Patent application number | Description | Published |
20100037206 | METHOD AND SYSTEM FOR CONFIGURATION OF VIRTUALIZED SOFTWARE APPLICATIONS - A method of virtualizing an application to execute on a plurality of operating systems without installation. The method includes creating an input configuration file for each operating system. The templates each include a collection of configurations that were made by the application during installation on a computing device executing the operating system. The templates are combined into a single application template having a layer including the collection of configurations for each operating system. The collection of configurations includes files and registry entries. The collections also identifies and configures environmental variables, systems, and the like. Files in the collection of configurations and references to those files may be replaced with references to files stored on installation media. The application template is used to build an executable of the virtualized application. The application template may be incorporated into a manifest listing other application templates and made available to users from a website. | 02-11-2010 |
20100037235 | METHOD AND SYSTEM FOR VIRTUALIZATION OF SOFTWARE APPLICATIONS - A method of virtualizing an application to execute on a plurality of operating systems without installation. The method includes creating an input configuration file for each operating system. The templates each include a collection of configurations that were made by the application during installation on a computing device executing the operating system. The templates are combined into a single application template having a layer including the collection of configurations for each operating system. The collection of configurations includes files and registry entries. The collections also identifies and configures environmental variables, systems, and the like. Files in the collection of configurations and references to those files may be replaced with references to files stored on installation media. The application template is used to build an executable of the virtualized application. The application template may be incorporated into a manifest listing other application templates and made available to users from a website. | 02-11-2010 |
20110173607 | METHOD OF CONFIGURING A VIRTUAL APPLICATION - A method of modifying a virtual application configuration to include modifications made at runtime by a virtual application that is implemented by a first virtualized application file that was created previously using the virtual application configuration. At runtime, the virtual application implemented by the first virtualized application file stores modifications to its configuration in a sandbox memory location. The method includes reading the modifications from the sandbox memory location. Then, the modifications are written to the virtual application configuration. The modified virtual application configuration is then used to create a second virtualized application file that includes the modifications stored in the sandbox memory location. | 07-14-2011 |
20110191772 | METHOD AND SYSTEM FOR IMPROVING STARTUP PERFORMANCE AND INTEROPERABILITY OF A VIRTUAL APPLICATION - A data structure including simple and complex objects. Each simple object includes a content type indicator, a size indicator, and one or more simple data types. Each complex object includes a content type indicator, a size indicator, and one or more child objects. The complex objects include a layer object having first and second child objects. The first child object is a collection of complex objects storing information for configuring a virtual filesystem of a virtual application at application startup. The second child object is a collection of complex objects storing information for configuring a virtual registry of the virtual application at application startup. Reading of selected simple and complex objects may be deferred at startup based on the content type indicator. Deferred objects may be read after startup when access to information stored by the deferred object is request by the virtual application. | 08-04-2011 |
20120096071 | METHOD AND SYSTEM FOR PUBLISHING VIRTUAL APPLICATIONS TO A WEB SERVER - A method and system for publishing virtual applications on the Internet. The method includes obtaining a list of applications associated with a publisher from a server computing device and displaying the list to a user via a user interface. Next, a selection by the user of one of the applications is received from the user interface. A new virtualized version of the selected application is built. The virtualized version includes at least one application file that at least partially implements the new virtualized version of the selected application. Then, the application file is uploaded to the server computing device. An application address is received from the server computing device and a link to the application address is displayed to the user via the user interface. The virtualized version of the application is available at the application address for download and execution over a network (e.g., the Internet). | 04-19-2012 |
20120110337 | METHOD AND SYSTEM FOR RESTRICTING EXECUTION OF VIRTUAL APPLICATIONS TO A MANAGED PROCESS ENVIRONMENT - Methods and systems for restricting the launch of virtual application files. In one embodiment, a launching application is signed with a digital signature. When the launching application launches a runtime engine and instructs it to execute an application file, the runtime engine determines whether an entity identifier associated with the launching application identifies an authorized entity. If the entity identifier identifies an authorized entity and the digital signature is valid, the runtime engine executes the application file. In another embodiment, a ticket is transmitted to the launching application along with an instruction to launch the application file. The ticket includes a digital signature and an expiration date. The launching application communicates the ticket to the runtime engine, which will execute the application file only if the digital signature is valid and a current date is not later than the expiration date. | 05-03-2012 |
20130086386 | METHOD AND SYSTEM FOR RESTRICTING EXECUTION OF VIRTUAL APPLICATIONS TO A MANAGED PROCESS ENVIRONMENT - Methods and systems for restricting the launch of virtual application files. In one embodiment, a launching application is signed with a digital signature. When the launching application launches a runtime engine and instructs it to execute an application file, the runtime engine determines whether an entity identifier associated with the launching application identifies an authorized entity. If the entity identifier identifies an authorized entity and the digital signature is valid, the runtime engine executes the application file. In another embodiment, a ticket is transmitted to the launching application along with an instruction to launch the application file. The ticket includes a digital signature and an expiration date. The launching application communicates the ticket to the runtime engine, which will execute the application file only if the digital signature is valid and a current date is not later than the expiration date. | 04-04-2013 |
