Method and system for communicating between isolation environments
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-009/44
G06F-009/46
출원번호
US-0875881
(2007-10-20)
등록번호
US-8171483
(2012-05-01)
발명자
/ 주소
Nord, Joseph
Hoy, David
Chinta, Madhav
출원인 / 주소
Citrix Systems, Inc.
대리인 / 주소
Foley and Lardner LLP
인용정보
피인용 횟수 :
40인용 특허 :
180
초록▼
A method and system for associating installation scopes within an isolation environment, where the method includes defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the f
A method and system for associating installation scopes within an isolation environment, where the method includes defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and a second installation scope, and this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
대표청구항▼
1. A method for associating installation scopes to facilitate updating instances of native resources, the method comprising: executing a first application within a first isolation environment,mounting an image of a second application,executing a third application within a second isolation environmen
1. A method for associating installation scopes to facilitate updating instances of native resources, the method comprising: executing a first application within a first isolation environment,mounting an image of a second application,executing a third application within a second isolation environment;intercepting a request to retrieve and update a native resource sent by the third application associated with a third installation scope and located within the second isolation environment;failing to locate, within the third installation scope, an instance of a native resource corresponding to the requested native resource;determining that there is an association between the third installation scope and a second installation scope representative of the image of the second application;retrieving an instance of the requested native resource, the instance located within the second installation scope;updating the retrieved instance of the requested native resource and returning the updated native resource to the second installation scope;intercepting a request to retrieve the native resource, the request sent by the first application associated with a first installation scope located within the first isolation environment;failing to locate, within the first installation scope, a native resource corresponding to the requested native resource;determining an association between the first installation scope and the second installation scope;retrieving an instance of the updated native resource located within the second installation scope; andreturning the updated native resource to the first application. 2. The method of claim 1, wherein the image of the second application is mounted within the first isolation environment. 3. The method of claim 1, wherein the image of the second application is mounted within the second isolation environment. 4. The method of claim 1, further comprising: creating the association between the first and second installation scopes. 5. The method of claim 1, further comprising: creating the association between the second and third installation scopes. 6. The method of claim 1, further comprising: creating an association between the first, second, and third installation scopes. 7. The method of claim 1, wherein the association between the third and second installation scopes is also an association with the first installation scope. 8. The method of claim 1, wherein the association between the first and second installation scopes is also an association with the third installation scope. 9. The method of claim 1, further comprising: enumerating the resources in the first and second installation scopes. 10. The method of claim 1, further comprising: enumerating the resources in the second and third installation scopes. 11. A system for associating installation scopes to facilitate updating instances of native resources, the system comprising: at least one computer processor programmed to: execute a first application within a first isolation environment,mount an image of a second application,execute a third application within a second isolation environment;intercept a request to retrieve and update a native resource sent by the third application associated with a third installation scope and located within the second isolation environment;determine that there is an association between the third installation scope and a second installation scope representative of the image of the second application after failing to locate, within the third installation scope, an instance of a native resource corresponding to the requested native resource;retrieve an instance of the requested native resource, the instance located within the second installation scope;update the retrieved instance of the requested native resource and returning the updated native resource to the second installation scope;intercept a request to retrieve the native resource, the request sent by the first application associated with a first installation scope located within the first isolation environment;determine an association between the first installation scope and the second installation scope after failing to locate, within the first installation scope, a native resource corresponding to the requested native resource;retrieve an instance of the updated native resource located within the second installation scope; andreturn the updated native resource to the first application. 12. The system of claim 11, wherein the image of the second application is mounted within the first isolation environment. 13. The system of claim 11, wherein the image of the second application is mounted within the second isolation environment. 14. The system of claim 11, wherein the at least one computer processor is further programmed to: create the association between the first and second installation scopes. 15. The method of claim 11, wherein the at least one computer processor is further programmed to: create the association between the second and third installation scopes. 16. The method of claim 11, wherein the at least one computer processor is further programmed to: create an association between the first, second, and third installation scopes. 17. The method of claim 11, wherein the association between the third and second installation scopes is also an association with the first installation scope. 18. The method of claim 11, wherein the association between the first and second installation scopes is also an association with the third installation scope. 19. The method of claim 11, wherein the at least one computer processor is further programmed to: enumerate the resources in the first and second installation scopes. 20. The method of claim 11, wherein the at least one computer processor is further programmed to: enumerate the resources in the second and third installation scopes.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (180)
Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques.
