Offline editing of XML files using a solution
First Claim
1. A computer implemented method comprising:
- reading a processing instruction (PI) in an XML data file governed by a solution to determine the solution'"'"'s origin, wherein the PI contains an entity selected from the group consisting of;
a href attribute that points to a URL;
a name;
a target that includes a character string that identifies an application used to create an HTML electronic form associated with the XML data file;
anda href attribute and at least one of a PI version and a product version;
determining security precautions for executing the solution based on the solution'"'"'s origin; and
silently installing the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions.
2 Assignments
0 Petitions
Accused Products
Abstract
A user can edit an XML data file offline without the user having to discover or deploy a solution for the XML data file. A processing instruction (PI) in the XML data file is read to determine the solution'"'"'s origin. The PI contains an entity that can be a href attribute that points to a URL, a name, a target having a character string identifying the application that created an electronic form associated with the XML data file, or a href attribute and at least one of a PI version and a product version. Security precautions for executing the solution based on the solution'"'"'s origin are determined and the solution is silently installed from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions. Deployment within a sandbox limits the operations that the solution application can perform.
-
Citations
30 Claims
-
1. A computer implemented method comprising:
-
reading a processing instruction (PI) in an XML data file governed by a solution to determine the solution'"'"'s origin, wherein the PI contains an entity selected from the group consisting of; a href attribute that points to a URL; a name; a target that includes a character string that identifies an application used to create an HTML electronic form associated with the XML data file; and a href attribute and at least one of a PI version and a product version; determining security precautions for executing the solution based on the solution'"'"'s origin; and silently installing the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium comprising instruction that, when executed by a computer, performs acts of:
-
reading a processing instruction (PI) in an XML data file governed by a solution to determine the solution'"'"'s origin, wherein the PI contains an entity selected from the group consisting of; a href attribute that points to a URL; a name; a target that includes a character string that identifies an application used to create an HTML electronic form associated with the XML data file; and a href attribute and at least one of a PI version and a product version; determining security precautions for executing the solution based on the solution'"'"'s origin; and silently installing the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions.
-
-
12. A system comprising:
-
a display having a screen capable of displaying icons or text representing an XML data file; a user-input device capable of enabling a user to select the XML data file; a network interface capable of communicating with a communications network to download an XML data file'"'"'s solution application; a computer capable of executing applications and communicating with a local memory source to store the XML data file'"'"'s solution application; and a document manager application executable on the computer and configured to; read a PI in the XML data file from the local memory source without user interaction, wherein the PI contains an entity selected from the group consisting of; a href attribute that points to a URL; a name; a target that includes a character string that identifies an application used to create an HTML electronic form associated with the XML data file; and a href attribute and at least one of a PI version and a product version; discover and deploy, without user interaction, the XML data file'"'"'s solution using the entity. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. An apparatus comprising:
-
means for displaying a representation of an XML data file; means for selecting the XML data file; processor means for reading a processor instruction (PI) in the XML data file, wherein the PI contains an entity selected from the group consisting of; a href attribute that points to a URL; a name; a target that includes a character string that identifies an application used to create an HTML electronic form associated with the XML data file; and a href attribute and at least one of a PI version and a product version; means, using the entity, for discovering and deploying, without user interaction, a solution application governing the XML data file from an offline memory source; means for displaying the HTML electronic form, wherein the HTML electronic form represents a product of the solution application and the XML data file; means for enabling a user to enter information into the HTML electronic form; means for receiving information entered into the HTML electronic form; and means for altering the XML data file to reflect the information received. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer readable medium comprising instruction that, when executed:
-
reads a processing instruction (PI) in an XML data file governed by a solution to determine the solution'"'"'s origin, wherein the PI contains an href attribute that points to a URL; determines security precautions for executing the solution based on the solution'"'"'s origin, wherein the security precautions indicate a trust level in the solution; and silently installs the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions to limit operations of the solution according to the trust level.
-
-
28. A computer readable medium comprising instruction that, when executed:
-
reads a processing instruction (PI) in an XML data file governed b a solution to determine the solution'"'"'s origin, wherein the PI contains a name; determines security precautions for executing the solution based on the solution'"'"'s origin, wherein the security precautions indicate a trust level in the solution; and silently installs the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions to limit operations of the solution according to the trust level.
-
-
29. A computer readable medium comprising instruction that, when executed:
-
reads a processing instruction (PI) in an XML data file governed by a solution to determine the solution'"'"'s origin, wherein the PI contains a target that includes a character string that identifies an application used to create an HTML electronic form associated with the XML data file; determines security precautions for executing the solution based on the solution'"'"'s origin, wherein the security precautions indicate a trust level in the solution; and silently installs the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions to limit operations of the solution according to the trust level.
-
-
30. A computer readable medium comprising instruction that, when executed by a computer:
-
reads a processing instruction (PI) in an XML data file governed by a solution to determine the solution'"'"'s origin, wherein the PI contains a href attribute and at least one of a PI version and a product version; determines security precautions for executing the solution based on the solution'"'"'s origin, wherein the security precautions indicate a trust level in the solution; and silently installs the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions to limit operations of the solution according to the trust level.
-
Specification