Registry emulation
First Claim
1. A method for servicing requests of an application running on a computer that uses an operating system and a local database to maintain configuration data to be accessed by the application running on the computer, the method comprising:
- generating one or more data repositories containing further configuration data for the application;
virtually combining the data repositories with the local database to create a virtual combined database corresponding to a database structure that the application would encounter if the application were installed on the computer;
intercepting selected requests of the application; and
servicing each selected request using either configuration data maintained in the local database or the further configuration data stored in the virtual combined database, whereby access to the further configuration data is controlled in a manner transparent to the application.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for running a software application on a computer having an operating system that provides a local database containing consistent configuration data to be accessed by programs running on the computer. The method includes providing a file containing further configuration data required by the application, which further data are not stored in the local database. A request by the application to access the local database is intercepted, and an item of the further configuration data is returned from the file to the application, responsive to the request.
22 Citations
8 Claims
-
1. A method for servicing requests of an application running on a computer that uses an operating system and a local database to maintain configuration data to be accessed by the application running on the computer, the method comprising:
-
generating one or more data repositories containing further configuration data for the application; virtually combining the data repositories with the local database to create a virtual combined database corresponding to a database structure that the application would encounter if the application were installed on the computer; intercepting selected requests of the application; and servicing each selected request using either configuration data maintained in the local database or the further configuration data stored in the virtual combined database, whereby access to the further configuration data is controlled in a manner transparent to the application. - View Dependent Claims (2, 3, 4)
-
-
5. A method for intercepting and servicing requests of an application running on a computer that uses an operating system and a local database to maintain configuration data to be accessed by the applications, without installation of the application on the computer, which configuration data would normally include further configuration data of the application generated during at least one of the installation or operation of the application on the computer, the method comprising:
-
providing one or more data repositories containing the further configuration data intercepting selected requests of the application; identifying the selected requests as a request for one or more configuration elements from the further configuration data; virtually combining the one or more configuration elements from the further configuration data with a configuration element from the local database to create a virtual set of configuration elements that the application would encounter if the application were actually installed; and servicing the selected requests of the application using the virtual set of configuration elements, whereby access to the configuration elements is controlled in a manner transparent to the application. - View Dependent Claims (6)
-
-
7. A method for servicing requests of an application running on a computer that uses an operating system and a local database to maintain configuration data to be accessed by programs running on the computer, the method comprising:
-
generating one or more data repositories containing further configuration data by monitoring registry access requests from the application; servicing selected requests of the application for one or more configuration elements from the further configuration data; combining the requested one or more configuration elements from the further configuration data with the local database to create a virtual combined database corresponding to a database structure the application would ordinarily encounter when installed on the computer; and servicing the selected requests of the software application using the further configuration data so as to retrieve the further configuration data in a transparent manner while running the application on the computer. - View Dependent Claims (8)
-
Specification