Identifier generation using named objects
First Claim
Patent Images
1. A method comprising:
- generating, at a device, a candidate identifier for a process, the candidate identifier comprising a first portion and a second portion, the first portion being common across multiple candidate identifiers and the second portion being selected from a set of values, the set of values being a function of rules or criteria that determine the process'"'"'s access to resources of the device, a particular number of values in the set of values being based on performance counters of the device;
attempting to have a named object created, the named object having a name that is the candidate identifier;
using, in response to the attempting successfully having the named object created, the candidate identifier as an identifier for the process;
preventing, in response to the attempting to have a named object created, the creating of the named object having the same name as another named object; and
repeating, in response to the attempting not successfully having the named object created, the generating and attempting by selecting another value from the set of values for the second portion.
2 Assignments
0 Petitions
Accused Products
Abstract
A candidate identifier for a process is generated and an attempt is made to have a named object created that has a name that is the candidate identifier. In response to the attempt succeeding and the named object being created, the candidate identifier is used as an identifier for the process. In response to the attempt not succeeding and the named object not being created, the generating and attempting are repeated.
14 Citations
20 Claims
-
1. A method comprising:
-
generating, at a device, a candidate identifier for a process, the candidate identifier comprising a first portion and a second portion, the first portion being common across multiple candidate identifiers and the second portion being selected from a set of values, the set of values being a function of rules or criteria that determine the process'"'"'s access to resources of the device, a particular number of values in the set of values being based on performance counters of the device; attempting to have a named object created, the named object having a name that is the candidate identifier; using, in response to the attempting successfully having the named object created, the candidate identifier as an identifier for the process; preventing, in response to the attempting to have a named object created, the creating of the named object having the same name as another named object; and repeating, in response to the attempting not successfully having the named object created, the generating and attempting by selecting another value from the set of values for the second portion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
one or more processors; one or more computer storage media having stored thereon multiple instructions that, when executed by the one or more processors of a computing device, cause the one or more processors to; receive a request for an identifier for a process of a program; generate, at the computing device, a candidate identifier for the process, the candidate identifier comprising a first portion and a second portion, the first portion being common across multiple candidate identifiers and the second portion being selected from a set of values, the set of values being a function of rules or criteria that determine the process'"'"'s access to resources of the device, a particular number of values in the set of values being based on performance counters of the device; attempt to create a named object having a name that is the candidate identifier;
prevent, in response to the attempting to have created a named object having the same name as another named object, the creating of the named object; andreturn to the program, in response to the attempt successfully creating the named object, the candidate identifier as the identifier for the process. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
-
receiving a request for a security identifier for a process of a program on a computing device, the security identifier indicating which of one or more resources of the computing device the process is permitted to access; generating, at the computing device, a candidate security identifier for the process, the candidate security identifier including a fixed portion and a variable portion, the fixed portion being common across multiple candidate identifiers and identifying the program, and the variable portion being selected from a particular set of values, the set of values being a function of rules or criteria that determine the process'"'"'s access to resources of the device, a particular number of values in the set of values being based on performance counters of the device; attempting to create a named object having a name that is the candidate security identifier; in response to the attempting successfully creating the named object, returning the candidate security identifier as the security identifier for the process; in response to the attempting to have a named object created having the same name as another named object, preventing the creating of the named object; and in response to the attempting not successfully creating the named object, repeating the generating and attempting by selecting another value from the set of values for the second portion one or more times.
-
Specification