The following compact disc submission includes two compact discs each having identical ASCII text files in the IBM-PC machine format and are compatible for reading with MS-DOS and MS-WINDOWS operating systems. The computer program listing files submitted on the compact discs are incorporated herein by reference in their entirety as if set forth in full in this document for all purposes: FILENAME: WORD12 CLEAN.txt; CREATION DATE: Mar. 31, 2006; FILE SIZE (bytes): 173 KB.
Developers looking to manipulate the content of a document have to know how to read and write data according to the file format of the document. This process can be complex and challenging. Attempting to alter a document programmatically without the associated application has been identified as a leading cause of file corruption, and has deterred some developers from even attempting to try to make alterations to the files. These documents are also stored in file formats that are typically proprietary. As such, each company that creates a file may utilize a different file format. Accessing the information that is contained within a proprietary format can be next to impossible. Reusing information between different applications can also be very difficult. Special code is usually required to be written to create reader and writer classes that can handle extracting and locating information within the proprietary file formats.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
An open file format is used to represent the features and data associated with a word processing application within a document. The open file format is directed at simplifying the way a word processing application organizes document features and data, and presents a logical model that is easily accessible. A document structured according to the open file format is designed such that it is made up of a collection of modular parts that are stored within a container. The modular parts are logically separate but are associated with one another by one or more relationships. Each of the modular parts is capable of being interrogated separately regardless of whether or not the application that created the document is running. Each modular part is capable of having information extracted from it and copied into another document and reused. Information may also be changed, added, and deleted from each of the modular parts. Common data, such as strings, functions, etc., may be stored in their own modular part such that the document does not contain excessive amounts of redundant data. Additionally, code, personal information, comments, as well as any other determined information might be stored in a separate modular part such that the information may be easily parsed and/or removed from the document.
The open file formats not only work with document files, but also work with templates. The improved schema supports features that work in templates. For example, such features may include auto text, the ability to have auto text as a collection of document fragments richly formatted inside of a template accessible for insertion into documents.
These and various other features, as well as other advantages, will be apparent from a reading of the following detailed description and a review of the associated drawings.
a-4c are block diagrams illustrating a document relationship hierarchy for various modular parts utilized in a file format for representing a word processing document; and
Referring now to the drawings, in which like numerals represent like elements, various aspects will be described herein. In particular,
Generally, program modules include routines, programs, operations, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types. Moreover, other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like may be used. A distributed computing environment where tasks are performed by remote processing devices that are linked through a communications network may also be utilized. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
Referring now to
The mass storage device 14 is connected to the CPU 5 through a mass storage controller (not shown) connected to the bus 12. The mass storage device 14 and its associated computer-readable media provide non-volatile storage for the computer 100. Although the description of computer-readable media contained herein refers to a mass storage device, such as a hard disk or CD-ROM drive, the computer-readable media can be any available media that can be accessed by the computer 100.
By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVJS”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer 100.
The computer 100 may operate in a networked environment using logical connections to remote computers through a network 18, such as the Internet. The computer 100 may connect to the network 18 through a network interface unit 20 connected to the bus 12. The network interface unit 20 may also be utilized to connect to other types of networks and remote computer systems. The computer 100 may also include an input/output controller 22 for receiving and processing input from a number of other devices, including a keyboard, mouse, or electronic stylus (not shown). Similarly, an input/output controller 22 may provide output to a display screen, a printer, or other type of output device.
As mentioned briefly above, a number of program modules and data files may be stored in the mass storage device 14 and RAM 9 of the computer 100, including an operating system 16 suitable for controlling the operation of a networked personal computer, such as the WINDOWS XP operating system from MICROSOFT CORPORATION of Redmond, Wash. The mass storage device 14 and RAM 9 may also store one or more program modules. In particular, the mass storage device 14 and the RAM 9 may store a word processor application program 10. The word processor application program 10 is operative to provide functionality for the creation and structure of a word processor document, such as a document 27, in an open file format 24. According to one embodiment, the word processor application program 10 and other application programs 26 comprise the OFFICE suite of application programs from MICROSOFT CORPORATION including the WORD, EXCEL, and POWERPOINT application programs.
The open file format 24 simplifies and clarifies the organization of document features and data. The word processor program 10 organizes the ‘parts’ of a document (styles, strings, document properties, application properties, custom properties, functions, and the like) into logical, separate pieces, and then expresses relationships among the separate parts. These relationships, and the logical separation of ‘parts’ of a document, make up a file organization that can be easily accessed without having to understand a proprietary format.
The open file format 24 may be formatted according to extensible markup language (“XML”). XML is a standard format for communicating data. In the XML data format, a schema is used to provide XML data with a set of grammatical and data type rules governing the types and structure of data that may be communicated. The modular parts may also be included within a container. According to one embodiment, the modular parts are stored in a container according to the ZIP format. Additionally, since the open file format 24 is expressed as XML, formulas within a word processor document are represented as standard text making them easy to locate as well as modify.
Documents that follow the open file format 24 are programmatically accessible both while the word processor program 10 is running and not running. This enables a significant number of new uses that were simply too hard for previous file formats to accomplish. For instance, a server-side program is able to create a document based on input from a user or some other source. With the industry standard XML at the core of the open file format, exchanging data between applications created by different businesses is greatly simplified. Without requiring access to the application that created the document, solutions can alter information inside a document or create a document entirely from scratch by using standard tools and technologies capable of manipulating XML. The open file format has been designed to be more robust than the binary formats, and, therefore, reduces the risk of lost information due to damaged or corrupted files. Even documents created or altered outside of the creating application are less likely to corrupt, as programs that open the files may be configured to verify the parts of the document.
The openness of the open file format also translates to more secure and transparent files. Documents can be shared confidently because personally identifiable information and business sensitive information, such as user names, comments and file paths, can be easily identified and removed from the document. Similarly, files containing content, such as OLE objects or Visual Basic® for Applications (VBA) code can be identified for special processing.
Each modular part (210-290) is enclosed by container 205. According to one embodiment, the container is a ZIP container. The combination of XML with ZIP compression allows for a very robust and modular format that enables a large number of new scenarios. Each file may be composed of a collection of any number of parts that defines the document. Most of the modular parts making up the document are XML files that describe application data, metadata, and even customer data stored inside the container 205. Other non-XML parts may also be included within the container, and include such parts as binary files representing images or OLE objects embedded in the document. Parts of the document specify a relationship to other parts (See
There are many elements that go into creating a word processor document. Some of the parts may be commonly shared across applications, such as document properties, styles, charts, hyperlinks, comments, annotations, and the like. Other parts, however, may be specific to each application.
When users save or create a document, a single file is written to storage within container 205. The container 205 may then easily be opened by any application that can process XML. By wrapping the individual parts of a file in a container 205, each document remains a single file instance. Once a container 205 has been opened, developers can manipulate any of the modular parts (210-290) that are found within the container 205 that define the document. For instance, a developer can open a word processor document container that uses the open file format, locate the XML part that represents a particular portion of the word processor document, such as sheet 1, alter the part corresponding to document 1 (290) by using any technology capable of editing XML, and return the XML part to the container package 205 to create an updated word processor document. This scenario is only one of the essentially countless others that will be possible as a result of open format.
The modularity of the parts making up the document enables a developer to quickly locate a specific part of the file and work directly with just that part. The individual parts can be edited, exchanged, or even removed depending on the desired outcome of a specific business need. The modular parts can be of different physical content types. According to one embodiment, the parts used to describe program data are stored as XML. These parts conform to the XML reference schema(s) (220, 230) that defines the associated feature or object. For example, in a word processor file, the data that represents a word processor document header is found in an XML part that adheres to the schema for a Word Processor Document.
The schemas that represent parts of documents are fully documented and made available such that other applications may use them. Then, by using any standard XML based technologies, developers can apply their knowledge of the schemas to easily parse and create a document that is associated with a specific application. For example, a word processor document could be created for MICROSOFT WORD without having to use MICROSOFT WORD to open the document. Although the schemas included as part of this application are quite extensive, in order to fully represent the rich feature sets that the MICROSOFT WORD and OFFICE programs provide, all structures defined by the format are not required to generate a document. Applications are quite capable of opening the file with a minimal amount of items defined, thereby making it easy to create many documents. The XML reference schemas govern display-oriented attributes and document formatting, while customer-defined schemas define data-oriented structures that represent the business information stored within the document, and can be unique to a particular business or industry.
In some instances, it is advantageous to have the modular parts stored in their native content type. For example, images may be stored as binary files (.png, .jpg, and so on) within the container 205. Therefore, the container 205 may be opened by using a ZIP utility and the image may then be immediately viewed, edited, or replaced in its native format. Not only is this storage approach more accessible, but it requires less internal processing and disk space than storing an image as encoded XML. Other example parts that may be stored natively as binary parts include VBA projects and embedded OLE objects. Obviously, many other parts may also be stored natively. For developers, accessibility makes many scenarios more attractive. For instance, a developer could implement a solution that iterates a collection of word processor documents to update an embedded spreadsheet with an updated value/string/function.
Security is very important today in information technology. The open file format allows developers to be more confident about working with documents and delivering solutions that take document security into full account. With the open file format, developers can build solutions that search for and remove any identified, potential vulnerabilities, such as embedded code/macros 240 before they cause issues.
For example, assume a company needs a solution to prepare documents either for storage in an archive library where they would never need to run custom code, or for sending macro-free documents to a customer. An application could be written that removes all VBA code from a body of documents by iterating through the documents and removing the [VBAProject.bin] part and its corresponding relationship. The result would be a collection of higher-quality documents. Other code that is a security risk may also be removed. Code that is included within documents, however, is not the only potential security threat. Developers can circumvent potential risks from binaries, such as OLE objects or even images, by interrogating the documents and removing any exposures that arise. For example, if a specific OLE object is identified as a known issue, a program could be created to locate and cleanse or quarantine any documents containing the object. Likewise, any external references being made from a document can be readily identified. This identification allows solution developers to decide if external resources being referenced from a document are trustworthy or require corrective action.
As programs seek to protect users from malicious content, developers can also help protect users from accidentally sharing data inappropriately. This protection might be in the form of personally identifiable information 270 stored within a document, or comments and annotations that information so marked shouldn't leave the department or organization. Developers can programmatically remove both types of information directly without having to parse an entire document. To remove document comments, for example, a developer can check for the existence of a comment part relationship and, if found, remove the associated comment part.
Besides securing the personal information and comments, the open file format enables access to this information that may be useful in other ways. A developer may create a solution that uses the personal information 270 to return a list of documents authored by an individual person or from a specific organization. This list can be produced without having to open an application or use its object model with the open file format. Similarly, an application could loop through a folder or volume of documents and aggregate all of the comments within the documents. Additional criteria could be applied to qualify the comments and help users better manage the collaboration process as they create documents. This transparency helps increase the trustworthiness of documents and document-related processes by allowing programs or users to verify the contents of a document without opening the file. The open file format enables users or applications to see and identify the various parts of a file and to choose whether to load specific components. For example, a user can choose to load macro-code independently from document content and other file components. In particular, the ability to identify and handle embedded code 240 supports compliance management and helps reduce security concerns around malicious document code.