20130247070 | METHOD AND SYSTEM FOR VIRTUALIZATION OF SOFTWARE APPLICATIONS - A method of virtualizing an application to execute on a plurality of operating systems without installation. The method includes creating an input configuration file for each operating system. The templates each include a collection of configurations that were made by the application during installation on a computing device executing the operating system. The templates are combined into a single application template having a layer including the collection of configurations for each operating system. The collection of configurations includes files and registry entries. The collections also identifies and configures environmental variables, systems, and the like. Files in the collection of configurations and references to those files may be replaced with references to files stored on installation media. The application template is used to build an executable of the virtualized application. The application template may be incorporated into a manifest listing other application templates and made available to users from a website. | 09-19-2013 |
20140344315 | METHOD AND SYSTEM FOR CONFIGURATION OF VIRTUALIZED SOFTWARE APPLICATIONS - A method of virtualizing an application to execute on a plurality of operating systems without installation. The method includes creating an input configuration file for each operating system. The templates each include a collection of configurations that were made by the application during installation on a computing device executing the operating system. The templates are combined into a single application template having a layer including the collection of configurations for each operating system. The collection of configurations includes files and registry entries. The collections also identifies and configures environmental variables, systems, and the like. Files in the collection of configurations and references to those files may be replaced with references to files stored on installation media. The application template is used to build an executable of the virtualized application. The application template may be incorporated into a manifest listing other application templates and made available to users from a website. | 11-20-2014 |
20140351516 | METHOD AND SYSTEM FOR VIRTUALIZATION OF SOFTWARE APPLICATIONS - A method of virtualizing an application to execute on a plurality of operating systems without installation. The method includes creating an input configuration file for each operating system. The templates each include a collection of configurations that were made by the application during installation on a computing device executing the operating system. The templates are combined into a single application template having a layer including the collection of configurations for each operating system. The collection of configurations includes files and registry entries. The collections also identifies and configures environmental variables, systems, and the like. Files in the collection of configurations and references to those files may be replaced with references to files stored on installation media. The application template is used to build an executable of the virtualized application. The application template may be incorporated into a manifest listing other application templates and made available to users from a website. | 11-27-2014 |
20150149537 | METHOD AND SYSTEM FOR PUBLISHING VIRTUAL APPLICATIONS TO A WEB SERVER - A method and system for publishing virtual applications on the Internet. The method includes obtaining a list of applications associated with a publisher from a server computing device and displaying the list to a user via a user interface. Next, a selection by the user of one of the applications is received from the user interface. A new virtualized version of the selected application is built. The virtualized version includes at least one application file that at least partially implements the new virtualized version of the selected application. Then, the application file is uploaded to the server computing device. An application address is received from the server computing device and a link to the application address is displayed to the user via the user interface. The virtualized version of the application is available at the application address for download and execution over a network (e.g., the Internet). | 05-28-2015 |
20150150005 | METHOD OF CONFIGURING A VIRTUAL APPLICATION - A method of modifying a virtual application configuration to include modifications made at runtime by a virtual application that is implemented by a first virtualized application file that was created previously using the virtual application configuration. At runtime, the virtual application implemented by the first virtualized application file stores modifications to its configuration in a sandbox memory location. The method includes reading the modifications from the sandbox memory location. Then, the modifications are written to the virtual application configuration. The modified virtual application configuration is then used to create a second virtualized application file that includes the modifications stored in the sandbox memory location. | 05-28-2015 |
20150302183 | METHOD AND SYSTEM FOR RESTRICTING EXECUTION OF VIRTUAL APPLICATION TO A MANAGED PROCESS ENVIRONMENT - Methods and systems for restricting the launch of virtual application files. In one embodiment, a launching application is signed with a digital signature. When the launching application launches a runtime engine and instructs it to execute an application file, the runtime engine determines whether an entity identifier associated with the launching application identifies an authorized entity. If the entity identifier identifies an authorized entity and the digital signature is valid, the runtime engine executes the application file. In another embodiment, a ticket is transmitted to the launching application along with an instruction to launch the application file. The ticket includes a digital signature and an expiration date. The launching application communicates the ticket to the runtime engine, which will execute the application file only if the digital signature is valid and a current date is not later than the expiration date. | 10-22-2015 |
