FIELD: information technology.
SUBSTANCE: method involves identifying commands generated by a first client different from commands generated by second clients, wherein the first client is identified based on address space identifier (ASID); and processing an algorithm for the first client using commands identified for the first client which call data resolved by a client tracking system for the first client during restricted data accessing and restricted execution of commands identified for other clients when executing the algorithm.
EFFECT: providing a mechanism which supports multiple active applications.
17 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT | 2017 |
|
RU2738021C2 |
VIRTUALLY TAGGED INSTRUCTION CACHE WITH PHYSICALLY TAGGED BEHAVIOUR | 2007 |
|
RU2433456C2 |
SYNCHRONISING CREDENTIAL HASHES BETWEEN DIRECTORY SERVICES | 2014 |
|
RU2671045C2 |
PUSH NOTIFICATIONS BASED ON LOCATION AND SOCIAL CONTACTS OF USERS OF SEVERAL CLASSES | 2016 |
|
RU2730445C2 |
CONTAINER SOFTWARE FOR VIRUS COPYING FROM ONE ENDPOINT TO ANOTHER | 2012 |
|
RU2733103C2 |
SEARCH RESULTS FOR NATIVE APPLICATIONS | 2015 |
|
RU2665888C2 |
SEARCH RESULTS FOR NATIVE APPLICATIONS | 2015 |
|
RU2710293C2 |
Web-SERVICE FOR DETECTING REMOTE APPLICATIONS | 2004 |
|
RU2359314C2 |
STATELESS MESSAGE ROUTING | 2014 |
|
RU2679340C1 |
USING CONTEXT INFORMATION TO FACILITATE COMMAND PROCESSING IN VIRTUAL ASSISTANT | 2012 |
|
RU2542937C2 |
Authors
Dates
2012-03-10—Published
2007-09-26—Filed