-
公开(公告)号:US10601896B2
公开(公告)日:2020-03-24
申请号:US15153596
申请日:2016-05-12
Applicant: Wyse Technology L.L.C.
Inventor: Puneet Kaushik , Rushikesh Patil
Abstract: Concurrent access to a user profile in a layering system is provided. When a user logs into a computing device, the server can locate a corresponding user profile to identify which layers should be provided to the user. Rather than sending these layers to the computing device for mounting, the server can mount the layers on the server. Therefore, if a user logs into multiple computing devices, the layering file system and registry filter drivers on those devices can route file system and registry requests to the server where the layers are mounted. Since the layers are mounted to a single device, concurrent access can be provided without the concern of data conflicts.
-
公开(公告)号:US10409775B2
公开(公告)日:2019-09-10
申请号:US15142041
申请日:2016-04-29
Applicant: Wyse Technology L.L.C.
Inventor: Rushikesh Patil , Puneet Kaushik
IPC: G06F16/16
Abstract: A directory that resides on a layered volume can be renamed. A hooking module can be employed to intercept rename requests. The hooking module can query a layering file system filter driver to determine the volume of the source and target of the rename request. If the source and target are on different volumes, thereby indicating that the source is a directory of a layered volume, the hooking module can append a signature to the target which identifies the actual volume of the source. The modified rename request can then be passed to the operating system which will perform its normal operations including verifying that the source and target are on the same volume. During this verification, the layering file system filter driver can detect the appended signature in the target and can inform the operating system that the target is on the volume identified in the signature.
-
公开(公告)号:US10235187B2
公开(公告)日:2019-03-19
申请号:US15142049
申请日:2016-04-29
Applicant: Wyse Technology L.L.C.
Inventor: Rushikesh Patil , Puneet Kaushik
Abstract: Application configurations can be merged to enhance multi-layer performance. When a layering system is employed, a layering registry filter driver can create a merged registry hive that includes the contents of each operating system registry hive as well as the contents of each registry hive of a mounted layer. The merged registry hive will therefore form a single location that the layering registry filter driver can access to complete a registry operation.
-
公开(公告)号:US20170315999A1
公开(公告)日:2017-11-02
申请号:US15142041
申请日:2016-04-29
Applicant: Wyse Technology L.L.C.
Inventor: Rushikesh Patil , Puneet Kaushik
IPC: G06F17/30
CPC classification number: G06F16/164
Abstract: A directory that resides on a layered volume can be renamed A hooking module can be employed to intercept rename requests. The hooking module can query a layering file system filter driver to determine the volume of the source and target of the rename request. If the source and target are on different volumes, thereby indicating that the source is a directory of a layered volume, the hooking module can append a signature to the target which identifies the actual volume of the source. The modified rename request can then be passed to the operating system which will perform its normal operations including verifying that the source and target are on the same volume. During this verification, the layering file system filter driver can detect the appended signature in the target and can inform the operating system that the target is on the volume identified in the signature.
-
公开(公告)号:US20170315827A1
公开(公告)日:2017-11-02
申请号:US15142049
申请日:2016-04-29
Applicant: Wyse Technology L.L.C.
Inventor: Rushikesh Patil , Puneet Kaushik
CPC classification number: G06F9/44505 , G06F9/542
Abstract: Application configurations can be merged to enhance multi-layer performance. When a layering system is employed, a layering registry filter driver can create a merged registry hive that includes the contents of each operating system registry hive as well as the contents of each registry hive of a mounted layer. The merged registry hive will therefore form a single location that the layering registry filter driver can access to complete a registry operation.
-
公开(公告)号:US20170331878A1
公开(公告)日:2017-11-16
申请号:US15153596
申请日:2016-05-12
Applicant: Wyse Technology L.L.C.
Inventor: Puneet Kaushik , Rushikesh Patil
CPC classification number: H04L67/06 , G06F16/10 , H04L67/2842 , H04L67/306
Abstract: Concurrent access to a user profile in a layering system is provided. When a user logs into a computing device, the server can locate a corresponding user profile to identify which layers should be provided to the user. Rather than sending these layers to the computing device for mounting, the server can mount the layers on the server. Therefore, if a user logs into multiple computing devices, the layering file system and registry filter drivers on those devices can route file system and registry requests to the server where the layers are mounted. Since the layers are mounted to a single device, concurrent access can be provided without the concern of data conflicts.
-
公开(公告)号:US20170316210A1
公开(公告)日:2017-11-02
申请号:US15142035
申请日:2016-04-29
Applicant: Wyse Technology L.L.C.
Inventor: Rushikesh Patil , Puneet Kaushik
CPC classification number: G06F21/577 , G06F21/55 , G06F21/56
Abstract: A security solution can be implemented using a layering system. By using a layering system, any changes that are made to a computing system can be isolated within a separate write layer. Due to this isolation, the changes, which may even be malicious, can be evaluated without fear that the resources in other layers will be negatively affected. In this way, even security threats that are still unknown to antivirus solutions (so-called zero-day attacks) can be prevented from harming the system.
-
公开(公告)号:US10216939B2
公开(公告)日:2019-02-26
申请号:US15142035
申请日:2016-04-29
Applicant: Wyse Technology L.L.C.
Inventor: Rushikesh Patil , Puneet Kaushik
Abstract: A security solution can be implemented using a layering system. By using a layering system, any changes that are made to a computing system can be isolated within a separate write layer. Due to this isolation, the changes, which may even be malicious, can be evaluated without fear that the resources in other layers will be negatively affected. In this way, even security threats that are still unknown to antivirus solutions (so-called zero-day attacks) can be prevented from harming the system.
-
-
-
-
-
-
-