Joseph Kuriacose ; Jessup ; Jr. Ansley Wayne ; Dureau Vincent ; Delpuch Alain, Apparatus for transmitting and receiving executable applications as for a multimedia system.
Chang April S. ; Large Andrew R. ; Snyder Alan, Authentication and access control in a management console program for managing services in a computer network.
Trower ; II Tandy W. ; Weinberg Mark Jeffrey ; Merrill John Wickens Lamb, Client server animation system for managing interactive user interface characters.
Pettus Christopher E. (San Francisco CA) Loomis Donald R. (Saratoga CA) Warren Christina E. (Cupertino CA), Client server system and method of operation including a dynamically configurable protocol stack.
Hayes ; Jr. Kent Fillmore, Client-server system with central application management and providing export agent capability for retrofitting existing hardware and applications into the system.
Shah, Lacky Vasant; Arai, Daniel Takeo; Benitez, Manuel Enrique; Holler, Anne Marie; Wohlgemuth, Robert Curtis, Client-side performance optimization system for streamed applications.
Alimpich Claudia C. ; Boldt Gerald D. ; Doescher Calvin Larry ; Goddard Joan Stagaman ; Wittig James Philip, Dynamically modifying a graphical user interface window title.
Adams, Thomas L.; Chorley, Will R.; Cunetto, Philip C.; Doherty, James M.; LeMay, John E.; Mueller, Stephen M.; Parolkar, Satish; Schroeder, Timothy P.; Slaten, Charles B., Flexible network platform and call processing system.
Alford, Jr.,Jack Allen; Beesley,James Bruce; Nasypany,Stephen Raymond, Graphical user interface for visualization of sampled data compared to entitled or reference levels.
Bendert Edward Joseph (Vestal NY) Bennett Robert Bradley (Endwell NY) Berman Eve Suzanne (Binghamton NY) Farrell Susan Marie (Vestal NY) Johnson Eugene (Vestal NY) Nugent Robert Michael (Nichols NY) , Heterogeneous filing system with common API and reconciled file management rules.
Wies Evan F. ; Chang Dean C. ; Rosenberg Louis B. ; Tan Sian W. ; Mallett Jeffrey R., Implementing force feedback over the World Wide Web and other computer networks.
Moore Mark Douglass (Palo Alto CA) Burckhartt David M. (Houston TX) Johnson Drew S. (Houston TX) Brown Norman P. (Tomball TX) Hess Randall L. (Cypress TX), Launching computer applications.
Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
Hao Ming C. ; Karp Alan H ; Garfinkel Daniel ; Young Charles ; Fincher Thomas G., Mechanism to control and use window events among applications in concurrent computing.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
Kumar Vijay P. (Freehold NJ) Stahl Mark E. (Pittsburgh PA), Method and apparatus for executing a distributed algorithm or service on a simple network management protocol based comp.
Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Semaan, Pierre; Bissett, Nicholas; Mazzaferri, Richard James, Method and apparatus for isolating execution of software applications.
Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Chin, Huai Chiun; Mazzaferri, Richard James; Semaan, Pierre, Method and apparatus for providing file-type associations to multiple applications.
Johnson Lucinda L. (Oakdale MN) Peltier Clayton A. (Chisago City MN) Kuehn Scott H. (St. Paul MN) Frank William D. (New Brighton MN), Method and apparatus for using an independent transaction processing application as a service routine.
Bobby G. Doran, Jr. ; Bill Hyden ; Terry Wayne Liles, Method and apparatus for windows-based installation for installing software on build-to-order computer systems.
Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
Pedersen, Bradley J.; Nord, Joseph H.; Hoy, David Randal, Method and system for accessing a remote file in a directory structure associated with an application program executing locally.
Cummings Christopher R., Method and system for allowing a single-user application executing in a multi-user environment to create objects having both user-global and system global visibility.
Tracy William X. ; Roslak Thomas K. ; Murrah Judith ; Riso Francis ; Beach Robert ; Sandler Robert, Method and system for presenting item information using a portable data terminal.
Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., Method of redirecting a client service session to a second application server without interrupting the session by forwa.
Glaser,Howard J.; England,Laurence E.; Poole,Rebecca Lau; Xia,Chenhong, Method, system, computer program product, and article of manufacture for downloading a remote computer program according to a stored configuration.
Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Burghfield Common NH GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA), Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment.
Cox, David E.; Hayes, Jr., Kent F.; Lindquist, David B.; McGarvey, John R.; Salahshour, Abdi, Methods, systems and computer program products for centralized management of application programs on a network.
Kawabe Shigehisa,JPX ; Hashimoto Sunao,JPX ; Yamashita Ichiro,JPX ; Horikiri Kazunori,JPX, Name service apparatus using resource management, name resolution and virtual resource realization for realizing a virt.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA 4), Object container transfer system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object oriented representation of network requests in a client server model.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA), Object transferring system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object-oriented communication interface for network protocol access using the selected newly created protocol interface.
Gish Sheri L., Object-oriented system, method and article of manufacture for a client-server event driven message framework in an interprise computing framework system.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Bennett John G. ; Dalal Ketan, Processing multiple database transactions in the same process to reduce process overhead and redundant retrieval from database servers.
Cowan Richard ; Eckley Gordon P. ; Panchangam Prasad V. R. ; Leong Winston C. W., Server for starting client application on client if client is network terminal and initiating client application on ser.
East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
Conner Mike H. (Austin TX) Martin Andrew R. (Austin TX) Raper Larry K. (Austin TX), System and method for parent class shadowing in a statically linked object hierarchy.
Bale Richard C. (Alpharetta GA) Rich William L. (Stone Mountain GA) Shackelford Floyd W. (Beauford GA), System and method for run time configuration of objects in an object oriented computing environment.
Lai Meichen (San Jose CA) Lee Tony Kuen (San Jose CA) Nishimura Jenny Y. K. (San Jose CA) Shank Gerda R. (San Francisco CA), System and procedure for concurrent database access by multiple user applications through shared connection processes.
Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
Henson Larry W. (Austin) Shaheen-Gouda Amal A. (Austin) Smith Todd A. (Austin TX), System for file and record locking between nodes in a distributed data processing environment maintaining one copy of ea.
Brooks Matthew G. ; Young Russell T., System for replicating and associating file types with application programs among plurality of partitions in a server.
Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, System for virtualizing access to named system objects using rule action associated with request.
Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
Bennett, Brian T.; Leff, Avraham; Mikalsen, Thomas A.; Rayfield, James T.; Rouvellou, Isabelle M., Transparent general purpose object isolation for multi-tier distributed object environments.
Talati Kirit K. (Sunnyvale TX) Lackie C. Willard (Garland TX), Virtual software machine which preprocesses application program to isolate execution dependencies and uses target comput.
Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.
Shrader Theodore Jack London ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shi Shaw-Ben, Web server account manager plug-in for monitoring resources.
Marquardt, Ronald R.; Paczkowski, Lyle W.; Rajagopal, Arun, System and method of establishing trusted operability between networks in a network functions virtualization environment.
Marquardt, Ronald R.; Paczkowski, Lyle W.; Rajagopal, Arun, System and method of establishing trusted operability between networks in a network functions virtualization environment.
Paczkowski, Lyle W.; Ray, Amar N.; Sisul, James P., Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system.
Paczkowski, Lyle W.; Ray, Amar N.; Sisul, James P., Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.