Secure document creation from potentially unsecure source templates
First Claim
1. A method implemented by a computing system to generate secured documents using a source template, the method comprising:
- receiving the source template that is configured in accordance with a first format compatible with a first computer program;
receiving a source schema associated with the source template, the source schema defining the first format;
converting the source template into a secured template, wherein the secured template is configured in accordance with a second format compatible with a second computer program, the second format being different than the first format, wherein the first format is incompatible with the second computer program, and wherein converting the source template into the secured template comprises;
determining, by the computing system and based on indications contained in the source schema, one or more parts of the source template where modification is permitted, the one or more parts of the source template comprising an element of the source template that references a common style of the source template, andadding, by the computing system, user-modifiable extension points at the determined one or more parts of the source template to create the secured template, wherein adding the user-modifiable extension points comprises creating at least one child element of the element of the source template and copying at least a portion of the common style referenced by the element to the at least one child element,wherein the secured template is not user-modifiable outside of the user-modifiable extension points;
receiving user input comprising one or more user-indicated modifications at one or more of the user-modifiable extension points;
modifying the secured template into a custom document with modifications to the one or more user-modifiable extension points in accordance with the one or more user-indicated modifications, wherein the custom document is compatible with the second computer program; and
transforming the custom document into a secured custom document that comprises the modifications to the one or more user-modifiable extension points and that is in a format executable using the source schema, wherein the secured custom document is compatible with the first computer program, and wherein transforming the custom document into the secured custom document comprises;
creating a respective at least one individualized style within the secured custom document; and
copying at least a portion of a style defined within the at least one child element to the respective at least one individualized style.
1 Assignment
0 Petitions
Accused Products
Abstract
An illustrative embodiment of a computer-implemented method for generating secured documents using a source template is disclosed, in which a computer system receives the source template; converts the source template into a secured template comprising user-modifiable extension points, wherein the secured template is not user-modifiable outside of the user-modifiable extension points; receives a user input comprising one or more user-indicated modifications at one or more of the user-modifiable extension points; modifies the secured template into a custom document with modifications to the one or more user-modifiable extension points in accordance with the one or more user-indicated modifications; and transforms the custom document into a secured custom document that comprises the modifications to the one or more user-modifiable extension points and that is in a format that is executable using a source schema associated with the source template.
-
Citations
24 Claims
-
1. A method implemented by a computing system to generate secured documents using a source template, the method comprising:
-
receiving the source template that is configured in accordance with a first format compatible with a first computer program; receiving a source schema associated with the source template, the source schema defining the first format; converting the source template into a secured template, wherein the secured template is configured in accordance with a second format compatible with a second computer program, the second format being different than the first format, wherein the first format is incompatible with the second computer program, and wherein converting the source template into the secured template comprises; determining, by the computing system and based on indications contained in the source schema, one or more parts of the source template where modification is permitted, the one or more parts of the source template comprising an element of the source template that references a common style of the source template, and adding, by the computing system, user-modifiable extension points at the determined one or more parts of the source template to create the secured template, wherein adding the user-modifiable extension points comprises creating at least one child element of the element of the source template and copying at least a portion of the common style referenced by the element to the at least one child element, wherein the secured template is not user-modifiable outside of the user-modifiable extension points; receiving user input comprising one or more user-indicated modifications at one or more of the user-modifiable extension points; modifying the secured template into a custom document with modifications to the one or more user-modifiable extension points in accordance with the one or more user-indicated modifications, wherein the custom document is compatible with the second computer program; and transforming the custom document into a secured custom document that comprises the modifications to the one or more user-modifiable extension points and that is in a format executable using the source schema, wherein the secured custom document is compatible with the first computer program, and wherein transforming the custom document into the secured custom document comprises; creating a respective at least one individualized style within the secured custom document; and copying at least a portion of a style defined within the at least one child element to the respective at least one individualized style. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer system to generate secured documents using a source template, the computer system comprising:
-
