Installing a solution
First Claim
Patent Images
1. A method implemented at least in part by a computer comprising:
- determining a solution'"'"'s origin;
determining security precautions for executing the solution based on the solution'"'"'s origin; and
silently installing the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions.
1 Assignment
0 Petitions
Accused Products
Abstract
Tool(s) enabling installation of a solution are described. These tool(s) may follow appropriate security precautions to contain possibly dangerous code in a data file'"'"'s solution even when the solution is installed from a local source, such as when a user is offline. These tool(s) determine what level of security is appropriate for a data file'"'"'s solution based on the original source of the solution. The tool(s) may also and/or instead enable a user to edit a data file without the user having to discover or deploy a solution application governing the data file.
1050 Citations
20 Claims
-
1. A method implemented at least in part by a computer comprising:
-
determining a solution'"'"'s origin; determining security precautions for executing the solution based on the solution'"'"'s origin; and silently installing the solution from a source other than the solution'"'"'s origin within a sandbox enforcing the security precautions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method implemented at least in part by a computer comprising:
-
receiving input to open a data file having a solution; discovering, without user interaction, the solution in an offline memory source; deploying, without user interaction, the solution; and opening the data file. - View Dependent Claims (11, 12)
-
-
13. A method implemented at least in part by a computer comprising:
-
receiving input to open a data file having a solution; discovering, without user interaction, the solution in an offline memory source; deploying, without user interaction, the solution; opening the data file effective to enable a user to edit the data file; and prior to receiving the input to open the data file; downloading the solution from an online memory source into the offline memory source. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification