DOCUMENT ACCESSING THROUGH MULTIPLE SECURITY DOMAINS
First Claim
1. A processor implemented method, comprising:
- saving by a processor from a first security domain to a second security domain a version of a document, including determining whether the document contains one or more components not to be accessible through the second security domain, and writing components of the document excluding the one or more components determined not to be accessible through the second security domain into the second security domain, the first security domain being a higher security domain than the second security domain; and
opening by the processor through the first security domain the document, including determining whether a version of the document has been saved to the second security domain, and if a version of the document has been saved to the second security domain, further determining whether one or more components of the version of the document has been modified, or one or more new components have been added to the version of the document through the second security domain, and if so, retrieve a copy of the one or more modified or new components from the second security domain, and merging the retrieved copy of the one or more modified or new components into the document being open at the first security domain.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses for accessing documents in a multi-security domain environment are described herein. The novel methods may be processor implemented methods and may include saving by a processor from a first to a second security domain a version of a document, wherein the first security is a higher security domain than the second security domain. As part of the saving operation, a determination may be made as to whether the document includes one or more components not to be accessible through the second security domain, and writing the components of the document excluding the one or more components determined not to be accessible through the second security domain into the second security domain. The methods may further include opening the document through the security domain by determining whether a version of the document has been saved to the second security domain, and if so, merging a copy of modifications made to version of the document, if there are any, into the document being open. In various embodiments, a domain specific document server and a cross security domain trusted services are employed to enable among other things, reduction of number of storage devices needed.
33 Citations
28 Claims
-
1. A processor implemented method, comprising:
-
saving by a processor from a first security domain to a second security domain a version of a document, including determining whether the document contains one or more components not to be accessible through the second security domain, and writing components of the document excluding the one or more components determined not to be accessible through the second security domain into the second security domain, the first security domain being a higher security domain than the second security domain; and opening by the processor through the first security domain the document, including determining whether a version of the document has been saved to the second security domain, and if a version of the document has been saved to the second security domain, further determining whether one or more components of the version of the document has been modified, or one or more new components have been added to the version of the document through the second security domain, and if so, retrieve a copy of the one or more modified or new components from the second security domain, and merging the retrieved copy of the one or more modified or new components into the document being open at the first security domain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus, comprising:
-
one or more processors; storage medium coupled to the processors having stored therein programming instructions to be operated by the one or more processors to; save from a first security domain to a second security domain a version of a document, including determining whether the document contains one or more components not to be accessible through the second security domain, and writing components of the document excluding the one or more components determined not to be accessible through the second security domain into the second security domain, the first security domain being a higher security domain than the second security domain; and open through the first security domain the document, including determining whether a version of the document has been saved to the second security domain, and if a version of the document has been saved to the second security domain, further determining whether one or more components of the version of the document has been modified, or one or more new components has been added to the version of the document through the second security domain, and if so, retrieve a copy of the one or more modified or new components from the second security domain, and merging the retrieved copy of the one or more modified or new components into the document being open at the first security domain. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. An article of manufacture, comprising:
-
a storage medium; a plurality of programming instructions stored in the storage medium to program an apparatus to enable to the apparatus to save from a first security domain to a second security domain a version of a document, including determining whether the document contains one or more components not to be accessible through the second security domain, and writing components of the document excluding the one or more components determined not to be accessible through the second security domain into the second security domain, the first security domain being a higher security domain than the second security domain; and open through the first security domain the document, including determining whether a version of the document has been saved to the second security domain, and if a version of the document has been saved to the second security domain, further determining whether one or more components of the version of the document has been modified, or one or more new components have been added to the version of the document through the second security domain, and if so, retrieve a copy of the one or more modified or new components from the second security domain, and merging the retrieved copy of the one or more modified or new components into the document being open at the first security domain. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
Specification