Rule-based application access management
First Claim
Patent Images
1. A method comprising:
- executing a first streaming software application in a first streaming software container including a first runtime environment;
setting a timer within the first streaming software container;
managing rule-based access to resources within the first streaming software container associated with executing the first streaming software application;
pausing the first streaming software application in the first streaming software container;
resetting the timer within the first streaming software container;
executing a second streaming software application in a second streaming software container including a second runtime environment;
receiving a request generated by a process associated with executing the second streaming software application to access a resource within the first streaming software container associated with executing the first streaming software application;
creating a virtual image of the resource within the first streaming software container associated with executing the first streaming software application;
determining whether the process associated with executing the second streaming software application has rule-based access to the resource within the first streaming software container associated with executing the first streaming software application;
if it is determined that the process associated with executing the second streaming software application has rule-based access to the requested resource, facilitating access to the resource within the first streaming software container by providing access to the virtual image of the resource;
resuming execution of the first streaming software application in the first streaming software container.
2 Assignments
0 Petitions
Accused Products
Abstract
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.
248 Citations
14 Claims
-
1. A method comprising:
-
executing a first streaming software application in a first streaming software container including a first runtime environment; setting a timer within the first streaming software container; managing rule-based access to resources within the first streaming software container associated with executing the first streaming software application; pausing the first streaming software application in the first streaming software container; resetting the timer within the first streaming software container; executing a second streaming software application in a second streaming software container including a second runtime environment; receiving a request generated by a process associated with executing the second streaming software application to access a resource within the first streaming software container associated with executing the first streaming software application; creating a virtual image of the resource within the first streaming software container associated with executing the first streaming software application; determining whether the process associated with executing the second streaming software application has rule-based access to the resource within the first streaming software container associated with executing the first streaming software application; if it is determined that the process associated with executing the second streaming software application has rule-based access to the requested resource, facilitating access to the resource within the first streaming software container by providing access to the virtual image of the resource; resuming execution of the first streaming software application in the first streaming software container. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
at least one processor; memory storing instructions configured to instruct the at least one processor to perform; executing a first streaming software application in a first streaming software container including a first runtime environment; setting a timer within the first streaming software container; managing rule-based access to resources within the first streaming software container associated with executing the first streaming software application; pausing the first streaming software application in the first streaming software container; resetting the timer within the first streaming software container; executing a second streaming software application in a second streaming software container including a second runtime environment; receiving a request generated by a process associated with executing the second streaming software application to access a resource within the first streaming software container associated with executing the first streaming software application; creating a virtual image of the resource within the first streaming software container associated with executing the first streaming software application; determining whether the process associated with executing the second streaming software application has rule-based access to the resource within the first streaming software container associated with executing the first streaming software application; if it is determined that the process associated with executing the second streaming software application has rule-based access to the requested resource, facilitating access to the resource within the first streaming software container by providing access to the virtual image of the resource; resuming execution of the first streaming software application in the first streaming software container. - View Dependent Claims (14)
-
Specification