DYNAMIC INSERTION AND REMOVAL OF VIRTUAL SOFTWARE SUB-LAYERS
    21.
    发明申请
    DYNAMIC INSERTION AND REMOVAL OF VIRTUAL SOFTWARE SUB-LAYERS 有权
    动态插入和删除虚拟软件子层

    公开(公告)号:US20120297374A1

    公开(公告)日:2012-11-22

    申请号:US13551576

    申请日:2012-07-17

    Inventor: Randall R. Cook

    CPC classification number: G06F8/67 G06F8/61 G06F8/65 G06F8/656 G06F17/30067

    Abstract: The disclosure is directed to dynamic insertion and removal of virtual software sub-layers. In one example, a virtual layer associated with a software application is virtually installed and activated in a computing device. A virtual sub-layer associated with a component of the software application is dynamically inserted in the virtual layer. The virtual layer remains active during the dynamic insertion of the virtual sub-layer. In certain embodiments, a process is executed from the virtual layer, a determination is made as to whether the process launched before or after the insertion of the virtual sub-layer, and the inserted virtual sub-layer is selectively made visible or invisible to the process based on the determination.

    Abstract translation: 本公开旨在动态插入和移除虚拟软件子层。 在一个示例中,与计算设备虚拟地安装并激活与软件应用相关联的虚拟层。 与软件应用的组件相关联的虚拟子层被动态地插入到虚拟层中。 虚拟层在动态插入虚拟子层期间保持活动状态。 在某些实施例中,从虚拟层执行处理,确定在虚拟子层的插入之前或之后启动的进程以及插入的虚拟子层是否被选择性地使其可见或不可见 过程基于确定。

    Dynamic insertion and removal of virtual software sub-layers
    22.
    发明授权
    Dynamic insertion and removal of virtual software sub-layers 有权
    动态插入和删除虚拟软件子层

    公开(公告)号:US08261254B2

    公开(公告)日:2012-09-04

    申请号:US12058782

    申请日:2008-03-31

    Inventor: Randall R. Cook

    CPC classification number: G06F8/67 G06F8/61 G06F8/65 G06F8/656 G06F17/30067

    Abstract: The disclosure is directed to dynamic insertion and removal of virtual software sub-layers. In one example, a virtual layer associated with a software application is virtually installed and activated in a computing device. A virtual sub-layer associated with a component of the software application is dynamically inserted in the virtual layer. The virtual layer remains active during the dynamic insertion of the virtual sub-layer. In certain embodiments, a process is executed from the virtual layer, a determination is made as to whether the process launched before or after the insertion of the virtual sub-layer, and the inserted virtual sub-layer is selectively made visible or invisible to the process based on the determination.

    Abstract translation: 本公开旨在动态插入和移除虚拟软件子层。 在一个示例中,与计算设备虚拟地安装并激活与软件应用相关联的虚拟层。 与软件应用的组件相关联的虚拟子层被动态地插入到虚拟层中。 虚拟层在动态插入虚拟子层期间保持活动状态。 在某些实施例中,从虚拟层执行处理,确定在虚拟子层的插入之前或之后启动的进程以及插入的虚拟子层是否被选择性地使其可见或不可见 过程基于确定。

    Systems, apparatus, and methods for layered execution
    23.
    发明授权
    Systems, apparatus, and methods for layered execution 有权
    用于分层执行的系统,设备和方法

    公开(公告)号:US08112767B1

    公开(公告)日:2012-02-07

    申请号:US11959700

    申请日:2007-12-19

    Inventor: Randall R. Cook

    CPC classification number: G06F9/445 G06F9/44568 G06F9/45504

    Abstract: The disclosure is directed to systems, apparatus, and methods for layered execution. In one example, a layered execution environment is provided where one or more layers are overlaid over a base operating environment in a manner that they appear to be installed on the local system. The first layer may include a resource associated with one or more resources on a second layer. The resource on the first layer may be monitored to determine when access to the resource is requested. In response to access to the resource of the first layer, the second layer, which comprises the associated resources, may be activated. By activating the second layer only in response to a request to access a resource on the first layer, associated resources may be selectively activated resulting in more efficient execution.

    Abstract translation: 本公开涉及用于分层执行的系统,装置和方法。 在一个示例中,提供分层执行环境,其中一个或多个层以其似乎安装在本地系统上的方式覆盖在基本操作环境上。 第一层可以包括与第二层上的一个或多个资源相关联的资源。 可以监视第一层上的资源,以确定何时请求访问资源。 响应于对第一层的资源的访问,可以激活包括相关资源的第二层。 通过仅响应于访问第一层上的资源的请求来激活第二层,可以选择性地激活相关联的资源,从而实现更有效的执行。

    Systems and methods for transparently restoring data using file streaming
    24.
    发明授权
    Systems and methods for transparently restoring data using file streaming 有权
    使用文件流透明地恢复数据的系统和方法

    公开(公告)号:US08060479B1

    公开(公告)日:2011-11-15

    申请号:US12058036

    申请日:2008-03-28

    Inventor: Randall R. Cook

    CPC classification number: G06F17/30221

    Abstract: A computer-implemented method for transparently restoring data using streaming may comprise identifying an attempt to access backed-up data that is not present on a computing device, transmitting a request to a server to restore the backed-up data, receiving the backed-up data from the server via streaming, and restoring the backed-up data to the computing device. A corresponding method for streaming backed-up data to a target computing device is also disclosed. In addition, corresponding systems and computer-readable media are also disclosed.

    Abstract translation: 用于使用流式透明地恢复数据的计算机实现的方法可以包括识别访问计算设备上不存在的备份数据的尝试,向服务器发送请求以恢复备份的数据,接收备份的数据 通过流式传输来自服务器的数据,以及将备份的数据恢复到计算设备。 还公开了用于将备份的数据流传送到目标计算设备的相应方法。 此外,还公开了相应的系统和计算机可读介质。

    Systems and methods for imaging a computer system
    25.
    发明授权
    Systems and methods for imaging a computer system 有权
    用于计算机系统成像的系统和方法

    公开(公告)号:US07882342B1

    公开(公告)日:2011-02-01

    申请号:US12059791

    申请日:2008-03-31

    Inventor: Randall R. Cook

    CPC classification number: G06F8/63 G06F9/4416

    Abstract: A computer-implemented method of imaging a computer system may include taking an image of the computer system that includes those files needed to boot an operating system but excludes at least some of those files that are not needed to boot the operating system. The image may be loaded on a target computer system, which may or may not be the same as the imaged computer system, to enable the target computer system to boot the operating system. Those files that are not needed to boot the operating system may be streamed to the target computer system on an as-needed basis or in the background. Corresponding systems and computer-readable media are also disclosed.

    Abstract translation: 计算机实现的对计算机系统进行成像的方法可以包括拍摄包括引导操作系统所需的那些文件的计算机系统的图像,但不包括引导操作系统不需要的那些文件中的至少一些。 图像可以被加载到目标计算机系统上,该计算机系统可以与成像的计算机系统相同或不同,以使目标计算机系统能够引导操作系统。 那些不需要启动操作系统的文件可能会根据需要或后台流式传输到目标计算机系统。 还公开了相应的系统和计算机可读介质。

    Intrustion protection system utilizing layers and triggers
    26.
    发明授权
    Intrustion protection system utilizing layers and triggers 有权
    使用层和触发器的入侵保护系统

    公开(公告)号:US07549164B2

    公开(公告)日:2009-06-16

    申请号:US11082194

    申请日:2005-03-16

    CPC classification number: H04L63/1441 G06F8/61 G06F21/53 G06F21/566 H04L63/16

    Abstract: The inventions relate generally to protection of computing systems by isolating intrusive attacks into layers, those layers containing at least file objects and being accessible to applications, those layers further maintaining potentially intrusive file objects separately from regular file system objects such that the regular objects are protected and undisturbed. Also disclosed herein are computing systems which use layers and/or isolation layers, and various systems and methods for using those systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.

    Abstract translation: 本发明一般涉及通过将入侵攻击隔离成层,这些层至少包含文件对象并且可被应用程序访问的那些层,这些层进一步将常规文件系统对象分开保留潜在的侵入性文件对象,使得常规对象被保护 并不受干扰。 本文还公开了使用层和/或隔离层的计算系统以及用于使用这些系统的各种系统和方法。 在下面的详细描述中提供了关于本发明的各种示例性实施例的详细信息,并且本发明由所附权利要求限定。

    Dynamic insertion and removal of virtual software sub-layers
    27.
    发明授权
    Dynamic insertion and removal of virtual software sub-layers 有权
    动态插入和删除虚拟软件子层

    公开(公告)号:US09081644B2

    公开(公告)日:2015-07-14

    申请号:US13551576

    申请日:2012-07-17

    Inventor: Randall R. Cook

    CPC classification number: G06F8/67 G06F8/61 G06F8/65 G06F8/656 G06F17/30067

    Abstract: The disclosure is directed to dynamic insertion and removal of virtual software sub-layers. In one example, a virtual layer associated with a software application is virtually installed and activated in a computing device. A virtual sub-layer associated with a component of the software application is dynamically inserted in the virtual layer. The virtual layer remains active during the dynamic insertion of the virtual sub-layer. In certain embodiments, a process is executed from the virtual layer, a determination is made as to whether the process launched before or after the insertion of the virtual sub-layer, and the inserted virtual sub-layer is selectively made visible or invisible to the process based on the determination.

    Abstract translation: 本公开旨在动态插入和移除虚拟软件子层。 在一个示例中,与计算设备虚拟地安装并激活与软件应用相关联的虚拟层。 与软件应用的组件相关联的虚拟子层被动态地插入到虚拟层中。 虚拟层在动态插入虚拟子层期间保持活动状态。 在某些实施例中,从虚拟层执行处理,确定在虚拟子层的插入之前或之后启动的进程以及插入的虚拟子层是否被选择性地使其可见或不可见 过程基于确定。

    Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same
    28.
    发明授权
    Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same 有权
    用于替换存储在非安全环境中的敏感信息的安全引用的系统和方法

    公开(公告)号:US09003542B1

    公开(公告)日:2015-04-07

    申请号:US12966307

    申请日:2010-12-13

    CPC classification number: G06F21/50 G06F21/62 G06F2221/2111

    Abstract: A computer-implemented method for replacing sensitive information stored within non-secure environments with secure references to the same may include (1) identifying sensitive information stored within a non-secure environment on a computing device, (2) removing the sensitive information from the non-secure environment, (3) storing the sensitive information within a secure environment, (4) replacing the sensitive information originally stored within the non-secure environment with a reference that identifies the sensitive information stored within the secure environment, (5) identifying a request to access at least a portion of the sensitive information identified in the reference, (6) determining that at least a portion of the request satisfies a data-loss-prevention policy, and then (7) providing access to at least a portion of the sensitive information via the secure environment. Various other systems, methods, and computer-readable media are also disclosed.

    Abstract translation: 用于以安全参考的方式替换存储在非安全环境中的敏感信息的计算机实现的方法可以包括(1)识别存储在计算设备上的非安全环境中的敏感信息,(2)从 (3)将敏感信息存储在安全环境中,(4)用存储在安全环境中的敏感信息的引用替代最初存储在非安全环境中的敏感信息,(5)识别 访问参考中标识的敏感信息的至少一部分的请求,(6)确定请求的至少一部分满足数据丢失防止策略,然后(7)提供对至少一部分的访问 的敏感信息通过安全的环境。 还公开了各种其它系统,方法和计算机可读介质。

    Systems and methods for classifying files
    29.
    发明授权
    Systems and methods for classifying files 有权
    用于分类文件的系统和方法

    公开(公告)号:US08650166B1

    公开(公告)日:2014-02-11

    申请号:US13179809

    申请日:2011-07-11

    CPC classification number: G06F17/30082 G06F17/3012

    Abstract: A computer-implemented method for classifying files may include identifying data to be written to a file on a storage system. The method may also include, before the data is written to the storage system, 1) identifying a characteristic of the data, 2) determining, based on the characteristic of the data, a classification for the file, and 3) using the classification of the file to select a location within the storage system where the file should be stored. The method may further include writing the data to the file at the selected location within the storage system. Various other methods, systems, and computer-readable media are also disclosed herein.

    Abstract translation: 用于分类文件的计算机实现的方法可以包括识别要写入存储系统上的文件的数据。 该方法还可以包括在将数据写入存储系统之前,1)识别数据的特性,2)基于该数据的特征确定该文件的分类,以及3)使用 该文件选择存储系统中应存储文件的位置。 该方法还可以包括将数据写入存储系统内所选位置的文件。 本文还公开了各种其它方法,系统和计算机可读介质。

    Feature based software virtualization
    30.
    发明授权
    Feature based software virtualization 有权
    基于功能的软件虚拟化

    公开(公告)号:US08302108B1

    公开(公告)日:2012-10-30

    申请号:US11960706

    申请日:2007-12-20

    CPC classification number: G06F9/445 G06F8/61 G06F9/44568 G06F9/45504

    Abstract: The disclosure is directed to feature based software virtualization. In one example, a first virtual sub-layer associated with a first feature set of a software package is virtually installed to a computing device. The first feature set includes a first subset of features associated with the software package. The first virtual sub-layer is enabled to activate the first feature set. A second virtual sub-layer associated with a second feature set of the software package is virtually installed to the computing device. The second feature set includes a second subset of the features associated with the software package. The second virtual sub-layer is enabled to activate the second feature set. In certain embodiments, a first fee is charged for the first feature set and a second fee is charged for the second feature set.

    Abstract translation: 本公开涉及基于特征的软件虚拟化。 在一个示例中,与软件包的第一特征集相关联的第一虚拟子层虚拟地安装到计算设备。 第一特征集包括与软件包相关联的特征的第一子集。 启用第一个虚拟子层激活第一个功能集。 与软件包的第二特征集相关联的第二虚拟子层虚拟地安装到计算设备。 第二特征集包括与软件包相关联的特征的第二子集。 启用第二虚拟子层激活第二个特征集。 在某些实施例中,针对第一特征集收取第一费用,并且为第二特征集收取第二费用。

Patent Agency Ranking