System and method for isolating applications from each other
First Claim
1. A method for isolating applications from each other, comprising the steps of:
- intercepting application instructions;
determining if an application instruction calls for an illegal action; and
preventing the illegal action from occurring if the application instruction calls for the illegal action.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates to a system and method for isolating applications from each other. In one arrangement, the system and method pertain to intercepting application instructions, determining if an application instruction calls for an illegal action, and preventing the illegal action from occurring if the application instruction calls for the illegal action. In some arrangements, the system and method further pertain to determining if the application instruction contains an indirect memory reference and, if so, modifying the application instruction to enable the application instruction to determine itself whether an illegal operation is to be performed.
-
Citations
26 Claims
-
1. A method for isolating applications from each other, comprising the steps of:
-
intercepting application instructions;
determining if an application instruction calls for an illegal action; and
preventing the illegal action from occurring if the application instruction calls for the illegal action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for isolating applications from each other, comprising:
-
means for intercepting application instructions;
means for determining if an application instruction calls for an illegal action; and
means for preventing the illegal action from occurring if the application instruction calls for the illegal action. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An application isolating program stored on a computer-readable medium, the program comprising:
-
logic configured to intercept application instructions;
logic configured to determine if an application instruction calls for an illegal action; and
logic configured to prevent the illegal action from occurring if the application instruction calls for the illegal action. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method for isolating applications from each other, comprising the steps of:
-
gaining control over the execution of an application;
intercepting application instructions;
determining whether the application instructions have been cached and, if so, executing the cached instructions;
if the application instructions have not been cached, determining if the application instructions call for an illegal operation; and
if the application instructions do not call for an illegal operation, determining if the application instructions include an indirect memory reference. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification