Method and process for virtualizing user interfaces
First Claim
1. A system for securing an application for execution on a computer, the system comprising:
- a server computer;
a network; and
a client computer operably connected to the server computer via the network;
wherein the client computer requests the server computer to transmit an application to the client computer, wherein the client computer executes the application subsequent to receiving the application; and
wherein the client computer includes an interception module for intercepting a request from the application to output data to an output device, wherein the interception module ignores the request, and wherein the interception module returns a success message to the application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
-
Citations
15 Claims
-
1. A system for securing an application for execution on a computer, the system comprising:
-
a server computer;
a network; and
a client computer operably connected to the server computer via the network;
wherein the client computer requests the server computer to transmit an application to the client computer, wherein the client computer executes the application subsequent to receiving the application; and
wherein the client computer includes an interception module for intercepting a request from the application to output data to an output device, wherein the interception module ignores the request, and wherein the interception module returns a success message to the application.
-
-
2. A method of securing an application for execution on a computer, the method comprising:
-
modifying a binary of the application such that a request to affect the visible properties of a window is intercepted by an interception module;
ignoring the request; and
returning a success message to the requestor.
-
-
3. A method of securing an application for execution on a computer, the method comprising:
-
modifying a binary of the application such that a request from the application to output data to an output device is intercepted;
ignoring the request; and
returning a success message to the requestor. - View Dependent Claims (4)
-
-
5. A method of securing an application for execution on a computer, the method comprising:
-
modifying the binary of an application to invoke an interception module;
intercepting a request from the application to create and display a window on an output device;
setting a property of the window such that the window is not displayed on the output device; and
creating the window. - View Dependent Claims (6)
-
-
7. A method of securing an application for execution on a computer, the method comprising:
-
modifying the binary of an application to invoke an interception module;
intercepting a request from an application to send a message from the application to a window;
modifying the message such that the message does not affect any visible properties of the window; and
transmitting the modified message to the window.
-
-
8. A method of securing an application for execution on a computer, the method comprising:
-
modifying the binary of an application to invoke an interception module;
intercepting a request from an application to display a decision box;
identifying a decision for the decision box; and
transmitting the identified decision to the decision box. - View Dependent Claims (9)
-
-
10. A system for securing an application for execution on a computer, the system comprising:
-
means for modifying the binary of an application to invoke an interception module;
means for intercepting a request from the application to output data to an output device;
means for ignoring the request; and
means for returning a success message to the application. - View Dependent Claims (11, 13)
-
-
12. A system for securing an application for execution on a computer, the system comprising:
-
means modifying the binary of an application to invoke an interception module;
means for intercepting a request from the application to create and display a window on an output device;
means for creating the window; and
means for setting a property of the window such that the window is not displayed on the output device.
-
-
14. A system for securing an application for execution on a computer, the system comprising:
-
a first module for modifying the binary of an application to invoke a second module, wherein the second module intercepts a request from the application to output data to an output device, wherein the second module ignores the request, and wherein the second module returns a success message to the requestor.
-
-
15. A method of securing an application for execution on a computer, the method comprising:
-
modifying the binary of an application to invoke an interception module; and
intercepting at least one call that is made by the application such that the application cannot change the contents of a display that is connected to the computer.
-
Specification