Representing extensible markup language (XML) as an executable having conditional authentication or policy logic
First Claim
1. A computer implemented method, comprising:
- generating, by a first device, an executable that, when processed at a second device, reproduces one or more components and content associated with the one or more components as an in-memory data structure, wherein the one or more components and the content associated with the one or more components represent an extensible markup language (XML) document, the generating comprises providing the executable in a format used by the second device of a recipient, and the executable is in a particular program code format that comprises;
a machine-specific program code format, a byte-code format, a machine-independent program code format, or a combination thereof; and
configuring, by the first device, the executable with authentication logic, policy logic, and retrieval logic, and;
the authentication logic provides authentication for the recipient that attempts to access the XML document via the executable at the second device,the policy logic enforces policy restrictions, the policy restrictions conditionally restrict how the one or more components and content associated with the one or more components of the XML document are subsequently populated to the in-memory data structure for the recipient at the second device, andthe retrieval logic permits an embedded reference to an external document within the XML document to be appropriately retrieved by the recipient at the second device, andwherein the authentication logic, the policy logic, and the retrieval logic each include one or more instructions that are represented within the executable, such that when the executable is executed, the authentication logic, the policy logic, and the retrieval logic are processed with the executable, the authentication logic enforces identity verification when the recipient attempts to access the XML document at the second device, and the authentication logic and the policy logic together with the retrieval logic enforce conditional restrictions that determine whether the external document is to be retrieved and populated to the in-memory data structure for the recipient at the second device.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques for representing extensible markup language (XML) in an executable format are presented. An XML document is parsed into its components and content. The components and content are packaged as an executable. Some portions of the executable include authentication logic or policy logic that is subsequently enforced when the executable is processed. The executable is subsequently distributed to recipient machines. The machines process the executable and produce memory loaded versions of the components and content representing the XML document on the machines. The memory loaded versions of the components and content include conditionally added authentication logic of policy logic.
38 Citations
21 Claims
-
1. A computer implemented method, comprising:
-
generating, by a first device, an executable that, when processed at a second device, reproduces one or more components and content associated with the one or more components as an in-memory data structure, wherein the one or more components and the content associated with the one or more components represent an extensible markup language (XML) document, the generating comprises providing the executable in a format used by the second device of a recipient, and the executable is in a particular program code format that comprises; a machine-specific program code format, a byte-code format, a machine-independent program code format, or a combination thereof; and configuring, by the first device, the executable with authentication logic, policy logic, and retrieval logic, and; the authentication logic provides authentication for the recipient that attempts to access the XML document via the executable at the second device, the policy logic enforces policy restrictions, the policy restrictions conditionally restrict how the one or more components and content associated with the one or more components of the XML document are subsequently populated to the in-memory data structure for the recipient at the second device, and the retrieval logic permits an embedded reference to an external document within the XML document to be appropriately retrieved by the recipient at the second device, and wherein the authentication logic, the policy logic, and the retrieval logic each include one or more instructions that are represented within the executable, such that when the executable is executed, the authentication logic, the policy logic, and the retrieval logic are processed with the executable, the authentication logic enforces identity verification when the recipient attempts to access the XML document at the second device, and the authentication logic and the policy logic together with the retrieval logic enforce conditional restrictions that determine whether the external document is to be retrieved and populated to the in-memory data structure for the recipient at the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a processor configured to execute an extensible markup language (XML) compiler and an XML parser, wherein the XML parser is configured to; parse an XML document into one or more components that each are associated with content, and the XML compiler is configured to; translate each component and the content associated with the component into an executable that, when subsequently processed on a machine, reconstructs the one or more components and the content associated with the one or more components as a data structure within an environment of the machine, wherein the executable is provided in a format used by the machine of a recipient, and the executable is in a particular program code format that comprises a machine-specific program code format, a byte-code format, a machine-independent program code format, or a combination thereof, wherein at least a portion of the executable includes authentication logic, policy logic, and retrieval logic, the authentication logic provides authentication for the recipient that attempts to access the XML document via the executable, and the policy logic enforces policy restrictions, wherein the policy restrictions conditionally restrict how the one or more components and content associated with the one or more components of the XML document are subsequently populated to the data structure for the recipient, and the retrieval logic permits an embedded reference to an external document within the XML document to be appropriately retrieved by the recipient, and wherein the authentication logic, the policy logic, and the retrieval logic each include one or more instructions that are represented within the executable, such that when the authentication logic, the policy logic, and the retrieval logic are processed with the executable, the authentication logic enforces identity verification when the recipient attempts to access the XML document, and the authentication logic and the policy logic together with the retrieval logic enforce conditional restrictions that determine whether the external document is to be retrieved and populated to the data structure for the recipient. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer implemented method, comprising:
-
processing, by a device, an executable to produce a loaded version of one or more components and content associated with the one or more components an extensible markup language (XML) document that is mapped to a data structure accessible from a memory of the device, wherein the executable is in a particular program code format, and said processing comprises; recognizing the executable as being in the particular program code format and selecting an interpreter or driver service to process the executable, wherein the particular program code format comprises a machine-specific program code format, a byte-code format, a machine-independent program code format, or a combination thereof; and processing, by the device, authentication logic, policy logic, and retrieval logic that are included within the executable, wherein; the authentication logic provides authentication for a recipient that attempts to access the data structure, the authentication logic provides the authentication based on the recipient, wherein selective portions of the content from the XML document are made available to the recipient based on the processing of the authentication logic, and the policy logic enforces policy restrictions, wherein the policy restrictions conditionally restrict how the one or more components and content associated with the one or more components of the XML document are subsequently populated to the data structure for the recipient, and the retrieval logic permits an embedded reference to an external document within the XML document to be appropriately retrieved by the recipient, and wherein the authentication logic, the policy logic, and the retrieval logic each include one or more instructions that are represented within the executable, such that when the authentication logic, the policy logic, and the retrieval logic are processed with the executable, the authentication logic enforces identity verification when the recipient attempts to access the XML document, and the authentication logic and the policy logic together with the retrieval logic enforce conditional restrictions that determine whether the external document is to be retrieved and populated to the data structure for the recipient. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification