Method for accessing, by application programs, resources residing inside an application isolation scope
First Claim
Patent Images
1. A method for accessing, by application programs, resources provided by an operating system, the method comprising:
- (a) receiving, by a process executing inside a first application isolation scope provided by an application isolation layer, but outside second application isolation scope provided by an application isolation layer, a request for a resource and an identifier associated with the resource from a process executing inside the second application isolation scope, wherein an application isolation layer and a user isolation layer together comprise an isolation environment;
(b) determining that the requested resource resides inside the first application isolation scope;
(c) redirecting the request for the resource and the identifier associated with the resource to the first application isolation scope; and
(d) responding to the request for the resource using an instance of the resource residing inside the first application isolation scope.
9 Assignments
0 Petitions
Accused Products
Abstract
In a method for accessing, by application programs, resources provided by an operating system, a process receives a request for a resource and an identifier associated with the resource. It is determined that the requested resource resides inside an application isolation environment. The request for the resource and the identifier associated with the resource is redirected to the application isolation environment. The request for the resource is responded to using an instance of the resource residing inside the application isolation environment.
-
Citations
108 Claims
-
1. A method for accessing, by application programs, resources provided by an operating system, the method comprising:
-
(a) receiving, by a process executing inside a first application isolation scope provided by an application isolation layer, but outside second application isolation scope provided by an application isolation layer, a request for a resource and an identifier associated with the resource from a process executing inside the second application isolation scope, wherein an application isolation layer and a user isolation layer together comprise an isolation environment; (b) determining that the requested resource resides inside the first application isolation scope; (c) redirecting the request for the resource and the identifier associated with the resource to the first application isolation scope; and (d) responding to the request for the resource using an instance of the resource residing inside the first application isolation scope. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for accessing, by application programs, resources provided by an operating system, the method comprising:
-
(a) receiving a request for a resource and an identifier associated with the resource; (b) determining, by a process executing inside a first application isolation scope provided by an application isolation layer, but outside second application isolation scope provided by an application isolation layer, that the requested resource resides inside the first application isolation scope but is requested by a process executing inside the second application isolation scope, wherein an application isolation layer and a user isolation layer together comprise an isolation environment; (c) redirecting the request for the resource and the identifier associated with the resource to the first application isolation scope; and (d) responding to the request for the resource using an instance of the resource residing inside the first application isolation scope. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method for accessing, by application programs, resources provided by an operating system, the method comprising:
-
(a) receiving a request for a resource and an identifier associated with the resource from a process executing inside a first application isolation scope provided by an application isolation layer; (b) determining that the requested resource resides inside second application isolation scope provided by an application isolation layer, wherein the application isolation layer and a user isolation layer together comprise an isolation environment; (c) redirecting, by a process executing inside the first application isolation scope, the request for the resource and the identifier associated with the resource to the second application isolation scope; and (d) responding to the request for the resource using an instance of the resource residing inside the second application isolation scope. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method for accessing, by application programs, resources provided by an operating system, the method comprising:
-
(a) receiving a request for a resource and an identifier associated with the resource from a process executing inside a first application isolation scope provided by an application isolation layer; (b) determining that the requested resource resides inside second application isolation scope provided by an application isolation layer, wherein the application isolation layer and a user isolation layer together comprise an isolation environment; (c) redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; and (d) responding, by a process executing inside the first application isolation scope, to the request for the resource using an instance of the resource residing inside the second application isolation scope. - View Dependent Claims (22, 23, 24)
-
-
25. A system, comprising a computer processor, for accessing, by application programs, resources provided by an operating system comprising:
-
a resource provided by an operating system executing on a computer processor; a first process, executing inside first application isolation scope provided by an application isolation layer, receiving a request for the resource and an identifier associated with the resource, wherein the application isolation layer and a user isolation layer together comprise an isolation environment; a second process determining that the resource resides inside a second application isolation scope; a third process redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; and a fourth process responding to the request for the resource using an instance of the resource residing in the second application isolation scope. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A system, comprising a computer processor, for accessing, by application programs, resources provided by an operating system comprising:
-
a resource provided by an operating system executing on a computer processor; a first process receiving a request for the resource and an identifier associated with the resource; a second process, executing inside first application isolation scope provided by an application isolation layer, determining that the resource resides inside a second application isolation scope provided by an application isolation layer, wherein an application isolation layer and a user isolation layer together comprise an isolation environment; a third process redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; and a fourth process responding to the request for the resource using an instance of the resource residing in the second application isolation scope. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. A system, comprising a computer processor, for accessing, by application programs, resources provided by an operating system comprising:
-
a resource provided by an operating system executing on a computer processor; a first process receiving, from a process executing in a first application isolation scope provided by an application isolation layer, a request for the resource and an identifier associated with the resource; a second process determining that the resource resides inside second application isolation scope provided by an application isolation layer, wherein the application isolation layer and a user isolation layer together comprise an isolation environment; a third process, executing outside the second application isolation scope, redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; and a fourth process responding to the request for the resource using an instance of the resource residing in the second application isolation scope. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87)
-
-
88. A system, comprising a computer processor, for accessing, by application programs, resources provided by an operating system comprising:
-
a resource provided by an operating system executing on a computer processor; a first process receiving, from a process executing in a first application isolation scope provided by an application isolation layer, a request for the resource and an identifier associated with the resource; a second process determining that the resource resides inside second application isolation scope provided by an application isolation layer, wherein the application isolation layer and a user isolation layer together comprise an isolation environment; a third process redirecting the request for the resource and the identifier associated with the resource to the second application isolation scope; and a fourth process, executing outside the second application isolation scope, responding to the request for the resource using an instance of the resource residing in the second application isolation scope. - View Dependent Claims (89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108)
-
Specification