Method and system for communicating between isolation environments
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-009/46
G06F-009/445
G06F-009/50
출원번호
US-0619294
(2012-09-14)
등록번호
US-9021494
(2015-04-28)
발명자
/ 주소
Nord, Joseph
Hoy, David
Chinta, Madhav
출원인 / 주소
Citrix Systems, Inc.
대리인 / 주소
Foley and Lardner LLP
인용정보
피인용 횟수 :
0인용 특허 :
185
초록▼
A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When
A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, and this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
대표청구항▼
1. A system for facilitating the transfer of resource information between installation scopes, the system comprising: computer-readable memory storing instructions; anda processor configured to execute the instructions stored in the computer-readable memory; wherein the instructions, when executed,
1. A system for facilitating the transfer of resource information between installation scopes, the system comprising: computer-readable memory storing instructions; anda processor configured to execute the instructions stored in the computer-readable memory; wherein the instructions, when executed, cause the processor to: provide a first installation scope representing a first application, the first application executing according to an executable component within the first installation scope;provide a second installation scope representing an image of a second application, the second installation scope associated with the first installation scope via an aggregation of the first installation scope within the second installation scope;provide a plurality of user scopes, each user scope including native resources that correspond to a respective application profile including application-specific setting information;determine a user scope in the plurality of user scopes corresponding to the first application, based on the executable component; andprovide a virtual scope representative of the aggregation of the first installation scope within the second installation scope, and the determined user scope, the virtual scope providing access to resource information located in the first installation scope, access to resource information located in the second installation scope, and access to the corresponding native resources in the determined user scope. 2. The system of claim 1, wherein the determined user-scope represents a view for a first user, wherein when an application executing on behalf of the first user attempts to open a resource for modification, a private copy of the resource is created in the determined user-scope. 3. The system of claim 2, wherein the determined user-scope is senior to the virtual scope and creating the private copy does not change the virtual scope representation of the resource. 4. The system of claim 1, wherein the virtual scope is further representative of an aggregation of the first installation scope, the second installation scope, the determined user scope, and a system scope. 5. The system of claim 4, wherein the virtual scope enumerates instances of a native resource from each scope in the aggregation. 6. The system of claim 1, wherein the virtual scope enumerates instances of a native resource from the first installation scope and the second installation scope. 7. The system of claim 1, wherein the first installation scope comprises at least one native resource associated with the first application. 8. The system of claim 1, wherein the first installation scope comprises setting and configuration data specific the first application. 9. The system of claim 1, wherein the virtual scope provides access to resource information located in a senior scope, wherein the senior scope is one of the first installation scope and the second installation scope. 10. The system of claim 1, wherein the first installation scope is junior to the second installation scope such that a resource view from the second installation scope takes precedence over a corresponding resource view from the first installation scope. 11. A method for facilitating the transfer of resource information between installation scopes, the method comprising: providing, by a first computing machine, an isolation environment comprising a first installation scope representing a first application, the first application executing according to an executable component within the first installation scope;providing, by the first computing machine, a second installation scope representing an image of a second application, the second installation scope associated with the first installation scope via an aggregation of the first installation scope within the second installation scope;providing a plurality of user scopes, each user scope including native resources that correspond to a respective application profile including application-specific setting information;determining a user scope in the plurality of user scopes corresponding to the first application, based on the executable component; andproviding, by the first computing machine, a virtual scope representative of the aggregation of the first installation scope within the second installation scope, and the determined user scope, the virtual scope providing access to resource information located in the first installation scope, access to resource information located in the second installation scope, and access to the corresponding native resources in the determined user scope. 12. The method of claim 11, further comprising providing the determined user-scope representing a view for a first user, wherein when an application executing on behalf of the user attempts to open a resource for modification, a private copy of the resource is created in the determined user-scope. 13. The method of claim of claim 12, wherein the determined user-scope is senior to the virtual scope and creating the private copy does not change the virtual scope representation of the resource. 14. The method of claim 11, wherein the virtual scope is further representative of an aggregation of the first installation scope, the second installation scope, the determined user scope, and a system scope. 15. The method of claim 14, wherein the virtual scope enumerates instances of a native resource from each scope in the aggregation. 16. The method of claim 11, wherein the virtual scope enumerates instances of a native resource from the first installation scope and the second installation scope. 17. The method of claim 11, wherein the first installation scope comprises at least one native resource associated with the first application. 18. The method of claim 11, wherein the first installation scope comprises setting and configuration data specific the first application. 19. The method of claim 11, wherein the virtual scope provides access to resource information located in a senior scope, wherein the senior scope is one of the first installation scope and the second installation scope. 20. The method of claim 11, wherein the first installation scope is junior to the second installation scope such that a resource view from the second installation scope takes precedence over a corresponding resource view from the first installation scope.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (185)
Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques.
Joseph Kuriacose ; Jessup ; Jr. Ansley Wayne ; Dureau Vincent ; Delpuch Alain, Apparatus for transmitting and receiving executable applications as for a multimedia system.
Chang April S. ; Large Andrew R. ; Snyder Alan, Authentication and access control in a management console program for managing services in a computer network.
Trower ; II Tandy W. ; Weinberg Mark Jeffrey ; Merrill John Wickens Lamb, Client server animation system for managing interactive user interface characters.
Pettus Christopher E. (San Francisco CA) Loomis Donald R. (Saratoga CA) Warren Christina E. (Cupertino CA), Client server system and method of operation including a dynamically configurable protocol stack.
Hayes ; Jr. Kent Fillmore, Client-server system with central application management and providing export agent capability for retrofitting existing hardware and applications into the system.
