Patents by Inventor Nicholas Bissett

Nicholas Bissett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7680758
    Abstract: A method for isolating access by application programs to native resources provided by an operating system redirects a request for a native resource made by an application program executing on behalf of a user to an isolation environment. The isolation environment includes a user isolation scope and an application isolation scope. An instance of the requested native resource is located in the user isolation scope corresponding to the user. The request for the native resource is fulfilled using the version of the resource located in the user isolation scope. If an instance of the requested native resource is not located in the user isolation scope, the request is redirected to an application isolation scope. The request for the native resource is fulfilled using the version of the resource located in the application isolation scope. If an instance of the requested native resource is not located in the application isolation scope, the request is redirected to a system scope.
    Type: Grant
    Filed: September 30, 2004
    Date of Patent: March 16, 2010
    Assignee: Citrix Systems, Inc.
    Inventors: Lee George Laborczfalvi, Anil Roychoudhry, Andrew Gerard Borzycki, Jeffrey Dale Muir, Huai Chiun Chin, Pierre Semaan, Nicholas Bissett, Richard James Mazzaferri
  • Publication number: 20070180448
    Abstract: A method for providing access to a computing environment includes the step of receiving, by a broker machine, a request from a client machine for access to a computing environment, the request including an identification of a user of the client machine. One of a plurality of virtual machines is identified by a session management component, the identified virtual machine providing the requested computing environment. One of a plurality of execution machines is identified, the identified execution machine providing a terminal services session in which a hypervisor executes to provide access to hardware resources required by the identified virtual machine. The hypervisor launches the identified virtual machine. A connection is established between the client machine and the identified virtual machine, via the terminal services session.
    Type: Application
    Filed: November 28, 2006
    Publication date: August 2, 2007
    Applicant: Citrix Systems, Inc.
    Inventors: Anthony Low, Richard Croft, Richard Mazzaferri, Paul Ryman, Nicholas Bissett, Michael Wookey, Donovan Hackett
  • Publication number: 20070094667
    Abstract: In a method for accessing, by application programs, resources provided by an operating system, a process receives a request for a resource and an identifier associated with the resource. It is determined that the requested resource resides inside an application isolation environment. The request for the resource and the identifier associated with the resource is redirected to the application isolation environment. The request for the resource is responded to using an instance of the resource residing inside the application isolation environment.
    Type: Application
    Filed: September 19, 2005
    Publication date: April 26, 2007
    Inventors: Nicholas Bissett, Anil Roychoudhry, Richard Mazzaferri
  • Publication number: 20070067321
    Abstract: In a method for accessing resources provided by an operating system, a request for a resource is received by an application program executing inside an environment. A first identifier associated with the resource is acquired. A registry is consulted, responsive to an association between a first identifier associated with the resource and a second identifier associated with the resource, the association associated with the environment. The resource and an environment on which to launch the resource are identified, responsive to consulting the registry. The second identifier is associated with the resource, with the environment, and with the environment on which to launch the resource. A registry key for the resource is stored in the registry, the registry key comprising the second identifier. The request for the resource is redirected to the identified instance of the resource, responsive to the second identifier.
    Type: Application
    Filed: September 19, 2005
    Publication date: March 22, 2007
    Inventors: Nicholas Bissett, Anil Roychoudhry, Richard Mazzaferri
  • Publication number: 20070067255
    Abstract: In a method for accessing resources provided by an operating system, a request for a resource is received by an application program executing inside an environment. A first identifier associated with the resource is acquired. A registry is consulted, responsive to an association between a first identifier associated with the resource and a second identifier associated with the resource, the association associated with the environment. The resource and an environment on which to launch the resource are identified, responsive to consulting the registry. The second identifier is associated with the resource, with the environment, and with the environment on which to launch the resource. A registry key for the resource is stored in the registry, the registry key comprising the second identifier. The request for the resource is redirected to the identified instance of the resource, responsive to the second identifier.
    Type: Application
    Filed: September 19, 2005
    Publication date: March 22, 2007
    Inventors: Nicholas Bissett, Anil Roychoudhry, Richard Mazzaferri
  • Publication number: 20060265714
    Abstract: In a method for accessing, by application programs, resources provided by an operating system, a process receives a request for a resource and an identifier associated with the resource. It is determined that the requested resource resides in a location outside the application isolation environment. The request for the resource and the identifier associated with the resource is redirected to the determined location. The request for the resource is responded to using an instance of the resource residing in the determined location.
    Type: Application
    Filed: September 19, 2005
    Publication date: November 23, 2006
    Inventors: Nicholas Bissett, Anil Roychoudhry, Richard Mazzaferri
  • Publication number: 20060085789
    Abstract: A method for moving an executing process from a source isolation scope to a target isolation scope includes the step of determining that the process is in a state suitable for moving. The association of the process changes from a source isolation scope to a target isolation scope. A rule loads in association with the target isolation scope.
    Type: Application
    Filed: October 1, 2004
    Publication date: April 20, 2006
    Inventors: Lee Laborczfalvi, Anil Roychoudhry, Andrew Borzycki, Jeffrey Muir, Huai Chin, Richard Mazzaferri, Nicholas Bissett
  • Publication number: 20060075381
    Abstract: A method for isolating access by application programs to native resources provided by an operating system redirects a request for a native resource made by an application program executing on behalf of a user to an isolation environment. The isolation environment includes a user isolation scope and an application isolation scope. An instance of the requested native resource is located in the user isolation scope corresponding to the user. The request for the native resource is fulfilled using the version of the resource located in the user isolation scope. If an instance of the requested native resource is not located in the user isolation scope, the request is redirected to an application isolation scope. The request for the native resource is fulfilled using the version of the resource located in the application isolation scope. If an instance of the requested native resource is not located in the application isolation scope, the request is redirected to a system scope.
    Type: Application
    Filed: September 30, 2004
    Publication date: April 6, 2006
    Applicant: Citrix Systems, Inc.
    Inventors: Lee LABORCZFALVI, Anil ROYCHOUDHRY, Andrew BORZYCKI, Jeffrey MUIR, Huai CHIN, Pierre SEMAAN, Nicholas BISSETT, Richard MAZZAFERRI