Configuration of Isolated Extensions and Device Drivers
First Claim
Patent Images
1. One or more processor-readable media having processor-executable instructions that, when executed by a processor, perform a method comprising:
- obtaining a device driver, wherein the device driver is a set of executable instructions;
determining a set of computing resources required for execution of the set of executable instructions of the device driver;
providing one or more local-access objects for use by the device driver for access to the required set of computing resources, each of the one or more local-access objects comprising executable instructions;
initiating execution of the set of executable instructions of the device driver and the executable instructions of the one or more local-access objects.
2 Assignments
0 Petitions
Accused Products
Abstract
Described herein are one or more implementations for describing and/or addressing the configuration requirements of applications, extensions, device drivers, and other components of a software system.
152 Citations
20 Claims
-
1. One or more processor-readable media having processor-executable instructions that, when executed by a processor, perform a method comprising:
-
obtaining a device driver, wherein the device driver is a set of executable instructions;
determining a set of computing resources required for execution of the set of executable instructions of the device driver;
providing one or more local-access objects for use by the device driver for access to the required set of computing resources, each of the one or more local-access objects comprising executable instructions;
initiating execution of the set of executable instructions of the device driver and the executable instructions of the one or more local-access objects. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more processor-readable media having processor-executable instructions that, when executed by a processor, perform a method comprising:
-
obtaining an untrusted program module comprising a set of executable instructions and the untrusted program module being configured to access one or more computing resources;
determining one or more target computing resources of the untrusted program module, wherein the one or more target computing resources are computing resources that the untrusted program module will seek to access when the set of executable instructions of the program module are executed;
providing one or more trusted local-access objects to the untrusted program module so that the unstrusted program module gains access to the one or more target computing resources via the provided one or more trusted local-access objects. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. One or more processor-readable media having processor-executable instructions that, when executed by a processor, perform a method comprising:
-
obtaining an untrusted program module comprising a set of executable instructions and the untrusted program module being configured to access one or more computing resources;
determining one or more target computing resources of the untrusted program module, wherein the one or more target computing resources are computing resources that the untrusted program module will seek to access when the set of executable instructions of the program module are executed;
providing one or more trusted local-access objects to the untrusted program module so that the unstrusted program module gains access to the one or more target computing resources via the provided one or more trusted local-access objects, the one or more trusted local-access objects being associated with the one or more target computing resources;
permitting the program module to access the one or more target computing resources only via the one or more trusted local-access objects associated with those one or more target computing resources. - View Dependent Claims (19, 20)
-
Specification