System and method for application isolation
First Claim
1. A system for providing application isolation to one or more applications, the system comprising:
- one or more central processing units configured to interact with;
one or more isolated environments including application files and executables;
one or more interception layers configured to intercept access to host operating system resources and host operating system interfaces;
an interception database configured to maintain mapping between the system resources inside the one or more isolated environments and outside;
wherein the one or more applications are isolated from other applications and the host operating system while running within the one or more isolated environments; and
wherein the one or more isolated environments are created during installation of the one or more applications, and updates to the one or more isolated environments occur as the one or more applications use additional resources while running;
wherein the one or more isolated environments are removed as part of uninstalling the one or more applications;
wherein the one or more isolated environments are stored for retrieval at a later time after the one or more applications are uninstalled.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer readable medium for providing application isolation to one or more applications and their associated resources. The system may include one or more isolated environments including application files and executables, and one or more interception layers intercepting access to system resources and interfaces. Further, the system may include an interception database maintaining mapping between the system resources inside the one or more isolated environments and outside, and a host operating system. The one or more applications may be isolated from other applications and the host operating system while running within the one or more isolated environments.
78 Citations
12 Claims
-
1. A system for providing application isolation to one or more applications, the system comprising:
-
one or more central processing units configured to interact with; one or more isolated environments including application files and executables; one or more interception layers configured to intercept access to host operating system resources and host operating system interfaces; an interception database configured to maintain mapping between the system resources inside the one or more isolated environments and outside; wherein the one or more applications are isolated from other applications and the host operating system while running within the one or more isolated environments; and wherein the one or more isolated environments are created during installation of the one or more applications, and updates to the one or more isolated environments occur as the one or more applications use additional resources while running; wherein the one or more isolated environments are removed as part of uninstalling the one or more applications; wherein the one or more isolated environments are stored for retrieval at a later time after the one or more applications are uninstalled. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for providing application isolation to one or more applications, the method comprising:
-
intercepting access to system resources and interfaces at one or more interception layers; maintaining mapping between the system resources inside one or more isolated environments and outside; isolating the one or more applications from other applications and a host operating system while running within the one or more isolated environments; and creating the one or more isolated environments during installation of the one or more applications, and updating the one or more isolated environments as the one or more applications use additional resources while running; wherein the one or more isolated environments are removed as part of uninstalling the one or more applications; and wherein the one or more isolated environments are stored for retrieval at a later time after the one or more applications are uninstalled.
-
-
12. A non-transitory computer readable medium for providing application isolation to one or more applications, the computer readable medium including instructions executable by a computer, the instructions for:
-
intercepting access to system resources and interfaces at one or more interception layers; maintaining mapping between the system resources inside one or more isolated environments and outside; isolating the one or more applications from other applications and a host operating system while running within the one or more isolated environments; and creating the one or more isolated environments during installation of the one or more applications, and updating the one or more isolated environments as the one or more applications use additional resources while running; wherein the one or more isolated environments are one of removed as part of uninstalling the one or more applications, and stored for retrieval at a later time after the one or more applications are uninstalled.
-
Specification