US20120166529A1 - Modifying service provider context information to facilitate locating interceptor context information - Google Patents
Modifying service provider context information to facilitate locating interceptor context information Download PDFInfo
- Publication number
- US20120166529A1 US20120166529A1 US13/414,475 US201213414475A US2012166529A1 US 20120166529 A1 US20120166529 A1 US 20120166529A1 US 201213414475 A US201213414475 A US 201213414475A US 2012166529 A1 US2012166529 A1 US 2012166529A1
- Authority
- US
- United States
- Prior art keywords
- service provider
- context information
- interceptor
- request
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/14—Details of searching files based on file metadata
- G06F16/148—File search processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/54—Indexing scheme relating to G06F9/54
- G06F2209/542—Intercept
Definitions
- Computer systems typically have services (e.g., file services) that are provided to clients (e.g., an application program).
- the services may implement a high-level service using low-level operations.
- a file system may provide high-level commands to open and read files, which are implemented using low-level operations, such as sector seek and sector read.
- an application program can request the file system to open the file and then read the file.
- the file system performs the necessary low-level operations to perform the high-level commands (e.g., open and read).
- the programs that request services of a service provider are referred to as clients.
- a client sends a request to a service provider of that service.
- the service provider performs the request and returns a result such as data or status information.
- the requests for services can be satisfied synchronously or asynchronously by the service provider.
- the client requesting the service waits until the service completes before continuing.
- a client may request a service by invoking a read file function of a file system that returns after the file system has retrieved the data of the file.
- the client requesting the service does not wait until the service completes before continuing.
- the service provider then notifies the client.
- a client may request a service by invoking a read file function of the file system. That function may return immediately to the client so that the client can continue executing while the file system is reading the file.
- the service provider notifies the client, for example, by calling a callback function provided by the client or sending an event notification to the client.
- TDI Transport Device Interface
- TCP driver a transport provider that implements a transport layer
- transport client a transport client that uses the services of the transport provider.
- TCP driver a transport provider that implements a transport layer
- transport client a transport client that uses the services of the transport provider.
- TCP driver a transport provider that implements a transport layer
- transport client a transport client that uses the services of the transport provider.
- TCP driver a transport provider
- redirector invokes functions provided by the TCP driver to send and receive messages via TCP.
- the redirector can access files stored on other computing devices using the services of the TCP driver.
- a service provider may need to maintain state information for the client between requests received from the client. For example, when a file system opens a file on behalf of a client, the file system may need to maintain a file control block so that when the client requests to read from that file, it can locate the file control block needed to satisfy the request. Such information may be referred to as “context information.”
- One technique for tracking context information is to return a handle to the client.
- the handle may be an operating system object that contains or references context information for a service provider session.
- a service provider session may be delimited by an open and a close request, such as an open file and a close file request.
- the service provider provides the handle to the client at the beginning of the session, and the client provides the handle to the service provider with each request. This allows the service provider to locate context information that is appropriate for the session.
- the TDI model specifies that a WINDOWS file object is used as the handle for a TDI session.
- FIG. 1 is a diagram that illustrates the layered architecture of client, interceptors, and service provider.
- client 101 wants to request services of the service provider 102
- the client invokes a function, which may pass control to one or more interceptors 111 - 119 .
- each interceptor is invoked, it performs its processing and then forwards the invocation to the next lower level interceptor.
- the lowest level interceptor invokes a function of the service provider.
- FIG. 2 is a diagram that illustrates one example of how interceptors track their context information.
- client 210 requests a service of service provider 220 , it is forwarded through interceptors 250 and 260 to the service provider.
- the service provider creates context information that is represented as a context object 221 (e.g., a file object).
- the service provider returns a reference to the context object to the lowest level interceptor, which forwards the references to the next higher level interceptor until the reference to the context object is eventually forwarded to the client.
- Each interceptor has its own context information 251 and 261 .
- an interceptor may create a hash table 255 and 265 that contains references to its context information.
- the hash table is hashed based on the reference to the corresponding context object provided by the service.
- the client makes another request of the service provider in the same service provider session, it includes the reference to the context object in its request.
- the interceptor receives the request, the interceptor hashes the reference to locate its context information associated with that session.
- a difficulty with the use of a hash table by each interceptor is that there can be a high overhead in having to locate the appropriate context information for an interceptor.
- FIG. 3 is a diagram that illustrates another example of how interceptors track their context information.
- service provider 320 creates context object 321 for a session of client 310 .
- Each interceptor 350 and 360 also creates a context object 351 and 361 .
- the lowest level interceptor receives the response from the service provider, it replaces the reference to the context object of the service provider with a reference to its context object before forwarding the response to the next higher level interceptor.
- the highest level interceptor forwards the response with a reference to its context object.
- Each interceptor includes as part of its context information the reference to the context object of the next lower layer.
- the client When the client requests a service of the service provider, it includes the reference provided by the highest-level interceptor, which is a reference to the context object for that interceptor. That interceptor uses the context information of the context object and then forwards the request to the next lower level interceptor using the reference provided by that next lower level interceptor. Eventually, the service provider receives a request that includes a reference to its context object.
- a difficulty with such an approach for tracking context information is that there can be a high overhead in creating context objects, especially if the creation of a context object requires a context switch from application mode to operating system mode.
- a method and system for tracking context information of a service provider and interceptors of service provider requests is provided.
- the context tracking system is implemented by an interceptor.
- the interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client.
- the interceptor then provides the modified context information to the client that requested the service.
- the client requests a service of the service provider
- the client provides the modified service provider context information along with the request.
- the interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information.
- the interceptor restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information.
- the interceptor then forwards the request along with the original service provider context information to the service provider.
- FIG. 1 is a diagram that illustrates the layered architecture of client, interceptors, and service provider.
- FIG. 2 is a diagram that illustrates one example of how interceptors track their context information.
- FIG. 3 is a diagram that illustrates another example of how interceptors track their context information.
- FIG. 4 is a diagram that illustrates modification of service provider context information when a session is initiated.
- FIG. 5 is a diagram that illustrates restoration and modification of service provider context information when a service is requested during a session.
- FIG. 6 is a diagram that illustrates no modification of service provider context information when a request is issued while another request is outstanding.
- FIG. 7 is a block diagram that illustrates components of the context tracking system in one embodiment.
- FIG. 8 is a flow diagram that illustrates processing of the context object created component in one embodiment.
- FIG. 9 is a flow diagram that illustrates the processing of the intercept request component in one embodiment.
- FIG. 10 is a flow diagram that illustrates the processing of the callback function in one embodiment.
- a method and system for tracking context information of a service provider and interceptors of service provider requests is provided.
- the context tracking system is implemented by an interceptor.
- the interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. For example, when an interceptor receives a service provider context object (e.g., a file object), the interceptor replaces certain information of the context object with a reference to context information of the interceptor.
- the interceptor then provides the modified context information to the client that requested the service.
- the client requests a service of the service provider
- the client provides the modified service provider context information along with the request.
- the interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information.
- the interceptor restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information.
- the interceptor then forwards the request along with the original service provider context information to the service provider. In this way, the interceptor can track its context information for the client without the overhead of having to look up the context information and of having to create additional context objects.
- the context tracking system is implemented by multiple interceptors that are layered between a client and a service provider.
- a client initiates a session with a service provider by sending a request to the service provider, which is first intercepted by the interceptor at the highest level. That interceptor forwards the request to the next lower level interceptor.
- the lowest level interceptor receives the request, performs the requested service, and sends a response to the client that includes service provider context information, which is first intercepted by the lowest level interceptor.
- the lowest level interceptor Upon receiving the response, the lowest level interceptor replaces a portion of the service provider context information with a reference to its context information, saves the portion before modification for later restoration, and forwards the response along with the modified service provider context information to the interceptor at the next higher layer.
- the interceptor at the next higher layer receives the response with the modified service provider context information, it also replaces a portion of a service provider context with a reference to its context information, saves the portion before modification (which in this case is a reference to context information of the interceptor at the next lower layer) for later restoration, and forwards the response along with the newly modified service provider context information to the interceptor at the next higher layer.
- the client receives the response with the modified service provider context information which contains a reference to the context information of the interceptor at the highest level.
- the client When the client next requests a service from the service provider as part of the same session, the client sends a request to the service provider that includes the modified service provider information, which is first intercepted by the interceptor at the highest level. That interceptor uses the reference of the modified portion of the modified service provider information to retrieve its context information. That interceptor then replaces the portion of the service provider information that it previously modified with the unmodified portion that it retained and forwards the request along with the restored service provider context information, which is then intercepted by the interceptor at the next lower level. That next lower level interceptor uses the reference of the restored portion of the service provider context information to locate its context information.
- That interceptor restores the portion of the service provider context information that it previously modified with the retained portion and then forwards the request along with the restored service provider context information to the interceptor at the next lower level.
- the service provider receives from the interceptor of the lowest level that request along with the service provider context information restored to the original service provider context information.
- the service provider then services the request using the service provider context information without having to know that the request had been intercepted and the service provider context information had been modified by various interceptors.
- a client during a single session may request a service of a service provider before a previous request has been completed; that is, the previous request is still outstanding. For example, if the requests are serviced synchronously, then one thread of the client may send a request by invoking a function, and before that invoked function returns, another thread of the client may send a request by again invoking that function. If the requests are serviced asynchronously, then a thread of the client may send a request, and before the response is received asynchronously (e.g., by invocation of a callback function), the client (on the same or a different thread) may send another request.
- the service provider context information is considered currently in use by the previous request and the modified portion may be in an unknown state.
- the modified portion may contain the original unmodified content, content newly modified by the service provider as part of servicing the outstanding request, content modified by the interceptors as the response from the service provider is intercepted, and so on.
- an interceptor cannot modify the service provider context information without risk of overwriting content needed by the service provider or an interceptor in processing the outstanding request.
- an interceptor reverts to a conventional technique of looking up its context information based on the reference to service provider context information.
- an interceptor receives a request, it determines whether a modified portion of the service provider context information contains a reference to its context information. If not, the interceptor knows that the service provider or another interceptor is processing another outstanding request.
- the interceptor may store a unique identifier of itself when it modifies service provider context information. If that unique identifier has been changed, then the interceptor knows that the service provider or another interceptor is processing an outstanding request.
- an interceptor may use a reference counting technique to determine whether there is an outstanding request.
- the interceptor uses the reference (e.g., pointer to or address of) to the service provider context information to locate the interceptor's context information. For example, the interceptor may use a conventional hash table data structure to locate its context information. The interceptor then performs the processing of the request and forwards the request to the interceptor at the next lower level without modifying the service provider context information. The interceptor at the next lower level again detects that a unique identifier has been changed and looks up its context information using a conventional technique. Eventually, the interceptor at the lowest level forwards the request to the service provider without modifying the service provider context information. The service provider can then process the request with the server provider context information that it expects. In this way, the interceptors can service requests issued without having to look up their context information so long as there is no outstanding request. If requests are seldom issued with outstanding requests, then the context tracking system may provide significant performance improvements over conventional techniques.
- the reference e.g., pointer to or address of
- FIG. 4-6 are diagrams that illustrate an example of the modification and restoration of server provider context information in one embodiment.
- only one interceptor is between the client and the service provider.
- FIG. 4 is a diagram that illustrates modification of service provider context information when a session is initiated.
- a client issues 401 an open request that identifies a callback function (e.g., app::callback).
- the interceptor receives the request and forwards 402 the open request with its own callback function (e.g., int::callback) to the service provider.
- the service provider performs its services and when complete responds 403 to that request by invoking the callback function provided by the interceptor.
- the service provider passes a reference to a context object (i.e., “co”) that includes its context information.
- the interceptor creates 404 an interceptor context object (i.e., “ico”), which may be created locally by the interceptor to avoid the overhead of a context switch.
- An interceptor context object may contain a reference to the interceptor context information field, a count field, a context object pointer field, and a retained service provider context information field.
- the interceptor context information field contains either a reference to or the interceptor context information itself.
- the count field contains a count of the number of outstanding requests. Rather than using its unique identifier to identify whether a request is outstanding, an interceptor may use the count field.
- the interceptor increments the count field for each request it processes and decrements the count field for each response it processes.
- a count of zero means that no request is outstanding.
- the context object pointer field contains a pointer to the context object returned by the service provider, which may be used to resolve hash collisions when a request is outstanding.
- the retained service provider context information field contains a copy of the portion of the service provider context information to be modified so that it can be restored when a request is processed.
- the interceptor modifies 405 a portion of the context object to reference the interceptor context object.
- the interceptor then invokes the callback function provided by the client to respond to the service request. When the client receives 406 the response, it stores a reference to the context object for use in requesting services during the same session.
- FIG. 5 is a diagram that illustrates restoration and modification of service provider context information when a service is requested during a session.
- the client sends 501 a read request that includes the reference to the context object and identifies a callback function.
- the interceptor retrieves 502 a reference to the interceptor context object from the received context object.
- the interceptor restores 503 the context object using the content retained in the interceptor context object and increments the count of outstanding requests.
