Anti-virus security information in an extensible markup language document
First Claim
Patent Images
1. A method, implemented at least in part by a computing apparatus, of detecting executable code embedded in an Extensible Markup Language (XML) document, comprising:
- applying Extensible Markup Language (XML) markup to a computer-generated document;
locating executable code embedded in the document; and
applying an attribute to a root level element of the XML markup for notifying a subsequent application of the presence of the embedded executable code;
wherein the attribute comprises a flag that detects the presence of the embedded executable code in the XML document, wherein the embedded executable code comprises at least one of an undesirable object and a property, and wherein the flag enables the subsequent application to reject the embedded executable code within the XML document when the XML markup is being parsed by the subsequent application in searching for the presence of the attribute indicating the presence of the embedded executable code in the document.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for allowing software applications capable of reading and saving Extensible Markup Language (XML) representations of documents to quickly and efficiently detect the presence of executable code contained in a given document being read or saved by the software applications. Examples of executable code include, but are not limited to macros, VBA macros, OLE code, OCX or ActiveX controls, embedded executable objects, and the like.
-
Citations
18 Claims
-
1. A method, implemented at least in part by a computing apparatus, of detecting executable code embedded in an Extensible Markup Language (XML) document, comprising:
-
applying Extensible Markup Language (XML) markup to a computer-generated document; locating executable code embedded in the document; and applying an attribute to a root level element of the XML markup for notifying a subsequent application of the presence of the embedded executable code; wherein the attribute comprises a flag that detects the presence of the embedded executable code in the XML document, wherein the embedded executable code comprises at least one of an undesirable object and a property, and wherein the flag enables the subsequent application to reject the embedded executable code within the XML document when the XML markup is being parsed by the subsequent application in searching for the presence of the attribute indicating the presence of the embedded executable code in the document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for detecting executable code embedded in an Extensible Markup Language (XML) document, comprising:
-
a memory storage; and a processing unit coupled to the memory storage, wherein the processing unit is operative to; apply Extensible Markup Language (XML) markup to a computer-generated document; locate an executable code embedded in the document; apply an attribute to a root level element of the XML markup for notifying a subsequent application of the presence of the embedded executable code; pass the document to the subsequent application; parse the XML markup by the subsequent application to locate the attribute applied to the root level element of the XML markup applied to the document; and if the attribute is located by the subsequent application, reject the document as corrupted by the embedded executable code; wherein the attribute comprises a flag that detects the presence of the embedded executable code in the document, wherein the embedded executable code comprises at least one of an undesirable object and a property, and wherein the flag enables the subsequent application to reject the document as corrupted by the embedded executable code when the XML markup is being parsed. - View Dependent Claims (16, 17)
-
-
18. A computer-readable medium on which is stored instructions which when executed by a computer perform a method of detecting executable code embedded in an Extensible Markup Language (XML) document, comprising:
-
applying Extensible Markup Language (XML) markup to a computer-generated document; locating an executable code embedded in the document; applying an attribute to a root level element of the XML markup for notifying a subsequent application of the presence of the embedded executable code; passing the document to the subsequent application; parsing the XML markup by the subsequent application to locate the attribute applied to the root level element of the XML markup applied to the document; and if the attribute is located by the subsequent application, rejecting the document as corrupted by the embedded executable code, wherein the attribute comprises a flag that detects the presence of the embedded executable code in the XML document, wherein the embedded executable code comprises a virus, and wherein the flag enables the subsequent application to reject the embedded executable code within the XML document when the XML markup is being parsed by the subsequent application in searching for the presence of the attribute indicating the presence of the embedded executable code in the document.
-
Specification