METHOD AND APPARATUS FOR VIRTUALIZING OBJECT NAMES
First Claim
Patent Images
1. A method for virtualizing access to named system objects, the method comprising the steps of:
- receiving a request to access a system object from a process executing in the context of a user isolation scope, the request including a virtual name for the system object;
determining a rule associated with the request;
forming a literal name for the system object in response to the determined rule; and
issuing to the operating system a request to access the system object, the request including the literal name for the system object.
8 Assignments
0 Petitions
Accused Products
Abstract
A method for virtualizing access to named system objects includes the step of receiving a request to access a system object from a process executing in the context of a user isolation scope, the request including a virtual name for the system object. A rule associated with the request is determined and a literal name for the system object is formed in response to the determined rule. A request to access the system object is issued to the operating system. The issued request including the literal name for the system object
-
Citations
34 Claims
-
1. A method for virtualizing access to named system objects, the method comprising the steps of:
-
receiving a request to access a system object from a process executing in the context of a user isolation scope, the request including a virtual name for the system object;
determining a rule associated with the request;
forming a literal name for the system object in response to the determined rule; and
issuing to the operating system a request to access the system object, the request including the literal name for the system object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. An apparatus for virtualizing access to named system objects comprising:
-
a hooking mechanism receiving a request to access a system object from a process executing in the context of a user isolation scope, the request including a virtual name for the system object;
a name virtualization engine forming a literal name for the system object; and
an operating system interface requesting access to the system object using the literal name. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34)
-
Specification