Likewise, personally identifiable or business-sensitive information (270) (for example, comments, deletions, user names, file paths, and other document metadata) can be clearly identified and separated from the document data. As a result, organizations can more effectively enforce policies or best practices related to security, privacy, and document management, and they can exchange documents more confidently.
Whereas the parts are the individual elements that make up a document, the relationships are the method used to specify how the collection of parts comes together to form the actual document. The relationships are defined by using XML, which specifies the connection between a source part and a target resource. For example, the connection between a word processor document and a style that appears in that word processor document is identified by a relationship. The relationships are stored within XML parts or “relationship parts” in the document container 300. If a source part has multiple relationships, all subsequent relationships are listed in same XML relationship part. Each part within the container is referenced by at least one relationship. The implementation of relationships makes it possible for the parts never to directly reference other parts, and connections between the parts are directly discoverable without having to look within the content. Within the parts, the references to relationships are represented using a Relationship ID, which allows all connections between parts to stay independent of content-specific schema.
The following is an example of a relationship part in a document containing a header and an image:
The relationships may represent not only internal document references but also external resources. For example, if a document contains linked pictures or objects, these are represented using relationships as well. This makes links in a document to external sources easy to locate, inspect and alter. It also offers developers the opportunity to repair broken external links, validate unfamiliar sources or remove potentially harmful links.
The use of relationships in the open file format benefits developers in a number of ways. Relationships simplify the process of locating content within a document. The documents parts don't need to be parsed to locate content whether it is internal or external document resources. Relationships also allow a user to quickly take inventory of all the content within a document. For example, if the number of footnotes in a word processor document need to be counted, the relationships could be inspected to determine how many sheet parts exist within the container. The relationships may also be used to examine the type of content in a document. This is helpful in instances where there is a need to identify if a document contains a particular type of content that may be harmful, such as an OLE object that is suspect, or helpful, as in a scenario where there is a desire to extract all JPEG images from a document for re-use elsewhere. Additionally, relationships allow developers to manipulate documents without having to learn application specific syntax or content markup. For example, without any knowledge of how to program a word processor application, a developer solution could easily remove a footnote by editing the document's relationships.
According to one embodiment, documents saved in the open file format are considered to be macro-free files and therefore do not contain code. This behavior helps to ensure that malicious code residing in a default document can never be unexpectedly executed. While documents can still contain and use macros, the user or developer specifically saves these documents as a macro-enabled document type. This safeguard does not affect a developer's ability to build solutions, but allows organizations to use documents with more confidence.
Macro-enabled files have the same file format as macro-free files, but contain additional parts that macro-free files do not. The additional parts depend on the type of automation found in the document. A macro-enabled file that uses VBA contains a binary part that stores the VBA project. Any word processor document that utilizes macros that are considered safe, such as XLM macros they may be saved as macro-enabled files. If a code-specific part is found in a macro-free file, whether placed there accidentally or maliciously, an application may be configured to not allow the code to execute.
Since any code that is associated with a document is stored as a modular part, developers can now determine if any code exists within a document before opening it. Previously this advance notice wasn't something that could be easily accomplished. Now the developer can inspect the container for the existence of any code-based parts and relationships without running the corresponding application and potentially risky code. If a file looks suspicious, a developer can remove any parts capable of executing code from the file.
Documents saved by using the open file format may be identified by their file extensions. According to one embodiment, the extensions borrow from existing binary file extensions by appending a letter to the end of the suffix. The default extensions for documents created in MICROSOFT WORD, EXCEL, and POWERPOINT using the open file format append the letter “x” to the file extension resulting in .docx, .xlsx, and .pptx, respectively. The file extensions may also indicate whether the file is macro-enabled versus those that are macro-free. Documents that are macro-enabled have a file extension that ends with the letter “m” instead of an “x.” For example, a macro-enabled word processor document has a .docx extension, and thereby allows any users or software program, before a document opens, to immediately identify that it might contain code.
As discussed above, most parts of a document within a container can be manipulated using any standard XML processing techniques, or for the modular parts of the document that exist as embedded native formats, such as images, they may be processed using any appropriate tool for that object type. Once inside an open document, the structure makes it easy to navigate a document's parts and its relationships, whether it is to locate information, change content, or remove elements from a document. Having the use of XML, along with the published reference schemas, means a user can easily create new documents, add data to existing documents, or search for specific content in a body of documents.
The following are exemplary scenarios in which the open file format enables document-based solutions. These are only a few of an almost endless list of possibilities: Data Interoperability; Content Manipulation; Content Sharing and Reuse; Document Assembly; Document Security; Managing Sensitive Information; Document Styling; and Document Profiling. The openness of the open file format unlocks data and introduces a broad, new level of integration beyond the desktop. For example, developers may refer to the published specification of the new file format to create data-rich documents without using the application that created the document. Server-side applications may process documents in bulk to enable large-scale solutions that mesh enterprise data within a familiar application. Standard XML protocols, such as XPath (a common XML query language) and XSLT (Extensible Stylesheet Language Transformations), can be used to retrieve data from documents or to update the contents inside of a document from external data.
One such scenario could involve personalizing thousands of documents to distribute to customers. Information programmatically extracted from an enterprise database or customer relationship management (CRM) application could be inserted into a standard document template by a server application that uses XML. Creating these documents is highly efficient because there is no requirement that the creating programs need to be run; yet the capability still exists for producing high-quality, rich documents.
