Method for accessing, by application programs, resources residing inside an application isolation scope
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-009/46
G06F-009/455
출원번호
US-0231317
(2005-09-19)
등록번호
US-8132176
(2012-03-06)
발명자
/ 주소
Bissett, Nicholas Alexander
Roychoudhry, Anil
Mazzaferri, Richard James
출원인 / 주소
Citrix Systems, Inc.
대리인 / 주소
Foley and Lardner LLP
인용정보
피인용 횟수 :
7인용 특허 :
176
초록▼
In a method for accessing, by application programs, resources provided by an operating system, a process receives a request for a resource and an identifier associated with the resource. It is determined that the requested resource resides inside an application isolation environment. The request for
In a method for accessing, by application programs, resources provided by an operating system, a process receives a request for a resource and an identifier associated with the resource. It is determined that the requested resource resides inside an application isolation environment. The request for the resource and the identifier associated with the resource is redirected to the application isolation environment. The request for the resource is responded to using an instance of the resource residing inside the application isolation environment.
대표청구항▼
1. A method for accessing, by application programs, resources provided by an operating system, the method comprising: (a) receiving, by a process executing inside a first application isolation scope provided by an application isolation layer, but outside second application isolation scope provided b
1. A method for accessing, by application programs, resources provided by an operating system, the method comprising: (a) receiving, by a process executing inside a first application isolation scope provided by an application isolation layer, but outside second application isolation scope provided by an application isolation layer, a request for a resource and an identifier associated with the resource from a process executing inside the second application isolation scope, wherein an application isolation layer and a user isolation layer together comprise an isolation environment;(b) determining that the requested resource resides inside the first application isolation scope;(c) redirecting the request for the resource and the identifier associated with the resource to the first application isolation scope; and(d) responding to the request for the resource using an instance of the resource residing inside the first application isolation scope. 2. The method of claim 1, wherein step (b) further comprises determining, by the process executing outside the first application isolation scope, that the requested resource resides in the first application isolation scope. 3. The method of claim 1, wherein step (c) further comprises redirecting, by the process executing outside the first application isolation scope, the request for the resource and the identifier associated with the resource to the first application isolation scope. 4. The method of claim 1, wherein step (d) further comprises responding, by the process executing outside the first application isolation scope, to the request for the resource using an instance of the resource located inside the first application isolation scope. 5. The method of claim 1, wherein step (a) comprises making, by the process executing outside the first application isolation scope, a request for the resource, the request including the identifier associated with the resource. 6. The method of claim 1, wherein step (a) further comprises receiving the request for the resource and the identifier associated with the resource, the identifier comprising a class identifier identifying at least one out-of-process COM server. 7. The method of claim 1, wherein step (d) further comprises communicating with the resource over an interface provided by the process. 8. The method of claim 1, wherein step (d) further comprises modifying, by the requested resource, a window associated with the process executing outside the application isolation scope. 9. A method for accessing, by application programs, resources provided by an operating system, the method comprising: (a) receiving a request for a resource and an identifier associated with the resource;(b) determining, by a process executing inside a first application isolation scope provided by an application isolation layer, but outside second application isolation scope provided by an application isolation layer, that the requested resource resides inside the first application isolation scope but is requested by a process executing inside the second application isolation scope, wherein an application isolation layer and a user isolation layer together comprise an isolation environment;(c) redirecting the request for the resource and the identifier associated with the resource to the first application isolation scope; and(d) responding to the request for the resource using an instance of the resource residing inside the first application isolation scope. 10. The method of claim 9, wherein step (a) further comprises receiving, by the process executing outside the first application isolation scope, the request for the resource and the identifier associated with the resource. 11. The method of claim 9, wherein step (c) further comprises redirecting, by the process executing outside the first application isolation scope, the request for the resource and the identifier associated with the resource to the first application isolation scope. 12. The method of claim 9, wherein step (d) further comprises responding, by the process executing outside the first application isolation scope, to the request for the resource using an instance of the resource inside the first application isolation scope. 13. The method of claim 9, wherein step (a) comprises making the request for the resource including the identifier associated with the resource. 14. The method of claim 9, wherein step (a) further comprises receiving the request for a resource and the identifier associated with the resource, the identifier comprising a class identifier identifying at least one COM server. 15. The method of claim 9, wherein step (d) further comprises communicating with the resource over an interface provided by the process. 16. A method for accessing, by application programs, resources provided by an operating system, the method comprising: (a) receiving a request for a resource and an identifier associated with the resource from a process executing inside a first application isolation scope provided by an application isolation layer;(b) determining that the requested resource resides inside second application isolation scope provided by an application isolation layer, wherein the application isolation layer and a user isolation layer together comprise an isolation environment;(c) redirecting, by a process executing inside the first application isolation scope, the request for the resource and the identifier associated with the resource to the second application isolation scope; and(d) responding to the request for the resource using an instance of the resource residing inside the second application isolation scope. 17. The method of claim 16, wherein step (d) further comprises responding to the request for the resource, by the process executing inside the first application isolation scope, using an instance of the resource residing inside the second application isolation scope. 18. The method of claim 16, wherein step (a) comprises making the request for the resource including the identifier associated with the resource. 19. The method of claim 16, wherein step (a) further comprises receiving the request for the resource and the identifier associated with the resource, the identifier comprising a class identifier identifying at least one COM server. 20. The method of claim 16, wherein step (d) further comprises communicating with the resource over an interface provided by the process. 21. A method for accessing, by application programs, resources provided by an operating system, the method comprising: (a) receiving a request for a resource and an identifier associated with the resource from a process executing inside a first application isolation scope provided by an application isolation layer;(b) determining that the requested resource resides inside second application isolation scope provided by an application isolation layer, wherein the application isolation layer and a user isolation layer together comprise an isolation environment;(c) redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; and(d) responding, by a process executing inside the first application isolation scope, to the request for the resource using an instance of the resource residing inside the second application isolation scope. 22. The method of claim 21, wherein step (a) comprises making the request for the resource including the identifier associated with the resource. 23. The method of claim 21, wherein step (a) further comprises receiving the request for the resource and the identifier associated with the resource, the identifier comprising a class identifier, said identifier identifying at least one COM server. 24. The method of claim 21, wherein step (d) further comprises communicating, by the process executing inside the first application isolation scope, with the resource over an interface. 25. A system, comprising a computer processor, for accessing, by application programs, resources provided by an operating system comprising: a resource provided by an operating system executing on a computer processor;a first process, executing inside first application isolation scope provided by an application isolation layer, receiving a request for the resource and an identifier associated with the resource, wherein the application isolation layer and a user isolation layer together comprise an isolation environment;a second process determining that the resource resides inside a second application isolation scope;a third process redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; anda fourth process responding to the request for the resource using an instance of the resource residing in the second application isolation scope. 26. The system of claim 25, wherein the second process executes inside the second application isolation scope. 27. The system of claim 25, wherein the second process executes outside the second application isolation scope. 28. The system of claim 25, wherein the third process executes inside the second application isolation scope. 29. The system of claim 25, wherein the third process executes outside the second application isolation scope. 30. The system of claim 25, wherein the fourth process executes inside the second application isolation scope. 31. The system of claim 25, wherein the fourth process executes outside the second application isolation scope. 32. The system of claim 25, wherein the first process and the second process are sub-processes of a single process. 33. The system of claim 25, wherein the first process and the third process are sub-processes of a single process. 34. The system of claim 25, wherein the first process and the fourth process are sub-processes of a single process. 35. The system of claim 25, wherein the first process and the second process and the third process are sub-processes of a single process. 36. The system of claim 25, wherein the first process and the second process and the fourth process are sub-processes of a single process. 37. The system of claim 25, wherein the first process and the third process and the fourth process are sub-processes of a single process. 38. The system of claim 25, wherein the first process and the second process and the third process and the fourth process are sub-processes of a single process. 39. The system of claim 25, wherein the resource further comprises a COM server. 40. The system of claim 25, wherein the resource further comprises a COM server of a different version than a second resource residing inside the second application isolation scope. 41. The system of claim 25, wherein the identifier is associated with the first resource and a second resource. 42. The system of claim 25, wherein the resource further comprises at least one registry entry in the second application isolation scope on which the resource resides. 43. The system of claim 25, wherein the first process further comprises making the request for the resource including the identifier associated with the resource. 44. The system of claim 25, wherein the first process further comprises communicating with the instance of the resource residing inside the second application isolation scope. 45. The system of claim 25, wherein the first process or the second process or the third process or the fourth process further comprise a COM Service Control Manager. 