- the interceptor then forwards the request with the context object and a callback function to the service provider.
- the service provider performs 504 its processing and then responds by invoking the callback function of the interceptor and providing a reference to the context object.
- the interceptor Upon receiving the response, the interceptor retrieves 506 the interceptor context object associated with the callback function.
- the interceptor may use different entry points of a callback function to identify the appropriate interceptor context object that is associated with that response. Alternatively, the interceptor may perform conventional lookup techniques for locating interceptor context information.
- the interceptor modifies 507 the context object to point to the interceptor context object, decrements the count of outstanding requests, and forwards the response by invoking the callback function of the client.
- the client Upon receiving the response, the client stores 508 a reference to the context object.
- FIG. 6 is a diagram that illustrates no modification of service provider context information when a request is issued while another request is outstanding.
- the client sends 601 a request that identifies the context object.
- the context object contains a reference to service provider context information, rather than interceptor context information.
- the interceptor restored the context object by overwriting the reference to the interceptor context object with the retained content.
- the interceptor detects 602 that a request is outstanding either by checking for its unique identifier in the modified portion of the context object or by determining that the count field of the interceptor context object is greater than zero.
- the interceptor locates the interceptor context object using the reference to the context object and the hash table.
- the interceptor Upon locating the interceptor context object, the interceptor increments 603 the count field to indicate that two requests are outstanding and forwards the request to the service provider without modifying the context object.
- the service provider performs 604 its processing and then responds by invoking the callback function provided by the interceptor.
- the interceptor identifies 605 the appropriate interceptor context object and decrements 606 the field count.
- the interceptor then invokes the callback function of the client without modifying the context object.
- the client maintains 607 a reference to the context object for issuing the next request.
- the context object contains the unmodified service provider context information.
- FIG. 7 is a block diagram that illustrates components of the context tracking system in one embodiment.
- the context tracking system is implemented by interceptors of client requests and service provider responses.
- An interceptor 700 that implements the context tracking system includes a context object created component 701 , an intercept request component 702 , a callback component 703 , an interceptor processing component 704 , and a context data structure 705 .
- the context object created component is invoked by the interceptor when a context object is provided by the service provider when a session is created.
- the intercept request component is invoked by the interceptor when a request for service is intercepted.
- the intercept request component restores the service provider context information as appropriate.
- the callback component which intercepts responses, is invoked when a response is provided by a service provider.
- the callback component modifies and retains the service provider context information as appropriate.
- the interceptor processing component performs the main processing function of the interceptor.
- the context data structure which may be a hash table, a binary tree, or other data structure, is used to locate interceptor context information when multiple requests are outstanding.
- the interceptor may also use the context data structure defined in context information when a response is received to locate the interceptor context information.
- the computing devices on which the context tracking system may be implemented may include a central processing unit, memory, input devices (e.g., keyboard and pointing devices), output devices (e.g., display devices), and storage devices (e.g., disk drives).
- the memory and storage devices are computer-readable media that may contain instructions that implement the context tracking system.
- the data structures and message structures may be stored or transmitted via a data transmission medium, such as a signal on a communications link.
- Various communications links may be used, such as the Internet, a local area network, a wide area network, or a point-to-point dial-up connection.
- the context tracking system may be implemented in various operating environments that include personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
- the context tracking system may also be implemented on computing devices such as cell phones, personal digital assistants, consumer electronics, home automation devices, and so on.
- the context tracking system may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices.
- program modules include routines, programs, objects, components, data structures, and so on that perform particular tasks or implement particular abstract data types.
- functionality of the program modules may be combined or distributed as desired in various embodiments.
- FIG. 8 is a flow diagram that illustrates processing of the context object created component in one embodiment.
- the component is invoked when the interceptor receives a newly created context object.
- the component creates an interceptor context object that contains a reference to the interceptor's context information.
- the component initializes the count field of the interceptor context object to zero to indicate that no requests are outstanding.
- the component sets the context object pointer field of the interceptor context object to point to the context object.
- the component retains the service provider context information that is being modified by storing it in the service provider context field of the interceptor context object.
- the component stores the interceptor context object using a hash table and hashing on the reference to the context object.
- the component modifies the context object to point to the interceptor context object and then completes.
- FIG. 9 is a flow diagram that illustrates the processing of the intercept request component in one embodiment.
- the component is invoked by an interceptor to restore the context object.
- decision block 901 if another request is outstanding, then the component continues at block 904 , else the component continues at block 902 .
- the component retrieves the reference to the interceptor context object from the modified portion of the context object.
- block 903 the component restores the service provider context object using the retained content and continues at block 906 .
- the component searches the hash table for the interceptor context object.
- decision block 905 if the interceptor context object was found in the hash table, then the component continues at block 906 , else the component continues at block 911 .
- the component increments the count field of the interceptor count object to indicate that one more request is outstanding.
- the component sets the interceptor context to the interceptor context of the interceptor context object so that the interceptor can perform its processing in the appropriate context.
- the component processes the request with the interceptor context.
- the component sets the callback routine to identify the interceptor context object.
- the component forwards to the service provider or the interceptor at the next lower level the request that includes the restored service provider context object and the callback function and then completes.
- the component performs the processing of the request when context information is not available.
- FIG. 10 is a flow diagram that illustrates the processing of the callback function in one embodiment.
- the component retrieves the interceptor context object for the interceptor.
- the component decrements the count filed of the interceptor context object to indicate that one less request is outstanding.
- decision block 1003 if no more requests are outstanding, then the component continues at block 1004 , else the component continues at block 1005 .
- the component modifies a portion of the context object to point to the interceptor context object. The component may also retain a new copy of the unmodified content in the interceptor context object if the service provider or interceptors are allowed to modify that content after creation of the context object.
- the component then forwards the response by invoking the callback function of the application and then completes.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Library & Information Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. An interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. When the client requests a service of the service provider, the client provides the modified service provider context information along with the request. The interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information. The interceptor then restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information. The interceptor then forwards the request along with the original service provider context information to the service provider.
Description
- This application is a continuation application of U.S. patent application Ser. No. 11/231,352, filed on Nov. 30, 2004, issued as U.S. Pat. No. 8,135,741, entitled “MODIFYING SERVICE PROVIDER CONTEXT INFORMATION TO FACILITATE LOCATING INTERCEPTOR CONTEXT INFORMATION,” which is incorporated herein in its entirety by reference.