Shah, Lacky Vasant; Arai, Daniel Takeo; Benitez, Manuel Enrique; Holler, Anne Marie; Wohlgemuth, Robert Curtis, Client-side performance optimization system for streamed applications.
Alimpich Claudia C. ; Boldt Gerald D. ; Doescher Calvin Larry ; Goddard Joan Stagaman ; Wittig James Philip, Dynamically modifying a graphical user interface window title.
Adams, Thomas L.; Chorley, Will R.; Cunetto, Philip C.; Doherty, James M.; LeMay, John E.; Mueller, Stephen M.; Parolkar, Satish; Schroeder, Timothy P.; Slaten, Charles B., Flexible network platform and call processing system.
Alford, Jr.,Jack Allen; Beesley,James Bruce; Nasypany,Stephen Raymond, Graphical user interface for visualization of sampled data compared to entitled or reference levels.
Bendert Edward Joseph (Vestal NY) Bennett Robert Bradley (Endwell NY) Berman Eve Suzanne (Binghamton NY) Farrell Susan Marie (Vestal NY) Johnson Eugene (Vestal NY) Nugent Robert Michael (Nichols NY) , Heterogeneous filing system with common API and reconciled file management rules.
Wies Evan F. ; Chang Dean C. ; Rosenberg Louis B. ; Tan Sian W. ; Mallett Jeffrey R., Implementing force feedback over the World Wide Web and other computer networks.
Moore Mark Douglass (Palo Alto CA) Burckhartt David M. (Houston TX) Johnson Drew S. (Houston TX) Brown Norman P. (Tomball TX) Hess Randall L. (Cypress TX), Launching computer applications.
Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
Hao Ming C. ; Karp Alan H ; Garfinkel Daniel ; Young Charles ; Fincher Thomas G., Mechanism to control and use window events among applications in concurrent computing.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
Kumar Vijay P. (Freehold NJ) Stahl Mark E. (Pittsburgh PA), Method and apparatus for executing a distributed algorithm or service on a simple network management protocol based comp.
Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers.
Johnson Lucinda L. (Oakdale MN) Peltier Clayton A. (Chisago City MN) Kuehn Scott H. (St. Paul MN) Frank William D. (New Brighton MN), Method and apparatus for using an independent transaction processing application as a service routine.
Bobby G. Doran, Jr. ; Bill Hyden ; Terry Wayne Liles, Method and apparatus for windows-based installation for installing software on build-to-order computer systems.
Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
Cummings Christopher R., Method and system for allowing a single-user application executing in a multi-user environment to create objects having both user-global and system global visibility.
Tracy William X. ; Roslak Thomas K. ; Murrah Judith ; Riso Francis ; Beach Robert ; Sandler Robert, Method and system for presenting item information using a portable data terminal.
Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., Method of redirecting a client service session to a second application server without interrupting the session by forwa.
Glaser,Howard J.; England,Laurence E.; Poole,Rebecca Lau; Xia,Chenhong, Method, system, computer program product, and article of manufacture for downloading a remote computer program according to a stored configuration.
Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Burghfield Common NH GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA), Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment.
Cox, David E.; Hayes, Jr., Kent F.; Lindquist, David B.; McGarvey, John R.; Salahshour, Abdi, Methods, systems and computer program products for centralized management of application programs on a network.
Kawabe Shigehisa,JPX ; Hashimoto Sunao,JPX ; Yamashita Ichiro,JPX ; Horikiri Kazunori,JPX, Name service apparatus using resource management, name resolution and virtual resource realization for realizing a virt.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA 4), Object container transfer system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object oriented representation of network requests in a client server model.
Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA), Object transferring system and method in an object based computer operating system.
Heimsoth Daniel Dean ; Horn Gary Randall ; Sharma Mohan ; Turner Laurie Beth ; Yeung Leo Yue Tak, Object-oriented communication interface for network protocol access using the selected newly created protocol interface.
Gish Sheri L., Object-oriented system, method and article of manufacture for a client-server event driven message framework in an interprise computing framework system.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Bennett John G. ; Dalal Ketan, Processing multiple database transactions in the same process to reduce process overhead and redundant retrieval from database servers.
Cowan Richard ; Eckley Gordon P. ; Panchangam Prasad V. R. ; Leong Winston C. W., Server for starting client application on client if client is network terminal and initiating client application on ser.
East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
Conner Mike H. (Austin TX) Martin Andrew R. (Austin TX) Raper Larry K. (Austin TX), System and method for parent class shadowing in a statically linked object hierarchy.
Bale Richard C. (Alpharetta GA) Rich William L. (Stone Mountain GA) Shackelford Floyd W. (Beauford GA), System and method for run time configuration of objects in an object oriented computing environment.
Lai Meichen (San Jose CA) Lee Tony Kuen (San Jose CA) Nishimura Jenny Y. K. (San Jose CA) Shank Gerda R. (San Francisco CA), System and procedure for concurrent database access by multiple user applications through shared connection processes.
Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
Henson Larry W. (Austin) Shaheen-Gouda Amal A. (Austin) Smith Todd A. (Austin TX), System for file and record locking between nodes in a distributed data processing environment maintaining one copy of ea.
Brooks Matthew G. ; Young Russell T., System for replicating and associating file types with application programs among plurality of partitions in a server.
Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
Bennett, Brian T.; Leff, Avraham; Mikalsen, Thomas A.; Rayfield, James T.; Rouvellou, Isabelle M., Transparent general purpose object isolation for multi-tier distributed object environments.
Talati Kirit K. (Sunnyvale TX) Lackie C. Willard (Garland TX), Virtual software machine which preprocesses application program to isolate execution dependencies and uses target comput.
Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.
Shrader Theodore Jack London ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shi Shaw-Ben, Web server account manager plug-in for monitoring resources.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.