46. A system, comprising a computer processor, for accessing, by application programs, resources provided by an operating system comprising: a resource provided by an operating system executing on a computer processor;a first process receiving a request for the resource and an identifier associated with the resource;a second process, executing inside first application isolation scope provided by an application isolation layer, determining that the resource resides inside a second application isolation scope provided by an application isolation layer, wherein an application isolation layer and a user isolation layer together comprise an isolation environment;a third process redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; anda fourth process responding to the request for the resource using an instance of the resource residing in the second application isolation scope. 47. The system of claim 46, wherein the first process executes inside the second application isolation scope. 48. The system of claim 46, wherein the first process executes inside the first application isolation scope. 49. The system of claim 46, wherein the third process executes inside the second application isolation scope. 50. The system of claim 46, wherein the third process executes inside the first application isolation scope. 51. The system of claim 46, wherein the fourth process executes inside the second application isolation scope. 52. The system of claim 46, wherein the fourth process executes inside the first application isolation scope. 53. The system of claim 46, wherein the first process and the second process are sub-processes of a single process. 54. The system of claim 46, wherein the first process and the second process and the third process are sub-processes of a single process. 55. The system of claim 46, wherein the first process and the second process and the fourth process are sub-processes of a single process. 56. The system of claim 46, wherein the first process and the second process and the third process and the fourth process are sub-processes of a single process. 57. The system of claim 46, wherein the second process and the third process are sub-processes of a single process. 58. The system of claim 46, wherein the second process and the fourth process are sub-processes of a single process. 59. The system of claim 46, wherein the second process and the third process and the fourth process are sub-processes of a single process. 60. The system of claim 46, wherein the resource further comprises a COM server. 61. The system of claim 46, wherein the resource further comprises a COM server of a different version than a second resource residing in the second application isolation scope. 62. The system of claim 46, wherein the identifier is associated with the first resource and a second resource. 63. The system of claim 46, wherein the resource further comprises at least one registry entry in the second application isolation scope on which the resource resides. 64. The system of claim 46, wherein the first process further comprises making the request for the resource including the identifier associated with the resource. 65. The system of claim 46, wherein the first process further comprises communicating with the instance of the resource located inside the second application isolation scope. 66. The system of claim 46, wherein the first process or the second process or the third process or the fourth process further comprise a COM Service Control Manager. 67. A system, comprising a computer processor, for accessing, by application programs, resources provided by an operating system comprising: a resource provided by an operating system executing on a computer processor;a first process receiving, from a process executing in a first application isolation scope provided by an application isolation layer, a request for the resource and an identifier associated with the resource;a second process determining that the resource resides inside second application isolation scope provided by an application isolation layer, wherein the application isolation layer and a user isolation layer together comprise an isolation environment;a third process, executing outside the second application isolation scope, redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; anda fourth process responding to the request for the resource using an instance of the resource residing in the second application isolation scope. 68. The system of claim 67, wherein the first process executes inside the second application isolation scope. 69. The system of claim 67, wherein the first process executes outside the second application isolation scope. 70. The system of claim 67, wherein the second process executes inside the second application isolation scope. 71. The system of claim 67, wherein the second process executes outside the second application isolation scope. 72. The system of claim 67, wherein the fourth process executes inside the second application isolation scope. 73. The system of claim 67, wherein the fourth process executes outside the second application isolation scope. 74. The system of claim 67, wherein the first process and the third process are sub-processes of a single process. 75. The system of claim 67, wherein the first process and the second process and the third process are sub-processes of a single process. 76. The system of claim 67, wherein the first process and the third process and the fourth process are sub-processes of a single process. 77. The system of claim 67, wherein the first process and the second process and the third process and the fourth process are sub-processes of a single process. 78. The system of claim 67, wherein the second process and the third process are sub-processes of a single process. 79. The system of claim 67, wherein the second process and the third process and the fourth process are sub-processes of a single process. 80. The system of claim 67, wherein the third process and the fourth process are sub-processes of a single process. 81. The system of claim 67, wherein the resource further comprises a COM server. 82. The system of claim 67, wherein the resource further comprises a COM server of a different version than a second resource residing on the second application isolation scope. 83. The system of claim 67, wherein the identifier is associated with the first resource and a second resource. 84. The system of claim 67, wherein the resource further comprises at least one registry entry in the application isolation scope on which the resource resides. 