one or more processors and one or more computer-readable data storage devices; program instructions, stored on at least one of the one or more data storage devices for execution by at least one of the one or more processors, to receive the source template that is configured in accordance with a first format compatible with a first computer program; program instructions, stored on at least one of the one or more data storage devices for execution by at least one of the one or more processors, to receive a source schema associated with the source template, the source schema defining the first format; program instructions, stored on at least one of the one or more data storage devices for execution by at least one of the one or more processors, to convert the source template into a secured template, wherein the secured template is configured in accordance with a second format compatible with a second computer program, the second format being different than the first format, wherein the first format is incompatible with the second computer program, and wherein the program instructions to convert the source template into the secured template comprise program instructions to; determine, based on indications contained in the source schema, one or more parts of the source template where modification is permitted, the one or more parts of the source template comprising an element of the source template that references a common style of the source template, and add user-modifiable extension points at the determined one or more parts of the source template to create the secured template, wherein adding the user-modifiable extension points comprises creating at least one child element of the element of the source template and copying at least a portion of the common style referenced by the element to the at least one child element, wherein the secured template is not user-modifiable outside of the user-modifiable extension points; program instructions, stored on at least one of the one or more data storage devices for execution by at least one of the one or more processors, to receive a user input comprising one or more user-indicated modifications at one or more of the user-modifiable extension points; program instructions, stored on at least one of the one or more data storage devices for execution by at least one of the one or more processors, to modify the secured template into a custom document with modifications to the one or more user-modifiable extension points in accordance with the one or more user-indicated modifications, wherein the custom document is compatible with the second computer program; and program instructions, stored on at least one of the one or more data storage devices for execution by at least one of the one or more processors, to transform the custom document into a secured custom document that comprises the modifications to the one or more user-modifiable extension points and that is in a format that is executable using the source schema, wherein the secured custom document is compatible with the first computer program, and wherein the program instructions to transform the custom document into the secured custom document comprise program instructions to; create a respective at least one individualized style within the secured custom document; and copy at least a portion of a style defined within the at least one child element to the respective at least one individualized style. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer program product for generating secured documents using a source template, the computer program product comprising:
-
one or more non-transitory computer-readable media having computer-readable program instructions stored thereon, the computer-readable program instructions comprising; computer-readable program instructions to receive the source template that is configured in accordance with a first format compatible with a first computer program; computer-readable program instructions to receive a source schema associated with the source template, the source schema defining the first format; computer-readable program instructions to convert the source template into a secured template, wherein the secured template is configured in accordance with a second format compatible with a second computer program, the second format being different than the first format, wherein the first format is incompatible with the second computer program, and wherein the computer-readable program instructions to convert the source template into the secured template comprise computer-readable program instructions to; determine, based on indications contained in the source schema, one or more parts of the source template where modification is permitted, the one or more parts of the source template comprising an element of the source template that references a common style of the source template, and add user-modifiable extension points at the determined one or more parts of the source template to create the secured template, wherein adding the user-modifiable extension points comprises creating at least one child element of the element of the source template and copying at least a portion of the common style referenced by the element to the at least one child element, wherein the secured template is not user-modifiable outside of the user-modifiable extension points; computer-readable program instructions to receive a user input comprising one or more user-indicated modifications at one or more of the user-modifiable extension points; computer-readable program instructions to modify the secured template into a custom document with modifications to the one or more user-modifiable extension points in accordance with the one or more user-indicated modifications, wherein the custom document is compatible with the second computer program; and computer-readable program instructions to transform the custom document into a secured custom document that comprises the modifications to the one or more user-modifiable extension points and that is in a format that is executable using the source schema, wherein the secured custom document is compatible with the first computer program, and wherein the computer-readable program instructions to transform the custom document into the secured custom document comprise computer-readable program instructions to; create a respective at least one individualized style within the secured custom document; and copy at least a portion of a style defined within the at least one child element to the respective at least one individualized style. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification