REPRESENTING EXTENSIBLE MARKUP LANGUAGE (XML) AS AN EXECUTABLE HAVING CONDITIONAL AUTHENTICATION OR POLICY LOGIC
First Claim
1. A non-transitory computer-readable implemented method to process on a device, comprising:
- generating, by the device, an executable that processes to reproduce components and content as an in-memory data structure, the components and content representing an extensible markup language (XML) document; and
configuring, by the device, the executable with authentication and policy logic, the authentication logic providing custom authentication for a recipient that attempts to access the XML document via the executable and the policy logic enforcing dependent resources and licensing restrictions for the XML document when accessed by the recipient, and the policy logic providing log and report processing based on access by the recipient to the XML document.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques for representing extensible markup language (XML) in an executable format are presented. An XML document is parsed into its components and content. The components and content are packaged as an executable. Some portions of the executable include authentication logic or policy logic that is subsequently enforced when the executable is processed. The executable is subsequently distributed to recipient machines. The machines process the executable and produce memory loaded versions of the components and content representing the XML document on the machines. The memory loaded versions of the components and content include conditionally added authentication logic of policy logic.
-
Citations
20 Claims
-
1. A non-transitory computer-readable implemented method to process on a device, comprising:
-
generating, by the device, an executable that processes to reproduce components and content as an in-memory data structure, the components and content representing an extensible markup language (XML) document; and configuring, by the device, the executable with authentication and policy logic, the authentication logic providing custom authentication for a recipient that attempts to access the XML document via the executable and the policy logic enforcing dependent resources and licensing restrictions for the XML document when accessed by the recipient, and the policy logic providing log and report processing based on access by the recipient to the XML document. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable implemented method to process on a device, comprising, comprising:
-
processing, by the device, an executable to produce a loaded version of components and content for a document in an extensible markup language (XML) formatted data structure accessible from memory of the device; and enforcing, by the device, authentication logic and policy logic that is part of the executable when a recipient attempts access the XML formatted data structure, the authentication logic processing custom authentication based on the recipient and the policy logic enforcing licensing restrictions for the document and providing report and log processing based on the access of the recipient to the XML formatted data structure. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a processor configured with an extensible markup language (XML) compiler and an XML parser; the parser configured to parse an XML document into components, each component associated with content, and the XML compiler is configured to translate each component and its content into an executable that when subsequently processed on a machine reconstructs the components and content as a data structure within an environment of that machine, and wherein at least a portion of the executable includes authentication logic and policy logic that the machine enforces when subsequently processing the executable to custom authenticate a recipient for access to the XML document and to enforce licensing restrictions for the XML document. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification