov, Peter, Transaction aggregation in a switched file system.
  95. Bennett, Brian T.; Leff, Avraham; Mikalsen, Thomas A.; Rayfield, James T.; Rouvellou, Isabelle M., Transparent general purpose object isolation for multi-tier distributed object environments.
  96. Beck, John T.; Price, Daniel B.; Praza, Liane; Leonard, Ozgur C.; Tucker, Andrew G., Two-level service model in operating system partitions.
  97. Rekhter, Yakov; Rosen, Eric C., Virtual private network employing tag-implemented egress-channel selection.
  98. Beloussov,Serguei M.; Protassov,Stanislav S.; Tormasov,Alexander G., Virtual private server with enhanced security.
  99. Hipp,Burton A.; Bharadhwaj,Rajeev; Romans,William C.; Yeh,Yuh yen, Virtual resource ID mapping.
  100. Talati Kirit K. (Sunnyvale TX) Lackie C. Willard (Garland TX), Virtual software machine which preprocesses application program to isolate execution dependencies and uses target comput.
  101. Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.

이 특허를 인용한 특허 (2)

  1. Hassanzadeh, Amin, Mapping process changes.
  2. Hassanzadeh, Amin, Mapping process changes.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로