MAPPING PROCESS CHANGES
1 Assignment
0 Petitions
Accused Products
Abstract
In one implementation, a computer-implemented method includes receiving a request to run a particular process; determining whether the particular process is to be run in isolation on the computer system; selecting a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process; fetching, according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment; running the particular process is isolation on the computer system by executing the copy object in the isolated environment; applying, according to the particular permission scheme, one or more changes to the copy object; and mapping, according to the particular permission scheme, the one or more changes in the copy object to the actual object.
-
Citations
21 Claims
-
1. (canceled)
-
2. A computer-implemented method comprising:
-
selecting, by a process manager running on a computer system and in response to determining that a particular process is to be run in an isolated environment, a particular permission scheme that defines a set of permission requirements for applying changes made to isolated copies of actual objects that are not in the isolated environment, by processes that are running in the isolated environment; obtaining, by the process manager and according to the particular permission scheme, an isolated copy object that (i) is in the isolated environment, and (ii) corresponds to an actual object that is not in the isolated environment; running the particular process in the isolated environment on the computer system, thereby generating one or more changes to the isolated copy object; and applying, by the process manager and according to the particular permission scheme, one or more of the changes to the isolated copy object to the actual object that is not in the isolated environment. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium having stored thereon instructions, which, when executed by one or more computers, cause the one or more computers to perform operations comprising:
-
selecting, by a process manager running on a computer system and in response to determining that a particular process is to be run in an isolated environment, a particular permission scheme that defines a set of permission requirements for applying changes made to isolated copies of actual objects that are not in the isolated environment, by processes that are running in the isolated environment; obtaining, by the process manager and according to the particular permission scheme, an isolated copy object that (i) is in the isolated environment, and (ii) corresponds to an actual object that is not in the isolated environment; running the particular process in the isolated environment on the computer system, thereby generating one or more changes to the isolated copy object; and applying, by the process manager and according to the particular permission scheme, one or more of the changes to the isolated copy object to the actual object that is not in the isolated environment. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
one or more processors and one or more computer storage media storing instructions that are operable, when executed by the one or more processors, to cause the one or more processors to perform operations comprising; selecting, by a process manager running on a computer system and in response to determining that a particular process is to be run in an isolated environment, a particular permission scheme that defines a set of permission requirements for applying changes made to isolated copies of actual objects that are not in the isolated environment, by processes that are running in the isolated environment; obtaining, by the process manager and according to the particular permission scheme, an isolated copy object that (i) is in the isolated environment, and (ii) corresponds to an actual object that is not in the isolated environment; running the particular process in the isolated environment on the computer system, thereby generating one or more changes to the isolated copy object; and applying, by the process manager and according to the particular permission scheme, one or more of the changes to the isolated copy object to the actual object that is not in the isolated environment. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification