Method and apparatus for virtualizing window information
    6.
    发明授权
    Method and apparatus for virtualizing window information 有权
    用于虚拟化窗口信息的方法和装置

    公开(公告)号:US08117559B2

    公开(公告)日:2012-02-14

    申请号:US10711733

    申请日:2004-09-30

    IPC分类号: G06F3/048

    CPC分类号: G06F9/542 G06F9/451

    摘要: A method and apparatus for virtualizing access to windows includes a hooking mechanism, a window name virtualization engine, and an operating system interface. A request relating to a window from a process executing in the context of a user account is received, the request including a virtual window name. A determination is made for a literal name for the window, using a scope-specific identifier. A request is issued to the operating system including the determined literal window name. A window handle is associated with the determined virtual window name.

    摘要翻译: 用于虚拟化对Windows的访问的方法和装置包括挂钩机制,窗口名称虚拟化引擎和操作系统接口。 接收到与在用户帐户的上下文中执行的进程相关的请求的请求,该请求包括虚拟窗口名称。 使用范围特定的标识符确定窗口的文字名称。 向操作系统发出请求,包括确定的文字窗口名称。 窗口句柄与确定的虚拟窗口名称相关联。

    METHODS AND SYSTEMS FOR PROVIDING A MODIFIABLE MACHINE BASE IMAGE WITH A PERSONALIZED DESKTOP ENVIRONMENT IN A COMBINED COMPUTING ENVIRONMENT
    8.
    发明申请
    METHODS AND SYSTEMS FOR PROVIDING A MODIFIABLE MACHINE BASE IMAGE WITH A PERSONALIZED DESKTOP ENVIRONMENT IN A COMBINED COMPUTING ENVIRONMENT 审中-公开
    在组合计算环境中提供具有个性化桌面环境的可修改机器基础图像的方法和系统

    公开(公告)号:US20130179673A1

    公开(公告)日:2013-07-11

    申请号:US13784178

    申请日:2013-03-04

    IPC分类号: G06F9/44

    摘要: A method and system for modifying, in a combined computing environment, a machine base image having a personalized desktop environment includes executing an operating system associated with a base disk; intercepting, by a filter driver, an instruction from at least one of a plurality of resources to modify a setting stored in at least one of a file system and a registry, the plurality of resources executing inside an isolation environment; storing, in a delta disk, a copy of the modified setting; restarting the operating system; replacing the setting stored in the at least one of the file system and the registry with the copy of the modified setting stored on the delta disk; and restarting at least one operating system process incorporating the modified setting.

    摘要翻译: 一种用于在组合计算环境中修改具有个性化桌面环境的机器基础图像的方法和系统包括执行与基盘相关联的操作系统; 由过滤器驱动程序拦截来自多个资源中的至少一个的指令,以修改存储在文件系统和注册表中的至少一个中的设置,所述多个资源在隔离环境内执行; 在增量盘中存储修改设置的副本; 重新启动操作系统; 使用存储在增量盘上的修改设置的副本替换存储在文件系统和注册表中的至少一个的设置; 并重新启动包含修改设置的至少一个操作系统进程。

    SYSTEMS AND METHODS FOR ENHANCING SECURITY BY SELECTIVELY OPENING A LISTENING PORT WHEN AN INCOMING CONNECTION IS EXPECTED
    9.
    发明申请
    SYSTEMS AND METHODS FOR ENHANCING SECURITY BY SELECTIVELY OPENING A LISTENING PORT WHEN AN INCOMING CONNECTION IS EXPECTED 有权
    系统和方法,通过选择性地打开一个入口端口,当预期进入连接时提高安全性

    公开(公告)号:US20090106834A1

    公开(公告)日:2009-04-23

    申请号:US11875256

    申请日:2007-10-19

    IPC分类号: H04L9/32

    CPC分类号: H04L63/166 H04L63/08

    摘要: The present solution reduces the attack surface of a server by selectively opening a server port for listening when a client has been authenticated/authorized via another machine or process, and directed to connect to the server in question. When not selectively listening on a port, the server does not listen or open ports for connections or otherwise minimizes the number of open ports. By selectively listening for connections, the server reduces the opportunity for hackers to attack the server process, and improves the security of the server. The ability to selectively listen on a port at specific times may be combined with additional meta information—like ticketing and prior authentication information to help further secure the server. The meta information may identify and ensure that only the correct remote endpoint is allowed to connect via the port. Instead of first listening for connections and then authenticate and authorize the received connection as with typical servers, the present solution first authenticates/authorizes a connection via another machine or process, then listens for an expected and authorized connection.

    摘要翻译: 本解决方案通过选择性地打开服务器端口来减少服务器的攻击面,以便在客户端通过另一机器或进程进行身份验证/授权后进行侦听,并指示连接到有问题的服务器。 当没有选择性地监听端口时,服务器不会侦听或打开端口进行连接,否则会最小化打开端口的数量。 通过选择性地监听连接,服务器减少了黑客攻击服务器进程的机会,并提高了服务器的安全性。 在特定时间选择性地侦听端口的能力可以与额外的元信息类似的票据和先前的认证信息组合以帮助进一步保护服务器。 元信息可以标识并确保仅允许通过端口连接正确的远程端点。 而不是首先监听连接,然后与典型的服务器一样认证和授权接收到的连接,本解决方案首先通过另一个机器或进程来认证/授权连接,然后监听预期和授权的连接。

    Systems and methods for enhancing security by selectively opening a listening port when an incoming connection is expected
    10.
    发明授权
    Systems and methods for enhancing security by selectively opening a listening port when an incoming connection is expected 有权
    当预期进入连接时,通过选择性地打开监听端口来增强安全性的系统和方法

    公开(公告)号:US08266688B2

    公开(公告)日:2012-09-11

    申请号:US11875256

    申请日:2007-10-19

    IPC分类号: H04L29/06

    CPC分类号: H04L63/166 H04L63/08

    摘要: The present solution reduces the attack surface of a server by selectively opening a server port for listening when a client has been authenticated/authorized via another machine or process, and directed to connect to the server in question. When not selectively listening on a port, the server does not listen or open ports for connections or otherwise minimizes the number of open ports. By selectively listening for connections, the server reduces the opportunity for hackers to attack the server process, and improves the security of the server. The ability to selectively listen on a port at specific times may be combined with additional meta information—like ticketing and prior authentication information to help further secure the server. The meta information may identify and ensure that only the correct remote endpoint is allowed to connect via the port. Instead of first listening for connections and then authenticate and authorize the received connection as with typical servers, the present solution first authenticates/authorizes a connection via another machine or process, then listens for an expected and authorized connection.

    摘要翻译: 本解决方案通过选择性地打开服务器端口来减少服务器的攻击面,以便在客户端通过另一机器或进程进行身份验证/授权后进行侦听,并指示连接到有问题的服务器。 当没有选择性地监听端口时,服务器不会侦听或打开端口进行连接,否则会最小化打开端口的数量。 通过选择性地监听连接,服务器减少了黑客攻击服务器进程的机会,并提高了服务器的安全性。 在特定时间选择性地侦听端口的能力可以与额外的元信息类似的票据和先前的认证信息组合以帮助进一步保护服务器。 元信息可以标识并确保仅允许通过端口连接正确的远程端点。 而不是首先监听连接,然后与典型的服务器一样认证和授权接收到的连接,本解决方案首先通过另一个机器或进程来认证/授权连接,然后监听预期和授权的连接。