Accessing remote stores of source and symbol data for use by computing tools
First Claim
1. A computer-implemented method comprising:
- receiving a request at a client to locate a symbol file;
determining a remote location at which the symbol file may be accessed;
communicating with a remote server to access the symbol file, including handling authentication of the client; and
obtaining access to the symbol file at the remote location.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method in which a remote network source maintains source code and symbol files, such as for debugging purposes, with automatic downloading of the correct files when they are needed. Files are remotely maintained based on unique data associated with that file (unique parameters) that are independent of the product name, release and/or build number. Such data includes time/date stamp information and file size, or signature and age data. When a given file is needed, such as to debug an executable code module, a symbol server at the client constructs a path (e.g., URL) to the needed file based on the unique information from the corresponding executable file, whereby the correct symbol file is accessed. Via that symbol file, the correct source file may be located and accessed. Security via authentication and access control lists may control access to the files, and authentication may be automatic.
134 Citations
25 Claims
-
1. A computer-implemented method comprising:
-
receiving a request at a client to locate a symbol file;
determining a remote location at which the symbol file may be accessed;
communicating with a remote server to access the symbol file, including handling authentication of the client; and
obtaining access to the symbol file at the remote location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. In a computer network, a system comprising:
-
a symbol-based tool on a client machine;
a client authentication service on the client machine;
a symbol server on the client machine and connected for communication with the symbol-based tool and the client authentication mechanism; and
the symbol server communicating with the symbol-based tool to receive a request for a remotely located symbol file, the symbol server;
constructing a network path to the remotely located symbol file based on information associated with the file;
attempting to access the file via the path;
communicating with the client authentication service and with a remote server on the network path to—
authenticate the client at the remote server; and
obtaining access to the remote file. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-implemented method, comprising,
maintaining symbol files via a remote server, each symbol file having a unique network path thereto that may be derived from parameters associated with that file, including at least one of a time/date stamp data, size data, age data or signature data; -
receiving, from a client, a request access to the selected symbol file via the network path;
determining, at the server, whether access to the selected symbol file should be granted, including authenticating the client, and if access should be granted, allowing access to the selected symbol file. - View Dependent Claims (22, 23, 24, 25)
-
Specification