Patent application number | Description | Published |
20090222491 | Systems and Methods for Layered Resource Management - Systems and methods for encapsulating computing resources in one or more layers are provided. In some embodiments, a set of computing resources are encapsulated in a layer. The layer is mobile from a first storage to a second storage. A request for a specific computing resource is received by an application of a computing device. A determination is made whether the layer includes the requested computing resource. The request is processed if the layer includes the requested computing resource. The processed request is provided to the operating system of the computing device. | 09-03-2009 |
20090293057 | System and method for managing code isolation - A computing system is configured to use a trampoline to isolate sensitive code in a virtual environment and in other applications. An import table may describe the entry points of a privileged code module or driver that generates privileged code. A system and method loads a shadow kernel to facilitate isolating the linkage between drivers and the rest of the system. The shadow kernel may be a copy of the operating system kernel that does not have the same integral position in the operation of the computing device. The shadow kernel may be used as a template for creating a jump table to redirect more critical privileged resource access requests from specially loaded kernel mode drivers to the PVM. All requests may pass through the PVM, which redirects non-critical functions to the original kernel. Multiple copies of a given driver or code module may be loaded in a given session. | 11-26-2009 |
20100281479 | Systems and Methods for Input/Output Isolation - Systems and methods for providing virtual stacks are described. A kernel driver is installed and loaded. Then, a virtual stack is created, the virtual stack having a virtual file system, a virtual physical disk, and one or more virtual mounted volume devices. The virtual file system is configured to mimic characteristics of a host file system. The virtual physical disk is configured for providing an interface of a memory storage device to which the virtual file system device binds. The one or more virtual mounted volume devices are configured for allowing the one or more virtual processes to access data in stored memory through the virtual stack. | 11-04-2010 |
20120131199 | Systems and Methods for Layered Resource Management - Systems and methods for encapsulating computing resources in one or more layers are provided. In some embodiments, a set of computing resources are encapsulated in a layer. The layer is mobile from a first storage to a second storage. A request for a specific computing resource is received by an application of a computing device. A determination is made whether the layer includes the requested computing resource. The request is processed if the layer includes the requested computing resource. The processed request is provided to the operating system of the computing device. | 05-24-2012 |
20130007742 | Systems and Methods for Input/Output Isolation - Systems and methods for providing virtual stacks are described. A kernel driver is installed and loaded. Then, a virtual stack is created, the virtual stack having a virtual file system, a virtual physical disk, and one or more virtual mounted volume devices. The virtual file system is configured to mimic characteristics of a host file system. The virtual physical disk is configured for providing an interface of a memory storage device to which the virtual file system device binds. The one or more virtual mounted volume devices are configured for allowing the one or more virtual processes to access data in stored memory through the virtual stack. | 01-03-2013 |
20130198747 | SYSTEM AND METHOD FOR MANAGING CODE ISOLATION - A computing system is configured to use a trampoline to isolate sensitive code in a virtual environment and in other applications. An import table may describe the entry points of a privileged code module or driver that generates privileged code. A system and method loads a shadow kernel to facilitate isolating the linkage between drivers and the rest of the system. The shadow kernel may be a copy of the operating system kernel that does not have the same integral position in the operation of the computing device. The shadow kernel may be used as a template for creating a jump table to redirect more critical privileged resource access requests from specially loaded kernel mode drivers to the PVM. All requests may pass through the PVM, which redirects non-critical functions to the original kernel. Multiple copies of a given driver or code module may be loaded in a given session. | 08-01-2013 |
20140280436 | MIGRATION TOOL FOR IMPLEMENTING DESKTOP VIRTUALIZATION - At least a method and a system for migrating a plurality of endpoint computing devices of an organization are described herein. User applications, data, and settings are migrated from a plurality of endpoint computing devices of the organization into a client server operating environment employing a thin client implementation. A server may execute software for deploying the thin client implementation. By way of creating a personalized virtualization disk for each endpoint computing device, migration to a thin client virtualized desktop implementation may be easily performed by the organization without modification, change, or loss of user installed applications, personalized settings, and user data. | 09-18-2014 |
20150160877 | System Updates With Personal Virtual Disks - A method and system for updating a collection of software resources in a virtual desktop infrastructure system. Virtual machines associated with sets of virtual disk elements in a hierarchy of disk layers, such as basic, department, or user virtual disks are offered updates for one or more available software resources. Updates available for deployment in the virtual desktop infrastructure system are recorded in a database by a controller server. The controller server takes an inventory of all the virtual machines associated with each disk layer in the hierarchy of disk layers on which to apply the available updates. The controller server applies the one or more updates to the identified virtual machines, and stores the update application results in a database. The controller server may apply the one or more updates to virtual machines associated with descendant disk layers in the hierarchy of disk layers in view of previous applications of the updates. | 06-11-2015 |