Source engine for transferring a resource to local secure cache
First Claim
1. In a computer system, a method for retrieving a resource of program code from a source of program code and placing the resource in secure cache in the computer system, the computer having a computing system profile, the method comprising:
- installing a user profile into the computer system to operate based on the user profile rather than the computing system profile;
picking a first source for the resource;
opening the resource;
impersonating, by the computer system, the user profile at the first source;
testing the computer system'"'"'s access to the resource based on the user profile, wherein the first source tests whether the user, rather than the computing system, has access to the resource;
if the user has access, reading the resource to the secure cache;
if the resource is read to the secure cache, writing the resource to the secure cache of the computer system; and
if the user does not have access, picking a second resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A source engine system in a computing system retrieves a program code resource from one of a plurality of sources of program code. The program code resource is retrieved and placed in secure cache in the computing system. A user profile is impersonated by the computing system so that the computing system follows the user profile during retrieval of the resource. A source for the resource is picked, and the resource is opened. Whether the user has access to the resource is tested based on the user profile. If the user has access, the resource is read to the secure cache. The resource is written into the secure cache and verified that it is same as the resource in the source. If the user does not have access, a new source for the resource is picked, and the resource in the new source opened and read to the secure cache if the user has access to the resource in the new source.
27 Citations
16 Claims
-
1. In a computer system, a method for retrieving a resource of program code from a source of program code and placing the resource in secure cache in the computer system, the computer having a computing system profile, the method comprising:
-
installing a user profile into the computer system to operate based on the user profile rather than the computing system profile; picking a first source for the resource; opening the resource; impersonating, by the computer system, the user profile at the first source; testing the computer system'"'"'s access to the resource based on the user profile, wherein the first source tests whether the user, rather than the computing system, has access to the resource; if the user has access, reading the resource to the secure cache; if the resource is read to the secure cache, writing the resource to the secure cache of the computer system; and if the user does not have access, picking a second resource. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A source engine system, in a computing system having a computing system profile, for retrieving a program code resource from one of a plurality of sources of program code for a user with a user profile, the source engine system comprising:
-
an open resource module for opening a program code resource in a source if the user has access; a pick source module picking a second source for the resource program code if the user does not have access; a read data module providing the program code resource to a writer module; the writer module writing the program code resource into the secure cache of the computing system; and wherein the source engine system loads the user profile to impersonate the user profile rather than the computing system profile during retrieval of the program code resource and returns to the computing system profile after the program code resource is written to a secure cache. - View Dependent Claims (7, 8, 9)
-
-
10. A computer storage medium for storing a computer process having computer-executable instructions executing a method for caching a resource in a secure cache in a computing system having a computing system profile, the method comprising:
-
loading a user profile into the computing system; replacing the computing system profile with the user profile; determining if a user has access to a resource according to the user profile; reading the resource from a source of program code if the user profile indicates the user has access; writing the resource into a secure cache when the resource is read from the source of program code; and removing the user profile and returning to the system profile after writing the resource into cache. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification