Mapping process changes
First Claim
1. A computer-implemented method comprising:
- receiving, at a process manager running on a computer system, a request to run a particular process on the computer system;
determining, by the process manager, whether the particular process is to be run in isolation on the computer system;
selecting, by the process manager and in response to determining that the particular process is to be run in isolation, a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process, wherein each of the plurality of permission schemes defines a different set of permission requirements for applying changes to a process being run in isolation;
fetching, by the process manager and according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment on the computer system;
running the particular process in isolation on the computer system by executing the copy object in the isolated environment;
applying, by the process manager and according to the particular permission scheme, one or more changes to the copy object;
obtaining, by the process manager, an indication that another version of the actual object is running as part of another process on the computer system; and
in response to obtaining the indication that another version of the actual object is running as part of another process on the computer system, mapping, by the process manager and according to the particular permission scheme, the one or more changes in the copy object to the actual object.
1 Assignment
0 Petitions
Accused Products
Abstract
In one implementation, a computer-implemented method includes receiving a request to run a particular process; determining whether the particular process is to be run in isolation on the computer system; selecting a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process; fetching, according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment; running the particular process is isolation on the computer system by executing the copy object in the isolated environment; applying, according to the particular permission scheme, one or more changes to the copy object; and mapping, according to the particular permission scheme, the one or more changes in the copy object to the actual object.
59 Citations
22 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a process manager running on a computer system, a request to run a particular process on the computer system; determining, by the process manager, whether the particular process is to be run in isolation on the computer system; selecting, by the process manager and in response to determining that the particular process is to be run in isolation, a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process, wherein each of the plurality of permission schemes defines a different set of permission requirements for applying changes to a process being run in isolation; fetching, by the process manager and according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment on the computer system; running the particular process in isolation on the computer system by executing the copy object in the isolated environment; applying, by the process manager and according to the particular permission scheme, one or more changes to the copy object; obtaining, by the process manager, an indication that another version of the actual object is running as part of another process on the computer system; and in response to obtaining the indication that another version of the actual object is running as part of another process on the computer system, mapping, by the process manager and according to the particular permission scheme, the one or more changes in the copy object to the actual object. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method comprising:
- receiving, at a process manager running on a computer system, a request to run a particular process on the computer system;
determining, by the process manager, whether the particular process is to be run in isolation on the computer system; selecting, by the process manager and in response to determining that the particular process is to be run in isolation, a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process, wherein each of the plurality of permission schemes defines a different set of permission requirements for applying changes to a process being run in isolation; fetching, by the process manager and according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment on the computer system; running the particular process in isolation on the computer system by executing the copy object in the isolated environment; applying, by the process manager and according to the particular permission scheme, one or more changes to the copy object; mapping, by the process manager and according to the particular permission scheme, the one or more changes in the copy object to the actual object; determining a likelihood that the copy object will require multiple mappings to the actual object within a threshold period of time; selecting a particular isolated storage scheme from among a plurality of isolated storage schemes based, at least in part, on the likelihood that the copy object will required multiple mappings within the threshold period of time; and storing the copy object and the one or more changes in the isolated environment according to the particular isolated storage scheme. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
- receiving, at a process manager running on a computer system, a request to run a particular process on the computer system;
-
19. A system comprising:
-
one or more processors and one or more computer storage media storing instructions that are operable, when executed by the one or more processors, to cause the one or more processors to perform operations comprising; receiving, at a process manager running on a computer system, a request to run a particular process on the computer system; determining, by the process manager, whether the particular process is to be run in isolation on the computer system; selecting, by the process manager and in response to determining that the particular process is to be run in isolation, a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process, wherein each of the plurality of permission schemes defines a different set of permission requirements for applying changes to a process being run in isolation; fetching, by the process manager and according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment on the computer system; running the particular process in isolation on the computer system by executing the copy object in the isolated environment; applying, by the process manager and according to the particular permission scheme, one or more changes to the copy object; mapping, by the process manager and according to the particular permission scheme, the one or more changes in the copy object to the actual object; determining a likelihood that the copy object will require multiple mappings to the actual object within a threshold period of time; selecting a particular isolated storage scheme from among a plurality of isolated storage schemes based, at least in part, on the likelihood that the copy object will required multiple mappings within the threshold period of time; and storing the copy object and the one or more changes in the isolated environment according to the particular isolated storage scheme.
-
-
20. A system comprising:
-
one or more processors and one or more computer storage media storing instructions that are operable, when executed by the one or more processors, to cause the one or more processors to perform operations comprising; receiving, at a process manager running on a computer system, a request to run a particular process on the computer system; determining, by the process manager, whether the particular process is to be run in isolation on the computer system; selecting, by the process manager and in response to determining that the particular process is to be run in isolation, a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process, wherein each of the plurality of permission schemes defines a different set of permission requirements for applying changes to a process being run in isolation; fetching, by the process manager and according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment on the computer system; running the particular process in isolation on the computer system by executing the copy object in the isolated environment; applying, by the process manager and according to the particular permission scheme, one or more changes to the copy object; obtaining, by the process manager, an indication that another version of the actual object is running as part of another process on the computer system; and in response to obtaining the indication that another version of the actual object is running as part of another process on the computer system, mapping, by the process manager and according to the particular permission scheme, the one or more changes in the copy object to the actual object.
-
-
21. A non-transitory computer-readable medium having stored thereon instructions, which, when executed by one or more computers, cause the one or more computers to perform operations comprising:
-
receiving, at a process manager running on a computer system, a request to run a particular process on the computer system; determining, by the process manager, whether the particular process is to be run in isolation on the computer system; selecting, by the process manager and in response to determining that the particular process is to be run in isolation, a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process, wherein each of the plurality of permission schemes defines a different set of permission requirements for applying changes to a process being run in isolation; fetching, by the process manager and according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment on the computer system; running the particular process in isolation on the computer system by executing the copy object in the isolated environment; applying, by the process manager and according to the particular permission scheme, one or more changes to the copy object; mapping, by the process manager and according to the particular permission scheme, the one or more changes in the copy object to the actual object; determining a likelihood that the copy object will require multiple mappings to the actual object within a threshold period of time; selecting a particular isolated storage scheme from among a plurality of isolated storage schemes based, at least in part, on the likelihood that the copy object will required multiple mappings within the threshold period of time; and storing the copy object and the one or more changes in the isolated environment according to the particular isolated storage scheme.
-
-
22. A non-transitory computer-readable medium having stored thereon instructions, which, when executed by one or more computers, cause the one or more computers to perform operations comprising:
-
receiving, at a process manager running on a computer system, a request to run a particular process on the computer system; determining, by the process manager, whether the particular process is to be run in isolation on the computer system; selecting, by the process manager and in response to determining that the particular process is to be run in isolation, a particular permission scheme from among a plurality of permission schemes based, at least in part, on one or more characteristics of the particular process, wherein each of the plurality of permission schemes defines a different set of permission requirements for applying changes to a process being run in isolation; fetching, by the process manager and according to the particular permission scheme, a copy object that corresponds to an actual object for the particular process, wherein the copy object is instantiated in an isolated environment on the computer system; running the particular process in isolation on the computer system by executing the copy object in the isolated environment; applying, by the process manager and according to the particular permission scheme, one or more changes to the copy object; obtaining, by the process manager, an indication that another version of the actual object is running as part of another process on the computer system; and in response to obtaining the indication that another version of the actual object is running as part of another process on the computer system, mapping, by the process manager and according to the particular permission scheme, the one or more changes in the copy object to the actual object.
-
Specification