发明名称 Performance Optimization in a Secured Computing Environment
摘要 Systems and methods for associating a first process with a first state and a first computing environment initialized according to a first set of parameters, wherein a first task is to be performed under a first security context. The method further comprising associating a second process with a second state and a second computing environment initialized according to a second set of parameters; in response to the first process submitting a first request, the second process spawning a third process which has the second state; wherein the third process sets a security context for the third process to the first security context and the third process sets the computing environment for the third process according to a first a set of parameters; executing the third process under the first security context and in association with the second state; and executing the first task in the first computing environment.
申请公布号 US2014181950(A1) 申请公布日期 2014.06.26
申请号 US201213726646 申请日期 2012.12.26
申请人 International Business Machines Corporation 发明人 Hadas David;Hamama Aner;Har'el Nadav Yosef;Rom Eran
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method for servicing requests in a secured computing environment, the method comprising: receiving a first request, associated with a first unique identifier that identifies a first client system that is in communication with a server system utilized to service the first request, wherein the server system comprises a security gateway associated with a first computing environment initialized according to a first set of parameters, wherein the first computing environment is configured to fully support servicing the first request; instantiating a primary request processor thread in advance of the server receiving the first request, wherein the primary request processor thread is associated with a second computing environment initialized according to a second set of parameters, wherein the second set of parameters is insufficient to fully support servicing the first request; in response to the security gateway submitting a second request to the primary request processor thread for service, the primary request processor thread spawning a secondary request processor thread associated with a second computing environment, wherein the secondary request processor thread reads the second request and the first set of parameters, andwherein the secondary request processor sets its computing environment according to the first set of parameters prior to servicing the first request.
地址 US