The use of custom schemas in one or more applications is another way documents can be leveraged to share data. Information that was once locked in a binary format is now easily accessible and therefore, documents can serve as openly exchangeable data sources. Custom schemas not only make insertion or extraction of data simple, but they also add structure to documents and are capable of enforcing data validation.
Editing the contents of existing documents is another valuable example where the open file format enhances a process. The edit may involve updating small amounts of data, swapping entire parts, removing parts, or adding new parts altogether. By using relationships and parts, the open file format makes content easy to find and manipulate. The use of XML and XML schema means common XML technologies, such as XPath and XSLT, can be used to edit data within document parts in virtually endless ways.
One scenario might involve the need to edit text within many word processor documents. For example, what if a company merged and needed to update their new company name in hundreds of different pieces of documentation? A developer could write code that loops through all the documents, locates the company name, and performs an XPath query to find the old text. Then new text may then be inserted and the process repeated until every document had been updated. Automation could save a lot of time, enable a process that might otherwise not be attempted, as well as prevent potential errors that might occur during a manual process.
Another scenario might be one in which an existing document must be updated by changing only an entire part. In a word processor document, an entire spreadsheet or chart that contained old data or outdated calculation models could be replaced with a new one by simply overwriting its part. This kind of updating also applies to binary parts. An existing image or even an OLE object could be swapped out for a new one, as necessary. A drawing embedded as an OLE object in a document, for instance, could be updated by overwriting that binary part. URLs in hyperlinks could be updated to point to new locations.
In order to optimize loading and saving performance and file size, a word processor application may store only one copy of repetitive text within the word processor file. The word processor application may implement a shared table. The shared table may be stored in a document part such as “fontTable.xml.” Each unique font value found within a word processor document may then only be listed once in this part of the document. Individual document parts then reference the table to derive their values.
So while this process optimizes the word processor's XML file format, it also introduces some interesting opportunities for additional content manipulation solutions. Developers in a multinational organization could leverage a shared table to offer a level of multi-language support. Instead of building unique word processor documents for each language supported, a single word processor document could utilize tables that correspond to different languages. Another possibility would be to use tables to search for keyword terms inside a collection of word processor documents. Processing a single, text-only XML file of strings is faster and simpler than having to manipulate the word processor document object model over many word processor documents.
The modularity of the open file format opens up the possibility for generating content once and then repurposing it in a number of other documents. A number of core templates could be created and used as building blocks for other documents. One example scenario is building a repository of images used in documents. A developer can create a solution that extracts images out of a collection of documents and allow users to reuse them from a single access point. Since the documents may store the images in their native format, the solution could build and maintain a library of images without much difficulty. A developer could build a similar application that reuses document “thumbnail” images extracted from documents, and add a visual aspect to a document management process.
Many organizations have vast collections of files that have reusable value. Finding, coordinating, and integrating (copying and pasting) the content, however, is typically a time-consuming, redundant process that many organizations look to automate. As illustrated in
Like so many other aspects of documents using the open file format, document styles, formatting, and fonts are maintained in separate XML parts within the container package. Some organizations have very specific document standards, and managing these can be quite consuming. However, developers can, for example, modify or replace fonts in documents without opening the associated application.
Also, it is a fairly common practice to have a document or collection of documents that contain the same content, but that have been formatted differently by another department, location, subsidiary, targeted customer, or such. Developers can maintain the content within a single set of documents, and then apply a new set of styles, as necessary. To do this, they would exchange the styles part of the document found in a document with another part. This ability to exchange simplifies the process of controlling a document's presentation without having to manage content in numerous documents.
Managing documents effectively has been a long-standing issue in information technology practices. In the open file format, document properties are also readily accessible as they reside in their own part within a document as follows:
Organizations today cannot be confident that they will have access tomorrow to information locked in proprietary document formats, certainly if the program needed to properly display information in those documents is no longer available. Even for so-called “standards” based on proprietary page description languages (PDLs), the cumbersome presentation layer required by this information will make these formats difficult to sustain as an archival format.
Because the open file formats segment, store, and compress file components separately, they reduce the risk of corruption and improve the chances of recovering data from within damaged files. A cyclic redundancy check (CRC) error detection may be performed on each part within a document container to help ensure the part has not been corrupted. If one part has been corrupted, the remaining parts can still be used to open the remainder of the file. For example, a corrupt image or error in an embedded macro does not prevent users from opening the entire file, or from recovering the XML data and text-based information. Programs that utilize the open file format can easily deal with a missing or corrupt part by ignoring it and moving on to the next, so that any accessible data is salvaged. In addition, because the file formats are open and well documented, anyone can create tools for recovering parts that have been created improperly, for correcting XML parts that are not well formed, or for compensating when required elements are missing.
The open file format also addresses compatibility with both past file formats and future file formats that have not been anticipated. For example, a compatibility mode automatically restricts features and functionality that are unavailable in target versions help to ensure that users can exchange files seamlessly with other versions of an application or collaborate in mixed environments with no loss of fidelity or productivity.
Systems administrators may select the default file version type along with the default compatibility mode. Defaults can be set during installation or included in policies applied to specific users or specific roles. For example, organizations undertaking staged upgrades or staged rollouts might want to set a version 1 binary as the default “Save” option until all desktops have been upgraded.
The word processor document container 300 includes both user entered information as well as the feature and formatting information. Once the container 300 is opened and the desired file is accessed, there are a number of different ways to locate information. One way is by using an arbitrary schema for mapping data. A set of XML vocabularies defined within the schemas included herein fully define the features for the word processor document application.
Word processor documents, such as word processor document 310, may be created without ever launching the word processor application. For example, suppose that a customer of a Wall Street analyst company has access to information on certain companies. The customer accesses the analyst's website, logs on, and chooses to view the metrics for the evaluating a company in the automotive industry. The information returned could be streamed into a newly created word processor document that was never touched by the word processor application but which is now a word processor file, such that when the customer selects the file, the word processor application opens it up.
Storing too much information within the same modular part could potentially cause the performance of the word processor application to become very sluggish. According to one embodiment, common information is stored within its own part. Some examples include, common strings, functions, and name ranges.
The open file format is designed such that previous and future versions of an application may still work with a document. A future storage area is included within a part such that information that has not been thought of yet may be included within a document. In this way, a future version of the word processor application could access information within the future storage area, whereas a current version of the word processor application does not. The future storage area resides in the schema, and the schema allows any kind of content to be in there. In this way, previous versions of an application may still appear to work without corrupting the values for the future versions.
Many characters that may be used within a word processor application are not allowed in XML. If these characters are allowed to remain as it, the XML standard would be violated. Therefore, these special characters are encoded such that they may be saved out validly by XML (e.g. /X . . . or some kind of hex based encoding). When the encoded character is encountered it may be detected and loaded appropriately.
Referring now to
The various modular parts or components of the word processor document hierarchy are logically separate but are associated by one or more relationships. Each modular part is also associated with a relationship type and is capable of being interrogated separately and understood with or without the word processor application program 10 and/or with or without other modular parts being interrogated and/or understood. Thus, for example, it is easier to locate the contents of a document because instead of searching through all the binary records for document information, code can be written to easily inspect the relationships in a document and find the document parts effectively ignoring the other features and data in the open file format. Thus, the code is written to step through the document in a much simpler fashion than previous interrogation code. Therefore, an action such as removing all the code, personal information, and the like, while tedious in the past, is now less complicated.
A modular content framework may include a file format container associated with the modular parts. The modular parts include, the document part 420 operative as a guide for properties of the word processor document. The document hierarchy may also include a document properties part 417 containing built-in properties associated with the file format 24, a application part 405 containing core document properties associated with the file format 24, and a hyperlink part 419 facilitating a relationship with an external target part. It should be appreciated that each modular part is capable of being extracted from or copied from the document and reused in a different document along with associated modular parts identified by traversing relationships of the modular part reused. Associated modular parts are identified when the word processor application 10 traverses inbound and outbound relationships of the modular part reused.
Aside from the use of relationships in tying parts together, there is also a single part in every file that describes the content types for each modular part. This gives a predictable place to query to find out what type of content is inside the file. While the relationship type describes how the parent part will use the target part, the content or part type 421 describes what the actual modular part is (such as “XML”) regarding content format. This assists both with finding content that is understood, as well as making it easier to quickly remove content that could be considered unwanted (for security reasons, etc.). The key to this is that the word processor application must enforce that the declared content types are indeed correct. If the declared content types are not correct and do not match the actual content type or format of the modular part, the word processor application should fail to open the modular part or file. Otherwise potentially malicious content could be opened. A comments part 420 may also be included.
Referring to
Referring to
Referring now to
Each modular part is capable of being interrogated separately without other modular parts being interrogated and understood. According to one embodiment, any modular part to be shared between other modular parts is written only once. The routine 500 then continues to operation 540. At operation 540, the application 10 establishes relationships between newly written and previously written modular parts. The routine 500 then terminates at the end operation.
When at detect operation 620, the data examined has been written to a modular part, the routine 600 continues from detect operation 620 to detect operation 640. At detect operation 640 a determination is made as to whether all the data has been examined. If all the data has been examined, the routine 600 returns control to other operations at return operation 660. When there is still more data to examine, the routine 600 continues from detect operation 640 to operation 650 where the word processor application points to other data. The routine 600 then returns to operation 610 described above.
The above specification, examples and data provide a complete description of the manufacture and use of the composition of the invention. Since many embodiments of the invention can be made without departing from the spirit and scope of the invention, the invention resides in the claims hereinafter appended.
