Network accessible trusted code
First Claim
1. A computer program product comprising one or more computer-readable storage media, not including signals, having stored thereon computer-executable instructions that, when executed by one or more processors of a computer system, cause the computer system to perform a method for accessing a trusted assembly from a virtualized location, the method comprising:
- an act of detecting receipt of a request from the computer system to access an assembly comprising a library that is shared by a plurality of software programs, wherein the address of the assembly is expressed in the request as a virtualized location, the assembly being stored on a separate computer system in a trusted assembly cache;
an act of resolving the virtualized location to a physical location where the assembly is physically stored on the separate computer system, the resolving comprising accessing an information store that maintains the current physical location corresponding to the requested assembly'"'"'s virtualized location;
an act of determining whether the requested assembly qualifies as a trusted assembly by verifying that the assembly sufficiently complies with information encoded within the assembly; and
upon determining that the requested assembly is trusted, an act of accessing the requested assembly from the physical location.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a computer system performs a method for accessing a trusted assembly from a virtualized location. A computer system detects receipt of a request to access an assembly. The address of the assembly is expressed in the request as a virtualized location. The computer system resolves the virtualized location to a physical location where the assembly is physically stored. The resolving includes accessing an information store that maintains the current physical location corresponding to the requested assembly'"'"'s virtualized location. The computer system determines whether the requested assembly qualifies as a trusted assembly by verifying that the assembly sufficiently complies with information encoded within the assembly. Lastly, upon determining that the requested assembly is trusted, the computer system accesses the requested assembly from the physical location.
-
Citations
20 Claims
-
1. A computer program product comprising one or more computer-readable storage media, not including signals, having stored thereon computer-executable instructions that, when executed by one or more processors of a computer system, cause the computer system to perform a method for accessing a trusted assembly from a virtualized location, the method comprising:
-
an act of detecting receipt of a request from the computer system to access an assembly comprising a library that is shared by a plurality of software programs, wherein the address of the assembly is expressed in the request as a virtualized location, the assembly being stored on a separate computer system in a trusted assembly cache; an act of resolving the virtualized location to a physical location where the assembly is physically stored on the separate computer system, the resolving comprising accessing an information store that maintains the current physical location corresponding to the requested assembly'"'"'s virtualized location; an act of determining whether the requested assembly qualifies as a trusted assembly by verifying that the assembly sufficiently complies with information encoded within the assembly; and upon determining that the requested assembly is trusted, an act of accessing the requested assembly from the physical location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising one or more computer-readable storage media, not including signals, having stored thereon computer-executable instructions that, when executed by one or more processors of a computer system, cause the computer system to perform a method for accessing trusted assemblies from a virtualized location, the method comprising:
-
an act of installing a software program, wherein the act of installing the software program results in an installation of a subset, but not all, of files helpful to implement one or more portions of the software program'"'"'s functionality; an act of receiving from the software program a request for an assembly comprising a library that is shared by a plurality of software programs; an act of querying a local assembly cache for the requested assembly; upon determining that the requested assembly is not stored in the local assembly cache, an act of using a network protocol to retrieve the requested assembly from a virtualized location, the virtual location representing a location in an assembly cache on a separate computer system; an act of using the network protocol to determine whether an updated version of the requested assembly exists; and upon determining that an updated version of the requested assembly exists, an act of accessing the updated version of the requested assembly. - View Dependent Claims (18, 19)
-
-
20. A method for accessing a trusted program file from an addressable location, the method comprising:
-
an act of receiving a communication at a first computer system, wherein the communication includes a request to access a program file, the address of the program file being expressed in the request as a first addressable location, the program file comprising a library that is shared by a plurality of software programs; an act of resolving the first addressable location to a second addressable location, wherein the program file is physically stored at the second addressable location in an assembly cache, the second addressable location being a second computer system separate from the first computer system, the resolving comprising accessing an information store that maintains the current physical location of a program file corresponding to the requested program file'"'"'s first addressable location; an act of determining whether the requested program file qualifies as a trusted program file by verifying that the program file at least sufficiently complies with information encoded within the program file; and if it is determined that the requested program file is trusted, an act of accessing the requested program file from the second location.
-
Specification