×

Representing extensible markup language (XML) as an executable having conditional authentication or policy logic

  • US 8,799,770 B2
  • Filed: 10/21/2011
  • Issued: 08/05/2014
  • Est. Priority Date: 11/16/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method, comprising:

  • generating, by a first device, an executable that, when processed at a second device, reproduces one or more components and content associated with the one or more components as an in-memory data structure, wherein the one or more components and the content associated with the one or more components represent an extensible markup language (XML) document, the generating comprises providing the executable in a format used by the second device of a recipient, and the executable is in a particular program code format that comprises;

    a machine-specific program code format, a byte-code format, a machine-independent program code format, or a combination thereof; and

    configuring, by the first device, the executable with authentication logic, policy logic, and retrieval logic, and;

    the authentication logic provides authentication for the recipient that attempts to access the XML document via the executable at the second device,the policy logic enforces policy restrictions, the policy restrictions conditionally restrict how the one or more components and content associated with the one or more components of the XML document are subsequently populated to the in-memory data structure for the recipient at the second device, andthe retrieval logic permits an embedded reference to an external document within the XML document to be appropriately retrieved by the recipient at the second device, andwherein the authentication logic, the policy logic, and the retrieval logic each include one or more instructions that are represented within the executable, such that when the executable is executed, the authentication logic, the policy logic, and the retrieval logic are processed with the executable, the authentication logic enforces identity verification when the recipient attempts to access the XML document at the second device, and the authentication logic and the policy logic together with the retrieval logic enforce conditional restrictions that determine whether the external document is to be retrieved and populated to the in-memory data structure for the recipient at the second device.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×