×

Secure document creation from potentially unsecure source templates

  • US 9,224,010 B2
  • Filed: 09/01/2011
  • Issued: 12/29/2015
  • Est. Priority Date: 09/01/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method implemented by a computing system to generate secured documents using a source template, the method comprising:

  • receiving the source template that is configured in accordance with a first format compatible with a first computer program;

    receiving a source schema associated with the source template, the source schema defining the first format;

    converting the source template into a secured template, wherein the secured template is configured in accordance with a second format compatible with a second computer program, the second format being different than the first format, wherein the first format is incompatible with the second computer program, and wherein converting the source template into the secured template comprises;

    determining, by the computing system and based on indications contained in the source schema, one or more parts of the source template where modification is permitted, the one or more parts of the source template comprising an element of the source template that references a common style of the source template, andadding, by the computing system, user-modifiable extension points at the determined one or more parts of the source template to create the secured template, wherein adding the user-modifiable extension points comprises creating at least one child element of the element of the source template and copying at least a portion of the common style referenced by the element to the at least one child element,wherein the secured template is not user-modifiable outside of the user-modifiable extension points;

    receiving user input comprising one or more user-indicated modifications at one or more of the user-modifiable extension points;

    modifying the secured template into a custom document with modifications to the one or more user-modifiable extension points in accordance with the one or more user-indicated modifications, wherein the custom document is compatible with the second computer program; and

    transforming the custom document into a secured custom document that comprises the modifications to the one or more user-modifiable extension points and that is in a format executable using the source schema, wherein the secured custom document is compatible with the first computer program, and wherein transforming the custom document into the secured custom document comprises;

    creating a respective at least one individualized style within the secured custom document; and

    copying at least a portion of a style defined within the at least one child element to the respective at least one individualized style.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×