85. The system of claim 67, wherein the first process further comprises making the request for the resource including the identifier associated with the resource. 86. The system of claim 67, wherein the first process further comprises communicating with the instance of the resource residing inside the application isolation scope. 87. The system of claim 67, wherein the first process or the second process or the third process or the fourth process further comprises a COM Service Control Manager. 88. A system, comprising a computer processor, for accessing, by application programs, resources provided by an operating system comprising: a resource provided by an operating system executing on a computer processor;a first process receiving, from a process executing in a first application isolation scope provided by an application isolation layer, a request for the resource and an identifier associated with the resource;a second process determining that the resource resides inside second application isolation scope provided by an application isolation layer, wherein the application isolation layer and a user isolation layer together comprise an isolation environment;a third process redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; anda fourth process, executing outside the second application isolation scope, responding to the request for the resource using an instance of the resource residing in the second application isolation scope. 89. The system of claim 88, wherein the first process executes inside the second application isolation scope. 90. The system of claim 88, wherein the first process executes outside the second application isolation scope. 91. The system of claim 88, wherein the second process executes inside the second application isolation scope. 92. The system of claim 88, wherein the second process executes outside the second application isolation scope. 93. The system of claim 88, wherein the third process executes inside the second application isolation scope. 94. The system of claim 88, wherein the third process executes outside the second application isolation scope. 95. The system of claim 88, wherein the first process and the fourth process are sub-processes of a single process. 96. The system of claim 88, wherein the first process and the second process and the fourth process are sub-processes of a single process. 97. The system of claim 88, wherein the first process and the third process and the fourth process are sub-processes of a single process. 98. The system of claim 88, wherein the first process and the second process and the third process and the fourth process are sub-processes of a single process. 99. The system of claim 88, wherein the second process and the fourth process are sub-processes of a single process. 100. The system of claim 88, wherein the second process and the third process and the fourth process are sub-processes of a single process. 101. The system of claim 88, wherein the third process and the fourth process are sub-processes of a single process. 102. The system of claim 88, wherein the resource further comprises a COM server. 103. The system of claim 88, wherein the resource further comprises a COM server of a different version than a second resource residing inside the second application isolation scope. 104. The system of claim 88, wherein the identifier is associated with the first resource and a second resource. 105. The system of claim 88, wherein the resource further comprises at least one registry entry inside the application isolation scope on which the resource resides. 106. The system of claim 88, wherein the first process further comprises making the request for the resource including the identifier associated with the resource. 107. The system of claim 88, wherein the first process further comprises communicating with the instance of the resource located inside the second application isolation scope. 108. The system of claim 88, wherein the first process or the second process or the third process or the fourth process further comprises a COM Service Control Manager.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (176)
Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques.
Joseph Kuriacose ; Jessup ; Jr. Ansley Wayne ; Dureau Vincent ; Delpuch Alain, Apparatus for transmitting and receiving executable applications as for a multimedia system.
Chang April S. ; Large Andrew R. ; Snyder Alan, Authentication and access control in a management console program for managing services in a computer network.
Trower ; II Tandy W. ; Weinberg Mark Jeffrey ; Merrill John Wickens Lamb, Client server animation system for managing interactive user interface characters.
Pettus Christopher E. (San Francisco CA) Loomis Donald R. (Saratoga CA) Warren Christina E. (Cupertino CA), Client server system and method of operation including a dynamically configurable protocol stack.
Hayes ; Jr. Kent Fillmore, Client-server system with central application management and providing export agent capability for retrofitting existing hardware and applications into the system.
Shah, Lacky Vasant; Arai, Daniel Takeo; Benitez, Manuel Enrique; Holler, Anne Marie; Wohlgemuth, Robert Curtis, Client-side performance optimization system for streamed applications.
Alimpich Claudia C. ; Boldt Gerald D. ; Doescher Calvin Larry ; Goddard Joan Stagaman ; Wittig James Philip, Dynamically modifying a graphical user interface window title.
Adams, Thomas L.; Chorley, Will R.; Cunetto, Philip C.; Doherty, James M.; LeMay, John E.; Mueller, Stephen M.; Parolkar, Satish; Schroeder, Timothy P.; Slaten, Charles B., Flexible network platform and call processing system.
Alford, Jr.,Jack Allen; Beesley,James Bruce; Nasypany,Stephen Raymond, Graphical user interface for visualization of sampled data compared to entitled or reference levels.
Bendert Edward Joseph (Vestal NY) Bennett Robert Bradley (Endwell NY) Berman Eve Suzanne (Binghamton NY) Farrell Susan Marie (Vestal NY) Johnson Eugene (Vestal NY) Nugent Robert Michael (Nichols NY) , Heterogeneous filing system with common API and reconciled file management rules.
Wies Evan F. ; Chang Dean C. ; Rosenberg Louis B. ; Tan Sian W. ; Mallett Jeffrey R., Implementing force feedback over the World Wide Web and other computer networks.
Moore Mark Douglass (Palo Alto CA) Burckhartt David M. (Houston TX) Johnson Drew S. (Houston TX) Brown Norman P. (Tomball TX) Hess Randall L. (Cypress TX), Launching computer applications.
Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
Hao Ming C. ; Karp Alan H ; Garfinkel Daniel ; Young Charles ; Fincher Thomas G., Mechanism to control and use window events among applications in concurrent computing.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
Kumar Vijay P. (Freehold NJ) Stahl Mark E. (Pittsburgh PA), Method and apparatus for executing a distributed algorithm or service on a simple network management protocol based comp.
Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Semaan, Pierre; Bissett, Nicholas; Mazzaferri, Richard James, Method and apparatus for isolating execution of software applications.
Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Chin, Huai Chiun; Mazzaferri, Richard James; Semaan, Pierre, Method and apparatus for providing file-type associations to multiple applications.
Johnson Lucinda L. (Oakdale MN) Peltier Clayton A. (Chisago City MN) Kuehn Scott H. (St. Paul MN) Frank William D. (New Brighton MN), Method and apparatus for using an independent transaction processing application as a service routine.
Bobby G. Doran, Jr. ; Bill Hyden ; Terry Wayne Liles, Method and apparatus for windows-based installation for installing software on build-to-order computer systems.
Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
Pedersen, Bradley J.; Nord, Joseph H.; Hoy, David Randal, Method and system for accessing a remote file in a directory structure associated with an application program executing locally.
Cummings Christopher R., Method and system for allowing a single-user application executing in a multi-user environment to create objects having both user-global and system global visibility.
Tracy William X. ; Roslak Thomas K. ; Murrah Judith ; Riso Francis ; Beach Robert ; Sandler Robert, Method and system for presenting item information using a portable data terminal.
Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., Method of redirecting a client service session to a second application server without interrupting the session by forwa.
Glaser,Howard J.; England,Laurence E.; Poole,Rebecca Lau; Xia,Chenhong, Method, system, computer program product, and article of manufacture for downloading a remote computer program according to a stored configuration.
Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Burghfield Common NH GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA), Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment.
Cox, David E.; Hayes, Jr., Kent F.; Lindquist, David B.; McGarvey, John R.; Salahshour, Abdi, Methods, systems and computer program products for centralized management of application programs on a network.
Kawabe Shigehisa,JPX ; Hashimoto Sunao,JPX ; Yamashita Ichiro,JPX ; Horikiri Kazunori,JPX, Name service apparatus using resource management, name resolution and virtual resource realization for realizing a virt.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA 4), Object container transfer system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object oriented representation of network requests in a client server model.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA), Object transferring system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object-oriented communication interface for network protocol access using the selected newly created protocol interface.
Gish Sheri L., Object-oriented system, method and article of manufacture for a client-server event driven message framework in an interprise computing framework system.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Bennett John G. ; Dalal Ketan, Processing multiple database transactions in the same process to reduce process overhead and redundant retrieval from database servers.
Cowan Richard ; Eckley Gordon P. ; Panchangam Prasad V. R. ; Leong Winston C. W., Server for starting client application on client if client is network terminal and initiating client application on ser.
East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
Conner Mike H. (Austin TX) Martin Andrew R. (Austin TX) Raper Larry K. (Austin TX), System and method for parent class shadowing in a statically linked object hierarchy.
Bale Richard C. (Alpharetta GA) Rich William L. (Stone Mountain GA) Shackelford Floyd W. (Beauford GA), System and method for run time configuration of objects in an object oriented computing environment.
Lai Meichen (San Jose CA) Lee Tony Kuen (San Jose CA) Nishimura Jenny Y. K. (San Jose CA) Shank Gerda R. (San Francisco CA), System and procedure for concurrent database access by multiple user applications through shared connection processes.
Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
Henson Larry W. (Austin) Shaheen-Gouda Amal A. (Austin) Smith Todd A. (Austin TX), System for file and record locking between nodes in a distributed data processing environment maintaining one copy of ea.
Brooks Matthew G. ; Young Russell T., System for replicating and associating file types with application programs among plurality of partitions in a server.
Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, System for virtualizing access to named system objects using rule action associated with request.
Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
Bennett, Brian T.; Leff, Avraham; Mikalsen, Thomas A.; Rayfield, James T.; Rouvellou, Isabelle M., Transparent general purpose object isolation for multi-tier distributed object environments.
Talati Kirit K. (Sunnyvale TX) Lackie C. Willard (Garland TX), Virtual software machine which preprocesses application program to isolate execution dependencies and uses target comput.
Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.
Shrader Theodore Jack London ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shi Shaw-Ben, Web server account manager plug-in for monitoring resources.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.