MULTI-PROTOCOL ACCESS TO FILES AND DIRECTORIES
First Claim
Patent Images
1. A computer-implemented method for controlling memory access in a manner that resolves conflicts between single-item access applications (SIAA) and set-based access applications (SBAA), the method comprising:
- defining one or more multiple-protocol access rules that control how access to data items is controlled, denied, and allowed;
maintaining a transaction matrix to control memory interactions, wherein the transaction matrix comprises at least a first operation and a second operation, wherein the first operation in the transaction matrix includes two or more items, and wherein the second operation includes an item dependent on each of the two or more items in the first operation;
monitoring memory locations in view of the multiple-protocol access rules, wherein monitoring memory locations in view of the multiple-protocol access rules comprises;
detecting a first memory access request via a first memory access protocol;
determining that the first memory access request is by an SIAA, wherein an SIAA is a legacy application developed under an operating system framework that allows the SIAA to access only a single data item at a time;
detecting a second memory access request via a second memory access protocol; and
determining that the second memory access request is by an SBAA, wherein an SBAA is an application through which multiple data items, or a set of multiple data items, are concurrently accessible; and
defining one or more multi-access rules that control access to the memory locations and synchronize the SIAA and the SBAA with an agent component in a user mode.
2 Assignments
0 Petitions
Accused Products
Abstract
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access between the single-item access components and the set-based access components.
-
Citations
20 Claims
-
1. A computer-implemented method for controlling memory access in a manner that resolves conflicts between single-item access applications (SIAA) and set-based access applications (SBAA), the method comprising:
-
defining one or more multiple-protocol access rules that control how access to data items is controlled, denied, and allowed; maintaining a transaction matrix to control memory interactions, wherein the transaction matrix comprises at least a first operation and a second operation, wherein the first operation in the transaction matrix includes two or more items, and wherein the second operation includes an item dependent on each of the two or more items in the first operation; monitoring memory locations in view of the multiple-protocol access rules, wherein monitoring memory locations in view of the multiple-protocol access rules comprises; detecting a first memory access request via a first memory access protocol; determining that the first memory access request is by an SIAA, wherein an SIAA is a legacy application developed under an operating system framework that allows the SIAA to access only a single data item at a time; detecting a second memory access request via a second memory access protocol; and determining that the second memory access request is by an SBAA, wherein an SBAA is an application through which multiple data items, or a set of multiple data items, are concurrently accessible; and defining one or more multi-access rules that control access to the memory locations and synchronize the SIAA and the SBAA with an agent component in a user mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 13, 14, 15, 16, 17, 18, 19)
-
-
11. A computer storage medium having stored thereon computer executable instructions that, when executed within a computing environment, cause a computing system to perform a method for controlling memory access in a manner that resolves conflicts between single-item access applications (SIAA) and set-based access applications (SBAA), the computer executable instructions including instructions causing the computing system to:
-
define one or more multiple-protocol access rules that control how access to data items is controlled, denied, and allowed; maintain a transaction matrix to control memory interactions, wherein the transaction matrix comprises at least a first operation and a second operation, wherein the first operation in the transaction matrix includes two or more items, and wherein the second operation includes an item dependent on each of the two or more items in the first operation; monitor memory locations in view of the multiple-protocol access rules, wherein monitoring memory locations in view of the multiple-protocol access rules comprises; detecting a first memory access request via a first memory access protocol; determining that the first memory access request is by an SIAA, wherein an SIAA is a legacy application developed under an operating system framework that allows the SIAA to access only a single data item at a time; detecting a second memory access request via a second memory access protocol; and determining that the second memory access request is by an SBAA, wherein an SBAA is an application through which multiple data items, or a set of multiple data items, are concurrently accessible; and define one or more multi-access rules that control access to the memory locations and synchronize the SIAA and the SBAA with an agent component in a user mode. - View Dependent Claims (12)
-
-
20. A computing system for controlling memory access in a manner that resolves conflicts between single-item access applications (SIAA) and set-based access applications (SBAA), the system comprising:
-
one or more processors; one or more computer storage media having stored thereon computer executable instructions that, when executed by the one or more processors, cause the computing system to; define one or more multiple-protocol access rules that control how access to data items is controlled, denied, and allowed; maintain a transaction matrix to control memory interactions, wherein the transaction matrix comprises at least a first operation and a second operation, wherein the first operation in the transaction matrix includes two or more items, and wherein the second operation includes an item dependent on each of the two or more items in the first operation; monitor memory locations in view of the multiple-protocol access rules, wherein monitoring memory locations in view of the multiple-protocol access rules comprises; detecting a first memory access request via a first memory access protocol; determining that the first memory access request is by an SIAA, wherein an SIAA is a legacy application developed under an operating system framework that allows the SIAA to access only a single data item at a time; detecting a second memory access request via a second memory access protocol; and determining that the second memory access request is by an SBAA, wherein an SBAA is an application through which multiple data items, or a set of multiple data items, are concurrently accessible; and define one or more multi-access rules that control access to the memory locations and synchronize the SIAA and the SBAA with an agent component in a user mode.
-
Specification