- Computer systems typically have services (e.g., file services) that are provided to clients (e.g., an application program). The services may implement a high-level service using low-level operations. For example, a file system may provide high-level commands to open and read files, which are implemented using low-level operations, such as sector seek and sector read. To access a file, an application program can request the file system to open the file and then read the file. The file system performs the necessary low-level operations to perform the high-level commands (e.g., open and read). Thus, the developer of an application program does not need to understand or use the low-level operations, but rather can rely on the file system for performing the appropriate low-level operations. The programs that request services of a service provider are referred to as clients. To have a service performed on its behalf, a client sends a request to a service provider of that service. The service provider performs the request and returns a result such as data or status information.
- The requests for services can be satisfied synchronously or asynchronously by the service provider. When a request is satisfied synchronously, the client requesting the service waits until the service completes before continuing. For example, a client may request a service by invoking a read file function of a file system that returns after the file system has retrieved the data of the file. When a request is satisfied asynchronously, the client requesting the service does not wait until the service completes before continuing. However, when the service does complete, the service provider then notifies the client. For example, a client may request a service by invoking a read file function of the file system. That function may return immediately to the client so that the client can continue executing while the file system is reading the file. When the read completes, the service provider notifies the client, for example, by calling a callback function provided by the client or sending an event notification to the client.
- One example of a client/service provider model is the Transport Device Interface (“TDI”) of Microsoft Corporation. TDI defines the interactions between a “transport provider” that implements a transport layer and a “transport client” that uses the services of the transport provider. One example of a transport provider is a TCP driver, and one example of a transport client is a redirector of a file system. The redirector invokes functions provided by the TCP driver to send and receive messages via TCP. Thus, the redirector can access files stored on other computing devices using the services of the TCP driver.
- A service provider may need to maintain state information for the client between requests received from the client. For example, when a file system opens a file on behalf of a client, the file system may need to maintain a file control block so that when the client requests to read from that file, it can locate the file control block needed to satisfy the request. Such information may be referred to as “context information.” One technique for tracking context information is to return a handle to the client. The handle may be an operating system object that contains or references context information for a service provider session. A service provider session may be delimited by an open and a close request, such as an open file and a close file request. The service provider provides the handle to the client at the beginning of the session, and the client provides the handle to the service provider with each request. This allows the service provider to locate context information that is appropriate for the session. For example, the TDI model specifies that a WINDOWS file object is used as the handle for a TDI session.
- It is often desirable to be able to extend the functions provided by a service provider. To support such extension, many systems allow for requests for services made by clients to a service provider to be intercepted or hooked. When a client makes a request to a service provider, an interceptor may receive the request and perform additional processing before forwarding the request to the service provider. The interceptor may also intercept the response to the request and perform additional processing before forwarding the response to the client.
FIG. 1 is a diagram that illustrates the layered architecture of client, interceptors, and service provider. Whenclient 101 wants to request services of theservice provider 102, the client invokes a function, which may pass control to one or more interceptors 111-119. When each interceptor is invoked, it performs its processing and then forwards the invocation to the next lower level interceptor. Ultimately, the lowest level interceptor invokes a function of the service provider. - Each interceptor, however, may need to maintain its context information. For example, an interceptor that simply logs to a file all invocations to a service provider during a session may have context information that includes the handle returned by the file system when the log file was opened or created.
FIG. 2 is a diagram that illustrates one example of how interceptors track their context information. Whenclient 210 requests a service ofservice provider 220, it is forwarded throughinterceptors own context information 251 and 261. To track its context information, an interceptor may create a hash table 255 and 265 that contains references to its context information. The hash table is hashed based on the reference to the corresponding context object provided by the service. When the client makes another request of the service provider in the same service provider session, it includes the reference to the context object in its request. When an interceptor receives the request, the interceptor hashes the reference to locate its context information associated with that session. A difficulty with the use of a hash table by each interceptor is that there can be a high overhead in having to locate the appropriate context information for an interceptor. -
FIG. 3 is a diagram that illustrates another example of how interceptors track their context information. In this example,service provider 320 createscontext object 321 for a session ofclient 310. Eachinterceptor context object - A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. The context tracking system is implemented by an interceptor. The interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. The interceptor then provides the modified context information to the client that requested the service. When the client requests a service of the service provider, the client provides the modified service provider context information along with the request. Upon receiving the request from the client, the interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information. The interceptor then restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information. The interceptor then forwards the request along with the original service provider context information to the service provider.
- This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
-
FIG. 1 is a diagram that illustrates the layered architecture of client, interceptors, and service provider. -
FIG. 2 is a diagram that illustrates one example of how interceptors track their context information. -
FIG. 3 is a diagram that illustrates another example of how interceptors track their context information. -
FIG. 4 is a diagram that illustrates modification of service provider context information when a session is initiated. -
FIG. 5 is a diagram that illustrates restoration and modification of service provider context information when a service is requested during a session. -
FIG. 6 is a diagram that illustrates no modification of service provider context information when a request is issued while another request is outstanding. -
FIG. 7 is a block diagram that illustrates components of the context tracking system in one embodiment. -
FIG. 8 is a flow diagram that illustrates processing of the context object created component in one embodiment. -
FIG. 9 is a flow diagram that illustrates the processing of the intercept request component in one embodiment. -
FIG. 10 is a flow diagram that illustrates the processing of the callback function in one embodiment. - A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. In one embodiment, the context tracking system is implemented by an interceptor. The interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. For example, when an interceptor receives a service provider context object (e.g., a file object), the interceptor replaces certain information of the context object with a reference to context information of the interceptor. The interceptor then provides the modified context information to the client that requested the service. When the client requests a service of the service provider, the client provides the modified service provider context information along with the request. Upon receiving the request from the client, the interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information. The interceptor then restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information. The interceptor then forwards the request along with the original service provider context information to the service provider. In this way, the interceptor can track its context information for the client without the overhead of having to look up the context information and of having to create additional context objects.
- In one embodiment, the context tracking system is implemented by multiple interceptors that are layered between a client and a service provider. A client initiates a session with a service provider by sending a request to the service provider, which is first intercepted by the interceptor at the highest level. That interceptor forwards the request to the next lower level interceptor. Eventually, the lowest level interceptor receives the request, performs the requested service, and sends a response to the client that includes service provider context information, which is first intercepted by the lowest level interceptor. Upon receiving the response, the lowest level interceptor replaces a portion of the service provider context information with a reference to its context information, saves the portion before modification for later restoration, and forwards the response along with the modified service provider context information to the interceptor at the next higher layer. When the interceptor at the next higher layer receives the response with the modified service provider context information, it also replaces a portion of a service provider context with a reference to its context information, saves the portion before modification (which in this case is a reference to context information of the interceptor at the next lower layer) for later restoration, and forwards the response along with the newly modified service provider context information to the interceptor at the next higher layer. Eventually, the client receives the response with the modified service provider context information which contains a reference to the context information of the interceptor at the highest level.
- When the client next requests a service from the service provider as part of the same session, the client sends a request to the service provider that includes the modified service provider information, which is first intercepted by the interceptor at the highest level. That interceptor uses the reference of the modified portion of the modified service provider information to retrieve its context information. That interceptor then replaces the portion of the service provider information that it previously modified with the unmodified portion that it retained and forwards the request along with the restored service provider context information, which is then intercepted by the interceptor at the next lower level. That next lower level interceptor uses the reference of the restored portion of the service provider context information to locate its context information. That interceptor then restores the portion of the service provider context information that it previously modified with the retained portion and then forwards the request along with the restored service provider context information to the interceptor at the next lower level. Eventually, the service provider receives from the interceptor of the lowest level that request along with the service provider context information restored to the original service provider context information. The service provider then services the request using the service provider context information without having to know that the request had been intercepted and the service provider context information had been modified by various interceptors.
- In one embodiment, a client during a single session may request a service of a service provider before a previous request has been completed; that is, the previous request is still outstanding. For example, if the requests are serviced synchronously, then one thread of the client may send a request by invoking a function, and before that invoked function returns, another thread of the client may send a request by again invoking that function. If the requests are serviced asynchronously, then a thread of the client may send a request, and before the response is received asynchronously (e.g., by invocation of a callback function), the client (on the same or a different thread) may send another request. Whenever a client sends a request during a session while another request of that session is outstanding, the service provider context information is considered currently in use by the previous request and the modified portion may be in an unknown state. For example, the modified portion may contain the original unmodified content, content newly modified by the service provider as part of servicing the outstanding request, content modified by the interceptors as the response from the service provider is intercepted, and so on. Thus, an interceptor cannot modify the service provider context information without risk of overwriting content needed by the service provider or an interceptor in processing the outstanding request.
- To prevent an interceptor from overwriting content needed by the service provider or another interceptor processing an outstanding request, an interceptor reverts to a conventional technique of looking up its context information based on the reference to service provider context information. When an interceptor receives a request, it determines whether a modified portion of the service provider context information contains a reference to its context information. If not, the interceptor knows that the service provider or another interceptor is processing another outstanding request. The interceptor may store a unique identifier of itself when it modifies service provider context information. If that unique identifier has been changed, then the interceptor knows that the service provider or another interceptor is processing an outstanding request. In an alternative embodiment, an interceptor may use a reference counting technique to determine whether there is an outstanding request. If a request is outstanding, then the interceptor uses the reference (e.g., pointer to or address of) to the service provider context information to locate the interceptor's context information. For example, the interceptor may use a conventional hash table data structure to locate its context information. The interceptor then performs the processing of the request and forwards the request to the interceptor at the next lower level without modifying the service provider context information. The interceptor at the next lower level again detects that a unique identifier has been changed and looks up its context information using a conventional technique. Eventually, the interceptor at the lowest level forwards the request to the service provider without modifying the service provider context information. The service provider can then process the request with the server provider context information that it expects. In this way, the interceptors can service requests issued without having to look up their context information so long as there is no outstanding request. If requests are seldom issued with outstanding requests, then the context tracking system may provide significant performance improvements over conventional techniques.
-
FIG. 4-6 are diagrams that illustrate an example of the modification and restoration of server provider context information in one embodiment. In this example, only one interceptor is between the client and the service provider.FIG. 4 is a diagram that illustrates modification of service provider context information when a session is initiated. Initially, a client issues 401 an open request that identifies a callback function (e.g., app::callback). The interceptor receives the request and forwards 402 the open request with its own callback function (e.g., int::callback) to the service provider. The service provider performs its services and when complete responds 403 to that request by invoking the callback function provided by the interceptor. The service provider passes a reference to a context object (i.e., “co”) that includes its context information. Upon receiving that response, the interceptor creates 404 an interceptor context object (i.e., “ico”), which may be created locally by the interceptor to avoid the overhead of a context switch. An interceptor context object may contain a reference to the interceptor context information field, a count field, a context object pointer field, and a retained service provider context information field. The interceptor context information field contains either a reference to or the interceptor context information itself. The count field contains a count of the number of outstanding requests. Rather than using its unique identifier to identify whether a request is outstanding, an interceptor may use the count field. The interceptor increments the count field for each request it processes and decrements the count field for each response it processes. A count of zero means that no request is outstanding. The context object pointer field contains a pointer to the context object returned by the service provider, which may be used to resolve hash collisions when a request is outstanding. The retained service provider context information field contains a copy of the portion of the service provider context information to be modified so that it can be restored when a request is processed. The interceptor then modifies 405 a portion of the context object to reference the interceptor context object. The interceptor then invokes the callback function provided by the client to respond to the service request. When the client receives 406 the response, it stores a reference to the context object for use in requesting services during the same session. -
FIG. 5 is a diagram that illustrates restoration and modification of service provider context information when a service is requested during a session. The client sends 501 a read request that includes the reference to the context object and identifies a callback function. Upon receiving the request, the interceptor retrieves 502 a reference to the interceptor context object from the received context object. The interceptor then restores 503 the context object using the content retained in the interceptor context object and increments the count of outstanding requests. The interceptor then forwards the request with the context object and a callback function to the service provider. The service provider performs 504 its processing and then responds by invoking the callback function of the interceptor and providing a reference to the context object. Upon receiving the response, the interceptor retrieves 506 the interceptor context object associated with the callback function. The interceptor may use different entry points of a callback function to identify the appropriate interceptor context object that is associated with that response. Alternatively, the interceptor may perform conventional lookup techniques for locating interceptor context information. The interceptor then modifies 507 the context object to point to the interceptor context object, decrements the count of outstanding requests, and forwards the response by invoking the callback function of the client. Upon receiving the response, the client stores 508 a reference to the context object. -
FIG. 6 is a diagram that illustrates no modification of service provider context information when a request is issued while another request is outstanding. The client sends 601 a request that identifies the context object. In this example, the context object contains a reference to service provider context information, rather than interceptor context information. When processing the outstanding request, the interceptor restored the context object by overwriting the reference to the interceptor context object with the retained content. Upon receiving the next request, the interceptor detects 602 that a request is outstanding either by checking for its unique identifier in the modified portion of the context object or by determining that the count field of the interceptor context object is greater than zero. The interceptor then locates the interceptor context object using the reference to the context object and the hash table. Upon locating the interceptor context object, theinterceptor increments 603 the count field to indicate that two requests are outstanding and forwards the request to the service provider without modifying the context object. The service provider performs 604 its processing and then responds by invoking the callback function provided by the interceptor. Upon receiving the response, the interceptor identifies 605 the appropriate interceptor context object and decrements 606 the field count. The interceptor then invokes the callback function of the client without modifying the context object. The client maintains 607 a reference to the context object for issuing the next request. The context object contains the unmodified service provider context information. -
FIG. 7 is a block diagram that illustrates components of the context tracking system in one embodiment. The context tracking system is implemented by interceptors of client requests and service provider responses. Aninterceptor 700 that implements the context tracking system includes a context object createdcomponent 701, anintercept request component 702, acallback component 703, aninterceptor processing component 704, and acontext data structure 705. The context object created component is invoked by the interceptor when a context object is provided by the service provider when a session is created. The intercept request component is invoked by the interceptor when a request for service is intercepted. The intercept request component restores the service provider context information as appropriate. The callback component, which intercepts responses, is invoked when a response is provided by a service provider. The callback component modifies and retains the service provider context information as appropriate. The interceptor processing component performs the main processing function of the interceptor. The context data structure, which may be a hash table, a binary tree, or other data structure, is used to locate interceptor context information when multiple requests are outstanding. The interceptor may also use the context data structure defined in context information when a response is received to locate the interceptor context information. - The computing devices on which the context tracking system may be implemented may include a central processing unit, memory, input devices (e.g., keyboard and pointing devices), output devices (e.g., display devices), and storage devices (e.g., disk drives). The memory and storage devices are computer-readable media that may contain instructions that implement the context tracking system. In addition, the data structures and message structures may be stored or transmitted via a data transmission medium, such as a signal on a communications link. Various communications links may be used, such as the Internet, a local area network, a wide area network, or a point-to-point dial-up connection.
- The context tracking system may be implemented in various operating environments that include personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The context tracking system may also be implemented on computing devices such as cell phones, personal digital assistants, consumer electronics, home automation devices, and so on.
- The context tracking system may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, and so on that perform particular tasks or implement particular abstract data types. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments.
-
FIG. 8 is a flow diagram that illustrates processing of the context object created component in one embodiment. The component is invoked when the interceptor receives a newly created context object. Inblock 801, the component creates an interceptor context object that contains a reference to the interceptor's context information. Inblock 802, the component initializes the count field of the interceptor context object to zero to indicate that no requests are outstanding. Inblock 803, the component sets the context object pointer field of the interceptor context object to point to the context object. Inblock 804, the component retains the service provider context information that is being modified by storing it in the service provider context field of the interceptor context object. Inblock 805, the component stores the interceptor context object using a hash table and hashing on the reference to the context object. Inblock 806, the component modifies the context object to point to the interceptor context object and then completes. -
FIG. 9 is a flow diagram that illustrates the processing of the intercept request component in one embodiment. The component is invoked by an interceptor to restore the context object. Indecision block 901, if another request is outstanding, then the component continues atblock 904, else the component continues atblock 902. Inblock 902, the component retrieves the reference to the interceptor context object from the modified portion of the context object. Inblock 903, the component restores the service provider context object using the retained content and continues atblock 906. Inblock 904, the component searches the hash table for the interceptor context object. Indecision block 905, if the interceptor context object was found in the hash table, then the component continues atblock 906, else the component continues atblock 911. Inblock 906, the component increments the count field of the interceptor count object to indicate that one more request is outstanding. Inblock 907, the component sets the interceptor context to the interceptor context of the interceptor context object so that the interceptor can perform its processing in the appropriate context. Inblock 908, the component processes the request with the interceptor context. Inblock 909, the component sets the callback routine to identify the interceptor context object. Inblock 910, the component forwards to the service provider or the interceptor at the next lower level the request that includes the restored service provider context object and the callback function and then completes. Inblock 911, the component performs the processing of the request when context information is not available. -
FIG. 10 is a flow diagram that illustrates the processing of the callback function in one embodiment. Inblock 1001, the component retrieves the interceptor context object for the interceptor. Inblock 1002, the component decrements the count filed of the interceptor context object to indicate that one less request is outstanding. Indecision block 1003, if no more requests are outstanding, then the component continues atblock 1004, else the component continues atblock 1005. Inblock 1004, the component modifies a portion of the context object to point to the interceptor context object. The component may also retain a new copy of the unmodified content in the interceptor context object if the service provider or interceptors are allowed to modify that content after creation of the context object. Inblock 1005, the component then forwards the response by invoking the callback function of the application and then completes. - Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. Accordingly, the invention is not limited except as by the appended claims.
Claims (20)
1. A method performed a computing device for tracking context of a service provider by an interceptor of requests from a client to the service provider, the method comprising:
receiving, from the service provider, service provider context information;
generating interceptor context information representing state information of the interceptor maintained for communication between the client and the service provider;
generating a copy of a portion of the service provider context information, the copy representing a retained portion of the service provider context information;
modifying the service provider context information to replace the copied portion with a reference to the interceptor context information, the replaced portion representing a modified portion of the service provider context information;
providing the modified service provider context information to the client; and
upon receiving from the client a request for a service of the service provider, the request including the modified service provider context information,
retrieving, from the modified portion of the modified service provider context information included in the request, the reference to the interceptor context information representing the state information for communication between the client and the service provider;
replacing the modified portion of the modified service provider context information included in the request with the retained portion to restore the service provider context information; and
forwarding the request to the service provider, the forwarded request including the restored service provider context information.
2. The method of claim 1 wherein the retained portion of the service provider context information is stored in association with the interceptor context information.
3. The method of claim 2 including, upon receiving from the client a request for a service of the service provider, retrieving the retained portion stored in association with the interceptor context information identified by the retrieved reference.
4. The method of claim 1 including upon receiving from the client a request for a service of the service provider while a request for a service of that service provider is still outstanding, not modifying the service provider context information that was previously modified.
5. The method of claim 1 including upon receiving from the client a request for a service of the service provider while a request for a service of that service provider is still outstanding, using a reference to the service provider context information to locate interceptor context information.
6. The method of claim 1 including:
upon receiving from the client a request for a service of the service provider while a request for a service of that service provider is still outstanding,
using a reference to the service provider context information to locate interceptor context information; and
not modifying the modified service provider context information.
7. A computer-readable storage medium storing computer-executable instructions for controlling a computing device to track context to an interceptor of requests from a client to a service provider, by a method comprising:
receiving by the interceptor service provider context information;
generating interceptor context information representing state information of the interceptor for communication between the client and the service provider;
generating a copy of a portion of the service provider context information, the copy representing a retained portion of the service context information as received;
modifying the service provider context information to replace the copied portion with a reference to the interceptor context information, the replaced portion representing a modified portion of the service provider context information;
forwarding the modified service provider context information on to the client; and
upon receiving a request for a service of the service provider, the request including the modified service provider context information,
retrieving, from the modified portion of the modified service provider context information included in the request, the reference to the interceptor context information representing the state information of the interceptor;
replacing the modified portion of the modified service provider context information included in the request with the retained portion to restore the service provider context information; and
forwarding the request on to the service provider, the forwarded request including the restored service provider context information.
8. The computer-readable storage medium of claim 7 wherein the interceptor receives the service provider context information from a next lower-level interceptor and forwards the request on to the service provider via the next lower-level interceptor.
9. The computer-readable storage medium of claim 8 wherein the interceptor forwards the modified service provider information on to the client via a next higher-level interceptor and receives the request for service from the next higher-level interceptor.
10. The computer-readable storage medium of claim 7 wherein the interceptor forwards the modified service provider information on to the client via a next higher-level interceptor and receives the request for service from the next higher-level interceptor.
11. The computer-readable storage medium of claim 7 wherein the retained portion of the service provider context information is stored in association with the interceptor context information.
12. The computer-readable storage medium of claim 11 including, upon receiving a request for a service of the service provider, retrieving the retained portion stored in association with the interceptor context information identified by the retrieved reference.
13. The computer-readable storage medium of claim 7 including upon receiving a request for a service of the service provider while a request for a service of that service provider is still outstanding, not modifying the service provider context information that was previously modified.
14. The computer-readable storage medium of claim 7 including upon receiving from the client a request for a service of the service provider while a request for a service of that service provider is still outstanding, using a reference to the service provider context information to locate interceptor context information.
15. A computing device for tracking context of provided to an interceptor of requests from a client to a service provider, comprising:
a memory storing computer-executable instructions of an interceptor that:
receives service provider context information;
generates interceptor context information representing state information of the interceptor for communication between the client and the service provider;
generates a copy of a portion of the service provider context information, the copy representing a retained portion of the service context information as received;
modifies the service provider context information to replace the copied portion with a reference to the interceptor context information, the replaced portion representing a modified portion of the service provider context information;
forwards the modified service provider context information on to the client; and
upon receiving a request for a service of the service provider, the request including the modified service provider context information,
retrieves, from the modified portion of the modified service provider context information included in the request, the reference to the interceptor context information representing the state information of the interceptor;
replaces the modified portion of the modified service provider context information included in the request with the retained portion to restore the service provider context information; and
forwards the request on to the service provider, the forwarded request including the restored service provider context information; and
a processor for executing the computer-executable instructions stored in the memory.
16. The computing device of claim 15 wherein the interceptor receives the service provider context information from a next lower-level interceptor and forwards the request on to the service provider via the next lower-level interceptor.
17. The computing device of claim 16 wherein the interceptor forwards the modified service provider information on to the client via a next higher-level interceptor and receives the request for service from the next higher-level interceptor.
18. The computing device of claim 15 wherein the interceptor forwards the modified service provider information on to the client via a next higher-level interceptor and receives the request for service from the next higher-level interceptor.
19. The computing device of claim 15 wherein the retained portion of the service provider context information is stored in association with the interceptor context information.
20. The computing device of claim 16 wherein the interceptor, upon receiving a request for a service of the service provider, retrieves the retained portion stored in association with the interceptor context information identified by the retrieved reference.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/414,475 US20120166529A1 (en) | 2005-09-20 | 2012-03-07 | Modifying service provider context information to facilitate locating interceptor context information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/231,352 US8135741B2 (en) | 2005-09-20 | 2005-09-20 | Modifying service provider context information to facilitate locating interceptor context information |
US13/414,475 US20120166529A1 (en) | 2005-09-20 | 2012-03-07 | Modifying service provider context information to facilitate locating interceptor context information |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/231,352 Continuation US8135741B2 (en) | 2005-09-20 | 2005-09-20 | Modifying service provider context information to facilitate locating interceptor context information |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120166529A1 true US20120166529A1 (en) | 2012-06-28 |
Family
ID=37903164
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/231,352 Expired - Fee Related US8135741B2 (en) | 2005-09-20 | 2005-09-20 | Modifying service provider context information to facilitate locating interceptor context information |
US13/412,325 Abandoned US20120166527A1 (en) | 2005-09-20 | 2012-03-05 | Modifying service provider context information to facilitate locating interceptor context information |
US13/414,475 Abandoned US20120166529A1 (en) | 2005-09-20 | 2012-03-07 | Modifying service provider context information to facilitate locating interceptor context information |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/231,352 Expired - Fee Related US8135741B2 (en) | 2005-09-20 | 2005-09-20 | Modifying service provider context information to facilitate locating interceptor context information |
US13/412,325 Abandoned US20120166527A1 (en) | 2005-09-20 | 2012-03-05 | Modifying service provider context information to facilitate locating interceptor context information |
Country Status (1)
Country | Link |
---|---|
US (3) | US8135741B2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7966643B2 (en) * | 2005-01-19 | 2011-06-21 | Microsoft Corporation | Method and system for securing a remote file system |
US20070079117A1 (en) * | 2005-10-04 | 2007-04-05 | Bhogal Kulvir S | Method for passing selectively encrypted attributes of specific versions of objects in a distributed system |
US8166189B1 (en) * | 2008-03-25 | 2012-04-24 | Sprint Communications Company L.P. | Click stream insertions |
CN102902541B (en) * | 2012-09-27 | 2016-02-24 | 北京国双科技有限公司 | The method and apparatus of capturing system message on ios platform |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6633923B1 (en) * | 1999-01-29 | 2003-10-14 | Iona Technologies Inc. | Method and system for dynamic configuration of interceptors in a client-server environment |
US20030236926A1 (en) * | 2000-10-30 | 2003-12-25 | France Telecom | Method of propagating invocation contexts through a distributed object system |
US20040064503A1 (en) * | 2002-02-22 | 2004-04-01 | Bea Systems, Inc. | System and method for web services Java API-based invocation |
US6789170B1 (en) * | 2001-08-04 | 2004-09-07 | Oracle International Corporation | System and method for customizing cached data |
US20040181576A1 (en) * | 2003-03-12 | 2004-09-16 | Microsoft Corporation | Protocol-independent client-side caching system and method |
US20070038697A1 (en) * | 2005-08-03 | 2007-02-15 | Eyal Zimran | Multi-protocol namespace server |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5694546A (en) * | 1994-05-31 | 1997-12-02 | Reisman; Richard R. | System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list |
US6182141B1 (en) | 1996-12-20 | 2001-01-30 | Intel Corporation | Transparent proxy server |
US6226680B1 (en) | 1997-10-14 | 2001-05-01 | Alacritech, Inc. | Intelligent network interface system method for protocol processing |
US8782199B2 (en) | 1997-10-14 | 2014-07-15 | A-Tech Llc | Parsing a packet header |
US6434620B1 (en) | 1998-08-27 | 2002-08-13 | Alacritech, Inc. | TCP/IP offload network interface device |
US7185266B2 (en) * | 2003-02-12 | 2007-02-27 | Alacritech, Inc. | Network interface device for error detection using partial CRCS of variable length message portions |
US6546425B1 (en) * | 1998-10-09 | 2003-04-08 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US7003555B1 (en) * | 2000-06-23 | 2006-02-21 | Cloudshield Technologies, Inc. | Apparatus and method for domain name resolution |
US6829654B1 (en) * | 2000-06-23 | 2004-12-07 | Cloudshield Technologies, Inc. | Apparatus and method for virtual edge placement of web sites |
US7032031B2 (en) * | 2000-06-23 | 2006-04-18 | Cloudshield Technologies, Inc. | Edge adapter apparatus and method |
US7788399B2 (en) * | 2001-03-26 | 2010-08-31 | Salesforce.Com, Inc. | System and method for mapping of services |
US7631084B2 (en) * | 2001-11-02 | 2009-12-08 | Juniper Networks, Inc. | Method and system for providing secure access to private networks with client redirection |
US20040015578A1 (en) * | 2002-02-22 | 2004-01-22 | Todd Karakashian | Web services runtime architecture |
US7191469B2 (en) | 2002-05-13 | 2007-03-13 | Green Border Technologies | Methods and systems for providing a secure application environment using derived user accounts |
US7185345B2 (en) * | 2002-06-20 | 2007-02-27 | International Business Machines Corporation | Data propagation in an activity service |
US7337241B2 (en) | 2002-09-27 | 2008-02-26 | Alacritech, Inc. | Fast-path apparatus for receiving data corresponding to a TCP connection |
US20040199786A1 (en) | 2002-12-02 | 2004-10-07 | Walmsley Simon Robert | Randomisation of the location of secret information on each of a series of integrated circuits |
US7178150B1 (en) * | 2003-01-29 | 2007-02-13 | Sprint Communications Company L.P. | Serialization method for transmitting data via CORBA interceptors |
US7636584B2 (en) * | 2003-10-17 | 2009-12-22 | Hewlett-Packard Development Company, L.P. | Computing device and methods for mobile-printing |
KR100522138B1 (en) | 2003-12-31 | 2005-10-18 | 주식회사 잉카인터넷 | Flexible network security system and method to permit trustful process |
US7188219B2 (en) * | 2004-01-30 | 2007-03-06 | Micron Technology, Inc. | Buffer control system and method for a memory system having outstanding read and write request buffers |
US7444536B1 (en) * | 2004-04-16 | 2008-10-28 | Sun Microsystems, Inc. | RMI-IIOP request failover mechanism |
US20060098645A1 (en) * | 2004-11-09 | 2006-05-11 | Lev Walkin | System and method for providing client identifying information to a server |
US8352728B2 (en) | 2006-08-21 | 2013-01-08 | Citrix Systems, Inc. | Systems and methods for bulk encryption and decryption of transmitted data |
-
2005
- 2005-09-20 US US11/231,352 patent/US8135741B2/en not_active Expired - Fee Related
-
2012
- 2012-03-05 US US13/412,325 patent/US20120166527A1/en not_active Abandoned
- 2012-03-07 US US13/414,475 patent/US20120166529A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6633923B1 (en) * | 1999-01-29 | 2003-10-14 | Iona Technologies Inc. | Method and system for dynamic configuration of interceptors in a client-server environment |
US20030236926A1 (en) * | 2000-10-30 | 2003-12-25 | France Telecom | Method of propagating invocation contexts through a distributed object system |
US6789170B1 (en) * | 2001-08-04 | 2004-09-07 | Oracle International Corporation | System and method for customizing cached data |
US20040064503A1 (en) * | 2002-02-22 | 2004-04-01 | Bea Systems, Inc. | System and method for web services Java API-based invocation |
US20040181576A1 (en) * | 2003-03-12 | 2004-09-16 | Microsoft Corporation | Protocol-independent client-side caching system and method |
US20070038697A1 (en) * | 2005-08-03 | 2007-02-15 | Eyal Zimran | Multi-protocol namespace server |
Also Published As
Publication number | Publication date |
---|---|
US20070079007A1 (en) | 2007-04-05 |
US8135741B2 (en) | 2012-03-13 |
US20120166527A1 (en) | 2012-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3484049B2 (en) | Delay coded data transmission | |
US7793140B2 (en) | Method and system for handling failover in a distributed environment that uses session affinity | |
US8255359B2 (en) | System and methods for asynchronous synchronization | |
US5987497A (en) | System and method for managing the configuration of distributed objects | |
US7062516B2 (en) | Methods, systems, and articles of manufacture for implementing a runtime logging service storage infrastructure | |
US20090319736A1 (en) | Method and apparatus for integrated nas and cas data backup | |
EP2791787B1 (en) | Autonomous network streaming | |
JPH10124324A (en) | Method for executing applet on non-ip network and computer work station | |
US7428543B2 (en) | Methods and systems for allowing third party client applications to influence implementation of high-level document commands | |
US20200026449A1 (en) | Using log objects in object storage for durability of file objects in volatile memory | |
CN114503535A (en) | Invoking web services via a service proxy | |
US20200175172A1 (en) | Orchestration of vulnerability scanning and issue tracking for version control technology | |
US8930518B2 (en) | Processing of write requests in application server clusters | |
US20090055511A1 (en) | Non-programmatic access to data and to data transfer functions | |
US20120166529A1 (en) | Modifying service provider context information to facilitate locating interceptor context information | |
US20090006619A1 (en) | Directory Snapshot Browser | |
US20030105780A1 (en) | File system, control method, and program | |
US20080270480A1 (en) | Method and system of deleting files from a remote server | |
US11340964B2 (en) | Systems and methods for efficient management of advanced functions in software defined storage systems | |
US8756243B2 (en) | Non-programmatic access to enterprise messaging administration | |
US7861242B2 (en) | Mobile application morphing system and method | |
EP1360581A2 (en) | Method and apparatus for remote execution of an application with local display and control | |
EP2414937A2 (en) | In-process intermediary to create virtual processes | |
US7536378B2 (en) | Copy template/read only data in application tables | |
US11928079B1 (en) | Intelligently associating a file with an application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034544/0541 Effective date: 20141014 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |