FLEXIBLE AUTHENTICATION FRAMEWORK
First Claim
1. A method for building and using a secure index to service queries for a plurality of secure data stores, the method comprising:
- crawling, by a computer system, the plurality of secure data stores residing on a plurality of different computer systems;
generating, by the computer system, an index of a plurality of documents from across the plurality of data stores, wherein each of the plurality of documents is associated with one or more security requirements from a corresponding one of the plurality of data stores;
storing, by the computer system, in the index, for each document in the plurality of documents, the corresponding one or more security requirements;
receiving, by the computer system, a query from a client device;
in response to receiving the query, obtaining, by the computer system, security information for a user of the client device;
selecting, by the computer system, each document in the index that is responsive to the query and where the corresponding one or more security requirements are satisfied by the security information of the user; and
transmitting, by the computer system, links to each selected document in the index as a result set to the client device to service the query from the client device.
1 Assignment
0 Petitions
Accused Products
Abstract
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be received at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries.
-
Citations
20 Claims
-
1. A method for building and using a secure index to service queries for a plurality of secure data stores, the method comprising:
-
crawling, by a computer system, the plurality of secure data stores residing on a plurality of different computer systems; generating, by the computer system, an index of a plurality of documents from across the plurality of data stores, wherein each of the plurality of documents is associated with one or more security requirements from a corresponding one of the plurality of data stores; storing, by the computer system, in the index, for each document in the plurality of documents, the corresponding one or more security requirements; receiving, by the computer system, a query from a client device; in response to receiving the query, obtaining, by the computer system, security information for a user of the client device; selecting, by the computer system, each document in the index that is responsive to the query and where the corresponding one or more security requirements are satisfied by the security information of the user; and transmitting, by the computer system, links to each selected document in the index as a result set to the client device to service the query from the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable storage medium comprising instructions that, when executed by one or more processors, cause the one or more processors to build and use a secure index to service queries for a plurality of secure data stores by performing operations comprising:
-
crawling the plurality of secure data stores residing on a plurality of different computer systems; generating an index of a plurality of documents from across the plurality of data stores, wherein each of the plurality of documents is associated with one or more security requirements from a corresponding one of the plurality of data stores; storing, in the index, for each document in the plurality of documents, the corresponding one or more security requirements; receiving a query from a client device; in response to receiving the query, obtaining security information for a user of the client device; selecting each document in the index that is responsive to the query and where the corresponding one or more security requirements are satisfied by the security information of the user; and transmitting links to each selected document in the index as a result set to the client device to service the query from the client device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
one or more hardware processors; and one or more memory devices comprising instructions that, when executed by the one or more processors, cause the one or more processors to build and use a secure index to service queries for a plurality of secure data stores by configuring the one or more processors to; crawl the plurality of secure data stores residing on a plurality of different computer systems; generate an index of a plurality of documents from across the plurality of data stores, wherein each of the plurality of documents is associated with one or more security requirements from a corresponding one of the plurality of data stores; store, in the index, for each document in the plurality of documents, the corresponding one or more security requirements; receive a query from a client device; in response to receiving the query, obtain security information for a user of the client device; select each document in the index that is responsive to the query and where the corresponding one or more security requirements are satisfied by the security information of the user; and transmit links to each selected document in the index as a result set to the client device to service the query from the client device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification