scispace - formally typeset
Patent

Running a kernel-dependent application in a container

02 Mar 2021-
Abstract: Examples of techniques for running kernel dependent applications in containers are disclosed. In one example implementation, a method includes initiating, by a processing system, a user mode Linux (UML) kernel in a container of a host. The method further includes initiating, by the processing system, an agent inside the UML, the agent configured to handle system call redirection from a host kernel of the host. The method further includes enabling, by the processing system, a system call hook kernel module on the host to hook a system call received from the container. The method further includes determining, by the processing system, whether the UML kernel is running inside the container. The method further includes, based at least in part on determining that the UML is running inside the container, passing, by the processing system, the system call to the UML kernel inside the container.

... read more

Topics: System call (59%), Container (abstract data type) (55%), Kernel (image processing) (53%) ... read more
Citations
  More

6 results found


Patent
30 Aug 2018-
Abstract: A method and apparatus of a device that simulates a plurality of network elements is described. In an exemplary embodiment, the device receives network topology information for the plurality of simulated network elements. The device further instantiates a container for each of the plurality of simulated network elements. The device additionally configures a set of processes for each of the plurality of containers, where each of the set of processes simulates at least one of the plurality of simulated network elements. The plurality of set of processes further implements a network topology represented by the network topology information. The device performs a test of the network topology and saves the results of the test.

... read more

1 Citations


Patent
Nidumolu Kalyan1Institutions (1)
03 Oct 2019-
Abstract: Embodiments of the invention may relate to method. In one or more embodiments of the invention, the method includes receiving, by a network device, a command to initiate a control plane reboot. The method may also include extracting, based on the command, a transitional update database from a software image that includes a new software version and the transitional update database. The method may also include performing a query to determine whether the transitional update database includes a required transitional update for performing an upgrade to the new software version; installing, when the query determines that the required transitional update is included in the software image, the required transitional update; and performing, after installation of the transitional update is complete, the control plane reboot to complete the upgrade to the new software version.

... read more

Topics: Software (54%), Reboot (53%), Upgrade (52%) ... read more

1 Citations


Patent
30 Jan 2020-
Abstract: A computer implemented method for executing applications on a host system. The method includes identifying application execution code of an application and a set of application execution dependencies of the application. The method creates a basic run-time environment (BRE) for the application on the host system. The method maps a root file system of the host system into the BRE. The method copies the application execution code of the application to an application directory in the BRE. The method maps the resource files of the host system to the directories in the BRE for the set of application execution dependencies corresponding to the resource files. The method initiates execution of the application through the BRE using the resource files of the host system that are mapped to the set of application execution dependencies of the application in the BRE.

... read more

Topics: Application directory (54%), Host (network) (53%), File system (51%)

Patent
19 Mar 2019-
Abstract: The embodiment of the invention provides a system deployment method and device and electronic equipment. The specific scheme comprises the following steps: determining content information required fordeploying a to-be-deployed system; and based on the content information, deploying the to-be-deployed system according to a preset deployment sequence and a preset dependency relationship. Accordingto the scheme provided by the embodiment of the invention; and obtaining the content information required during deployment of a to-be-deployed system. According to the technical scheme, the to-be-deployed system is automatically deployed according to the preset deployment sequence and the preset dependency relationship, and the preset deployment sequence and the preset dependency relationship arepreset, so that in the system deployment process, the dependency relationship does not need to be found one by one, the deployment sequence of the system is determined, the time required by system deployment is greatly shortened, and the system deployment efficiency is improved.

... read more

Topics: System deployment (68%), Software deployment (58%)

Patent
07 May 2020-
Abstract: Methods, systems, and computer readable mediums for hitless repair. Hitless repair may include making a first determination, by a system control device (SCD) agent of a network device, that a SCD of the network device has experienced an error and/or is to be updated; making a second determination, by the SCD agent, that the SCD and the network device support the hitless repair; performing, by the SCD agent, a pre-hitless repair action set; and performing, by the SCD agent and after completing the pre-hitless repair action set, a post-hitless repair action set, including a hitless reset of the SCD.

... read more


References
  More

27 results found


Patent
28 Jun 2002-
Abstract: An open platform architecture and methods for shared resource access management are provided. A redirection module in kernel space receives requests for access to resources from applications in user space. The redirection module routes signals representative of the received requests to a device driver interface in user space. Components of the device driver interface include resource management modules and device drivers that correspond to available resources. The resource management modules generate queries to the device drivers regarding availability of the requested resources. Upon receipt of resource status information from the device drivers, components of the device driver interface generate schedules for granting access to the requested resources. Further, the device driver interface components control access to the resources in accordance with the generated schedules including issuing responses to the requesting applications and the device drivers of the requested resources.

... read more

Topics: Access management (53%), User space (53%), Shared resource (52%) ... read more

353 Citations


Patent
30 Sep 2013-
Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.

... read more

Topics: Mobile device (54%), User interface (51%)

234 Citations


Patent
Stuart H. Schaefer1, John M. Sheehan1Institutions (1)
28 Jul 2005-
Abstract: A method for controlling the interoperation of a plurality of software applications and resources includes intercepting communications from a first application to a second application or resource, directing the communication to a context management system, generating a candidate list of contexts for the communication, evaluating the candidate list according to at least one policy defined for these contexts to identify the resultant action and namespace for the communication, and performing the action as defined by the policies within the identified namespace. The method further includes tracking one or more versions of the second application, as well as tracking an evolution of application and/or resource names. The method further includes identifying one or more operations associated with a context on the candidate list, and executing the identified operations prior to a further communication.

... read more

Topics: Context management (55%), Namespace (54%), Interoperation (52%) ... read more

194 Citations


Patent
09 Sep 2009-
Abstract: A system virtualizes applications on a managed endpoint using containers. A managed endpoint receives a virtualized container from an IT automation appliance. The virtualized container includes an application and a virtualization module. The virtualization module includes computer program instructions for virtualizing the application. An operating system API call made by the application during execution is intercepted, and a portion of the computer program instructions are executed based on the operating system API call. The computer program instructions modify the behavior of the application to effect the file and data virtualization of the application. A virtualized container can be deployed and updated from an IT automation appliance along with an agent to support the deployment and updating of the virtualized container.

... read more

Topics: Application virtualization (71%), Virtualization (64%), Data virtualization (59%) ... read more

105 Citations


Patent
04 Feb 2015-
Abstract: A system for providing security mechanisms for secure execution of program code is described. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to receive a request to execute a program code and allocate computing resources for executing the program code on one of the virtual machine instances. One mechanism involves executing program code according to a user-specified security policy. Another mechanism involves executing program code that may be configured to communicate or interface with an auxiliary service. Another mechanism involves splitting and executing program code in a plurality of portions, where some portions of the program code are executed in association with a first level of trust and some portions of the program code are executed with different levels of trust.

... read more

Topics: Program animation (67%), Source code (66%), Redundant code (64%) ... read more

71 Citations


Performance
Metrics
No. of citations received by the Paper in previous years
YearCitations
20202
20192
20182
Network Information
Related Papers (5)