This utility patent application claims the benefit under 35 United States Code § 119(e) of U.S. Provisional Patent Application No. 60/687,261 filed on Jun. 3, 2005, U.S. Provisional Patent Application No. 60/716,805 filed on Sep. 13, 2005, and is a continuation in part of U.S. patent application Ser. No. 11/018,718 filed on Dec. 20, 2004 all of which are hereby incorporated by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
4410286 | Ko et al. | Oct 1983 | A |
4594674 | Boulia et al. | Jun 1986 | A |
4649513 | Martin et al. | Mar 1987 | A |
4870611 | Martin et al. | Sep 1989 | A |
5222205 | Larson et al. | Jun 1993 | A |
5267155 | Buchanan et al. | Nov 1993 | A |
5469533 | Dennis | Nov 1995 | A |
5487138 | Rust et al. | Jan 1996 | A |
5537526 | Anderson et al. | Jul 1996 | A |
5579466 | Habib et al. | Nov 1996 | A |
5579519 | Pelletier | Nov 1996 | A |
5613124 | Atkinson et al. | Mar 1997 | A |
5655130 | Dodge et al. | Aug 1997 | A |
5675788 | Husick et al. | Oct 1997 | A |
5701342 | Anderson et al. | Dec 1997 | A |
5745910 | Piersol et al. | Apr 1998 | A |
5752055 | Redpath et al. | May 1998 | A |
5752056 | Celik | May 1998 | A |
5819295 | Nakagawa et al. | Oct 1998 | A |
5845058 | Shaw et al. | Dec 1998 | A |
5893109 | DeRose et al. | Apr 1999 | A |
5903903 | Kennedy | May 1999 | A |
5903905 | Anderson et al. | May 1999 | A |
5905504 | Barkans et al. | May 1999 | A |
5911776 | Guck | Jun 1999 | A |
5950215 | Tabuchi | Sep 1999 | A |
5960168 | Shaw et al. | Sep 1999 | A |
5993088 | Nogay et al. | Nov 1999 | A |
6023714 | Hill et al. | Feb 2000 | A |
6026416 | Kanerva et al. | Feb 2000 | A |
6067531 | Hoyt et al. | May 2000 | A |
6094665 | Lyons et al. | Jul 2000 | A |
6134552 | Fritz et al. | Oct 2000 | A |
6144974 | Gartland | Nov 2000 | A |
6175845 | Smith et al. | Jan 2001 | B1 |
6182080 | Clements | Jan 2001 | B1 |
6182096 | Mastie et al. | Jan 2001 | B1 |
6199082 | Ferrel et al. | Mar 2001 | B1 |
6212530 | Kadlec | Apr 2001 | B1 |
6247018 | Rheaume | Jun 2001 | B1 |
6247066 | Tanaka | Jun 2001 | B1 |
6269403 | Anders et al. | Jul 2001 | B1 |
6342904 | Vasudevan et al. | Jan 2002 | B1 |
6362870 | Mui et al. | Mar 2002 | B2 |
6393441 | Kanerva et al. | May 2002 | B1 |
6407821 | Hohensee et al. | Jun 2002 | B1 |
6418448 | Sarkar | Jul 2002 | B1 |
6449653 | Klemets et al. | Sep 2002 | B2 |
6457017 | Watkins et al. | Sep 2002 | B2 |
6480206 | Prinzing | Nov 2002 | B2 |
6484189 | Gerlach et al. | Nov 2002 | B1 |
6496206 | Mernyk et al. | Dec 2002 | B1 |
6507856 | Chen et al. | Jan 2003 | B1 |
6509974 | Hansen | Jan 2003 | B1 |
6538760 | deBry et al. | Mar 2003 | B1 |
6549918 | Probert, Jr. et al. | Apr 2003 | B1 |
6583789 | Carlson et al. | Jun 2003 | B1 |
6591278 | Ernst | Jul 2003 | B1 |
6604144 | Anders | Aug 2003 | B1 |
6608693 | Loyd et al. | Aug 2003 | B1 |
6609200 | Anderson et al. | Aug 2003 | B2 |
6654737 | Nunez | Nov 2003 | B1 |
6657647 | Bright | Dec 2003 | B1 |
6658477 | Lisitsa et al. | Dec 2003 | B1 |
6674540 | Wiechers et al. | Jan 2004 | B1 |
6675353 | Friedman | Jan 2004 | B1 |
6675356 | Adler et al. | Jan 2004 | B1 |
6681223 | Sundaresan | Jan 2004 | B1 |
6694485 | Kelley et al. | Feb 2004 | B1 |
6715126 | Chang et al. | Mar 2004 | B1 |
6763343 | Brooke et al. | Jul 2004 | B1 |
6771291 | DiStefano, III | Aug 2004 | B1 |
6781609 | Barker et al. | Aug 2004 | B1 |
6785673 | Fernandez | Aug 2004 | B1 |
6789229 | Dunietz et al. | Sep 2004 | B1 |
6812941 | Brown et al. | Nov 2004 | B1 |
6871321 | Wakayama | Mar 2005 | B2 |
6910843 | Saw et al. | Jun 2005 | B2 |
6912555 | Lemon et al. | Jun 2005 | B2 |
6918082 | Gross et al. | Jul 2005 | B1 |
6925597 | Anwar | Aug 2005 | B2 |
6925631 | Golden | Aug 2005 | B2 |
6931590 | Kanie et al. | Aug 2005 | B2 |
6938203 | Dimarco et al. | Aug 2005 | B1 |
6941510 | Ozzie et al. | Sep 2005 | B1 |
6952801 | Warmus et al. | Oct 2005 | B2 |
6961902 | Anecki et al. | Nov 2005 | B2 |
6981207 | Bakman et al. | Dec 2005 | B1 |
6993527 | Raman et al. | Jan 2006 | B1 |
7036076 | Anwar | Apr 2006 | B2 |
7051276 | Mogilevsky et al. | May 2006 | B1 |
7054841 | Tenorio | May 2006 | B1 |
7080083 | Kim et al. | Jul 2006 | B2 |
7134071 | Ohwada et al. | Nov 2006 | B2 |
7168035 | Bell et al. | Jan 2007 | B1 |
7171618 | Harrington et al. | Jan 2007 | B2 |
7290205 | Monocsko et al. | Oct 2007 | B2 |
7301544 | Yuan | Nov 2007 | B2 |
7412649 | Emek et al. | Aug 2008 | B2 |
7418652 | Ornstein et al. | Aug 2008 | B2 |
7487448 | Emerson et al. | Feb 2009 | B2 |
7549118 | Shur et al. | Jun 2009 | B2 |
20010003828 | Peterson et al. | Jun 2001 | A1 |
20010013043 | Wagner | Aug 2001 | A1 |
20010016842 | Umen et al. | Aug 2001 | A1 |
20010018697 | Kunitake et al. | Aug 2001 | A1 |
20010034739 | Anecki et al. | Oct 2001 | A1 |
20010039552 | Killi et al. | Nov 2001 | A1 |
20010044809 | Parasnis et al. | Nov 2001 | A1 |
20010044813 | Frank | Nov 2001 | A1 |
20010051962 | Piotkin | Dec 2001 | A1 |
20010054042 | Watkins et al. | Dec 2001 | A1 |
20020004805 | Nojima et al. | Jan 2002 | A1 |
20020016800 | Spivak et al. | Feb 2002 | A1 |
20020038348 | Malone et al. | Mar 2002 | A1 |
20020049790 | Ricker et al. | Apr 2002 | A1 |
20020059265 | Valorose | May 2002 | A1 |
20020059337 | Takaoka et al. | May 2002 | A1 |
20020065848 | Walker et al. | May 2002 | A1 |
20020065857 | Michalewicz | May 2002 | A1 |
20020073236 | Helgeson et al. | Jun 2002 | A1 |
20020087602 | Masuda et al. | Jul 2002 | A1 |
20020099797 | Merrell et al. | Jul 2002 | A1 |
20020103835 | Kearney | Aug 2002 | A1 |
20020107886 | Gentner et al. | Aug 2002 | A1 |
20020111133 | Wittkotter | Aug 2002 | A1 |
20020116421 | Fox et al. | Aug 2002 | A1 |
20020120647 | Amano | Aug 2002 | A1 |
20020129058 | Story et al. | Sep 2002 | A1 |
20020174145 | Duga et al. | Nov 2002 | A1 |
20020184263 | Perinet et al. | Dec 2002 | A1 |
20020188638 | Hamscher | Dec 2002 | A1 |
20020194220 | Sluiman | Dec 2002 | A1 |
20030004957 | Broman et al. | Jan 2003 | A1 |
20030023637 | Halahmi | Jan 2003 | A1 |
20030028560 | Kudrolli et al. | Feb 2003 | A1 |
20030033287 | Shanahan et al. | Feb 2003 | A1 |
20030065946 | Holliday et al. | Apr 2003 | A1 |
20030074633 | Boulmakoul et al. | Apr 2003 | A1 |
20030079181 | Schumacher et al. | Apr 2003 | A1 |
20030093520 | Beesley | May 2003 | A1 |
20030115547 | Ohwada et al. | Jun 2003 | A1 |
20030120671 | Kim et al. | Jun 2003 | A1 |
20030126136 | Omoigui | Jul 2003 | A1 |
20030126260 | Husain et al. | Jul 2003 | A1 |
20030137539 | Dees | Jul 2003 | A1 |
20030137691 | Tanaka | Jul 2003 | A1 |
20030142128 | Reulein et al. | Jul 2003 | A1 |
20030145134 | Wehage et al. | Jul 2003 | A1 |
20030149934 | Worden | Aug 2003 | A1 |
20030149935 | Takizawa et al. | Aug 2003 | A1 |
20030158851 | Britton et al. | Aug 2003 | A1 |
20030163552 | Savitzky et al. | Aug 2003 | A1 |
20030167446 | Thomas | Sep 2003 | A1 |
20030172168 | Mak et al. | Sep 2003 | A1 |
20030172343 | Leymaster et al. | Sep 2003 | A1 |
20030177446 | Gropper et al. | Sep 2003 | A1 |
20030177449 | Rose | Sep 2003 | A1 |
20030182450 | Ong et al. | Sep 2003 | A1 |
20030182656 | Leathers et al. | Sep 2003 | A1 |
20030195784 | Smith | Oct 2003 | A1 |
20030196176 | Abu-Ghazalah et al. | Oct 2003 | A1 |
20030221167 | Goldstein et al. | Nov 2003 | A1 |
20030222890 | Salesin et al. | Dec 2003 | A1 |
20030229845 | Salesin et al. | Dec 2003 | A1 |
20030233420 | Stark et al. | Dec 2003 | A1 |
20030237048 | Jones et al. | Dec 2003 | A1 |
20030237049 | Sawicki et al. | Dec 2003 | A1 |
20040003342 | Liao et al. | Jan 2004 | A1 |
20040003343 | Liao et al. | Jan 2004 | A1 |
20040003388 | Jacquemot et al. | Jan 2004 | A1 |
20040015782 | Day et al. | Jan 2004 | A1 |
20040015890 | Wong et al. | Jan 2004 | A1 |
20040015908 | Giel et al. | Jan 2004 | A1 |
20040019853 | Takizawa et al. | Jan 2004 | A1 |
20040030711 | Roudot | Feb 2004 | A1 |
20040030987 | Manelli | Feb 2004 | A1 |
20040034848 | Moore et al. | Feb 2004 | A1 |
20040049737 | Simon et al. | Mar 2004 | A1 |
20040054669 | Seyrat et al. | Mar 2004 | A1 |
20040054697 | Brandenberger | Mar 2004 | A1 |
20040066527 | Kloosterman et al. | Apr 2004 | A1 |
20040078755 | Shinjo et al. | Apr 2004 | A1 |
20040088332 | Lee et al. | May 2004 | A1 |
20040103073 | Blake et al. | May 2004 | A1 |
20040117733 | Moreau et al. | Jun 2004 | A1 |
20040128535 | Cheng | Jul 2004 | A1 |
20040128623 | Hudson | Jul 2004 | A1 |
20040139049 | Hancock et al. | Jul 2004 | A1 |
20040148278 | Milo et al. | Jul 2004 | A1 |
20040148567 | Jeon et al. | Jul 2004 | A1 |
20040153467 | Conover et al. | Aug 2004 | A1 |
20040172584 | Jones et al. | Sep 2004 | A1 |
20040172592 | Collie et al. | Sep 2004 | A1 |
20040181753 | Michaelides | Sep 2004 | A1 |
20040183837 | Watanabe et al. | Sep 2004 | A1 |
20040194025 | Hubert et al. | Sep 2004 | A1 |
20040205533 | Lopata et al. | Oct 2004 | A1 |
20040205539 | Mak et al. | Oct 2004 | A1 |
20040205580 | De Angelis et al. | Oct 2004 | A1 |
20040205623 | Weil et al. | Oct 2004 | A1 |
20040205653 | Hadfield et al. | Oct 2004 | A1 |
20040205656 | Reulein et al. | Oct 2004 | A1 |
20040216048 | Brown et al. | Oct 2004 | A1 |
20040221233 | Thielen | Nov 2004 | A1 |
20040226012 | Awada et al. | Nov 2004 | A1 |
20040230894 | Elza et al. | Nov 2004 | A1 |
20040243551 | Boone et al. | Dec 2004 | A1 |
20040267553 | Brunton | Dec 2004 | A1 |
20040268304 | Kuo et al. | Dec 2004 | A1 |
20050005233 | Kays et al. | Jan 2005 | A1 |
20050022113 | Hanlon | Jan 2005 | A1 |
20050063010 | Giannetti | Mar 2005 | A1 |
20050066335 | Aarts | Mar 2005 | A1 |
20050071385 | Rao | Mar 2005 | A1 |
20050071755 | Harrington et al. | Mar 2005 | A1 |
20050091574 | Maaniitty et al. | Apr 2005 | A1 |
20050091575 | Relyea et al. | Apr 2005 | A1 |
20050099398 | Garside et al. | May 2005 | A1 |
20050105116 | Kobashi | May 2005 | A1 |
20050108001 | Aarskog | May 2005 | A1 |
20050108212 | Karimisetty et al. | May 2005 | A1 |
20050108278 | Jones et al. | May 2005 | A1 |
20050120061 | Kraft | Jun 2005 | A1 |
20050125720 | Little et al. | Jun 2005 | A1 |
20050125728 | Peiro et al. | Jun 2005 | A1 |
20050132279 | Relyea et al. | Jun 2005 | A1 |
20050144556 | Petersen et al. | Jun 2005 | A1 |
20050177784 | Andrews et al. | Aug 2005 | A1 |
20050192813 | Richard | Sep 2005 | A1 |
20050198561 | McAuley | Sep 2005 | A1 |
20050204016 | McAuley | Sep 2005 | A1 |
20050210026 | Wood | Sep 2005 | A1 |
20050223312 | Erdtmann et al. | Oct 2005 | A1 |
20050246724 | Foehr et al. | Nov 2005 | A1 |
20050248790 | Ornstein et al. | Nov 2005 | A1 |
20050249536 | Sedky et al. | Nov 2005 | A1 |
20050251739 | Shur et al. | Nov 2005 | A1 |
20050251740 | Shur et al. | Nov 2005 | A1 |
20050251742 | Mogilevsky et al. | Nov 2005 | A1 |
20050268221 | Shur et al. | Dec 2005 | A1 |
20050278616 | Eller | Dec 2005 | A1 |
20050278626 | Malik | Dec 2005 | A1 |
20060010371 | Shur et al. | Jan 2006 | A1 |
20060025091 | Buford | Feb 2006 | A1 |
20060026585 | Haselden et al. | Feb 2006 | A1 |
20060031749 | Schramm et al. | Feb 2006 | A1 |
20060031758 | Shur et al. | Feb 2006 | A1 |
20060041838 | Khan | Feb 2006 | A1 |
20060047743 | Yuan et al. | Mar 2006 | A1 |
20060056334 | Yuan et al. | Mar 2006 | A1 |
20060080314 | Hurbert et al. | Apr 2006 | A1 |
20060080316 | Gilmore et al. | Apr 2006 | A1 |
20060080603 | Bailey et al. | Apr 2006 | A1 |
20060095834 | Jeon et al. | May 2006 | A1 |
20060117019 | Sylthe et al. | Jun 2006 | A1 |
20060136809 | Fernstrom | Jun 2006 | A1 |
20060155529 | Ludviksson et al. | Jul 2006 | A1 |
20060168562 | Emek et al. | Jul 2006 | A1 |
20060206794 | Ornstein et al. | Sep 2006 | A1 |
20060227150 | Yuan | Oct 2006 | A1 |
20070061384 | Harrington et al. | Mar 2007 | A1 |
20070136443 | Sah et al. | Jun 2007 | A1 |
20070136662 | Khaba | Jun 2007 | A1 |
Number | Date | Country |
---|---|---|
1 376 387 | Jan 2004 | EP |
1 452 966 | Nov 2004 | EP |
1672543 | Nov 2005 | EP |
1672528 | Dec 2005 | EP |
WO 9901802 | Jan 1999 | WO |
WO 0144932 | Jun 2001 | WO |
WO 0180044 | Oct 2001 | WO |
WO 0221339 | Mar 2002 | WO |
WO 03009517 | Jan 2003 | WO |
WO 03021537 | Mar 2003 | WO |
WO 2006133053 | Dec 2006 | WO |
200509350 | Apr 2008 | ZA |
Number | Date | Country | |
---|---|---|---|
20060190815 A1 | Aug 2006 | US |
Number | Date | Country | |
---|---|---|---|
60687261 | Jun 2005 | US | |
60716805 | Sep 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11018718 | Dec 2004 | US |
Child | 11398339 | US |