A simulated access environment overrides function calls pertaining to resources for which the user may be restricted from accessing. The environment also allocates and manages replacement resources that are used in place of access-restricted computing resources in order to enable execution of utilities or applications that would normally abort without enhanced user permissions. In one embodiment, replacement resources are managed by a resource mirror. In certain embodiments, the function calls are statically overridden by linking a replacement library to the utilities or applications. In other embodiments, the function calls are dynamically overridden via software interrupts, replacing entries within a function table, dynamically loading a replacement library, or the like.

 
Web www.patentalert.com

< Method and apparatus for obtaining and verifying credentials for accessing a computer application program

< Negotiating secure connections through a proxy server

> Secure access to a unified logon-enabled data store

> Mapping between remote procedure call system primitives and event driven execution environment system primitives

~ 00261