20160026509 | METHOD AND SYSTEM FOR IMPROVING STARTUP PERFORMANCE AND INTEROPERABILITY OF A VIRTUAL APPLICATION - A data structure including simple and complex objects. Each simple object includes a content type indicator, a size indicator, and one or more simple data types. Each complex object includes a content type indicator, a size indicator, and one or more child objects. The complex objects include a layer object having first and second child objects. The first child object is a collection of complex objects storing information for configuring a virtual filesystem of a virtual application at application startup. The second child object is a collection of complex objects storing information for configuring a virtual registry of the virtual application at application startup. Reading of selected simple and complex objects may be deferred at startup based on the content type indicator. Deferred objects may be read after startup when access to information stored by the deferred object is request by the virtual application. | 01-28-2016 |
Patent application number | Description | Published |
20130318236 | KEY INDICATORS VIEW - A system and computer-implemented is provided for displaying a configurable metric relating to an environment in a graphical display along with a value of the metric calculated over a configurable time period. The metric is used to identify events of interest in the environment based on processing real time machine data from one or more sources. The configurable metric is selected and a corresponding value is calculated based on the events of interest over the configurable time period. The value of the metric may be continuously updated in real time based on receiving additional real-time machine data and displayed in a graphical interface as time progresses. Statistical trends in the value of the metric may also be determined over the configurable time period and displayed in the graphical interface as well as an indication if the value of the metric exceeds a configurable threshold value. Further, a selection of one or more thresholds for the value of the metric may be applied and an indication displayed indicating if the threshold(s) have been exceeded. | 11-28-2013 |
20130318604 | BLACKLISTING AND WHITELISTING OF SECURITY-RELATED EVENTS - A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI. | 11-28-2013 |
20130326620 | INVESTIGATIVE AND DYNAMIC DETECTION OF POTENTIAL SECURITY-THREAT INDICATORS FROM EVENTS IN BIG DATA - A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats. | 12-05-2013 |
20150040225 | BLACKLISTING AND WHITELISTING OF SECURITY-RELATED EVENTS - A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI. | 02-05-2015 |
20160057162 | DETECTION OF POTENTIAL SECURITY THREATS FROM EVENT DATA - A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats. | 02-25-2016 |
Patent application number | Description | Published |
20090012449 | FLUID DELIVERY SYSTEM WITH AUTOCONNECT FEATURES - A fluid dispensing machine, such as a peritoneal dialysis or hemodialysis machine, includes a dispenser or cassette that pumps a medical fluid for dialysis or other treatments for patients. The machine includes and uses an autoconnect device for connecting containers of liquid, such as bags of dialysis fluid or medication fluids, to the machine, while maintaining the sterility of the connection. The autoconnect device removes the cap from the fluid bag and pierces the scaling membrane on tubing from the bag. This makes it easier for patients to receive treatment, especially home treatment. Other embodiments are useful for dispensing other liquids from other types of dispensing or pumping machines. | 01-08-2009 |
20110230822 | MEDICAL FLUID MACHINE WITH SUPPLY AUTOCONNECTION - A medical fluid machine with supply autoconnection, the machine comprising: a cassette-receiving wall; a disposable cassette held firmly by the wall, the disposable cassette including a port spike, the port spike fitted with a spike cap; a translating shuttle including a channel sized to hold a portion of a supply tube and including a fixture for releasably holding a supply tube end; a supply tube including an end configured to be releasably held by the fixture of the channel of the translating shuttle, the supply tube fitted with a supply tube cap; a cap removal device selectively positionable between the disposable cassette and the translating shuttle; and a controller programmed to (i) translate the shuttle holding the supply tube at the supply tube end towards the disposable cassette, so that the cap removal device is likewise moved towards the disposable cassette and the spike cap of the disposable cassette is engaged, (ii) translate the shuttle holding the supply tube at the supply tube end away from the disposable cassette and the cap removal device, so that the cap removal device can pull the spike cap off of the port spike and the tube cap off of the tube end, and (iii) translate the shuttle back towards the disposable cassette to allow the port spike of the cassette to spike the tube end. | 09-22-2011 |
20130138037 | MEDICAL FLUID MACHINE WITH SUPPLY AUTOCONNECTION - A medical fluid system including: fluid containers and a tube extending from same, each tube including a cap; a pumping cassette including port spikes; a medical fluid machine including: occluders; a shuttle configured to receive the tubes, wherein each tube is associated with one of the occluders; a driving mechanism translating the shuttle; a cap removal device between the cassette and the shuttle; and a control unit programmed to cause: (i) the occluders to pinch their tubes, (ii) cause the driving mechanism to translate the shuttle towards the fluid pumping cassette, the cap removal device engaging the tube caps, (iii) the driving mechanism to translate the shuttle away from the fluid pumping cassette and cap removal device, pulling the tube caps off of the tubes, and (iv) the driving mechanism to translate the shuttle back towards the fluid pumping cassette for the port spikes to spike the occluded tubes. | 05-30-2013 |
20140360594 | MEDICAL FLUID MACHINE WITH SUPPLY AUTOCONNECTION - A system for automatically connecting tubing to a medical fluid machine includes at least one fluid container including a tube having a cap on an end of the tube, a shuttle configured to receive the tube, a driving mechanism configured to translate the shuttle, a cap removal device configured to remove the cap from the end of the tube, and a control unit programmed to cause (i) the driving mechanism to translate the shuttle holding the tube in a first direction towards the cap removal device so that the cap removal device can engage the tube cap, (ii) the driving mechanism to translate in a second direction away from the cap removal device so that the cap removal device removes the cap from the end of the tube, and (iii) the driving mechanism to translate the shuttle in the first direction with the cap removed from the tube so that the tube can be mated with the medical fluid machine. | 12-11-2014 |