Self-service sources for secure search
First Claim
1. A computer-implemented method of providing user-subscribed sources for secure search, comprising:
- providing to a user a template for crawling a source, the template defining a location of and crawl settings for a target data repository source, the template not having specified security credentials for the source;
allowing a user to subscribe to the source using the template;
receiving user-specified security credentials from the user and applying the user-specified security credentials to an instance of the template to create a user-subscribed source;
authenticating a crawler as the user on the source;
crawling, using a processor associated with a computer system, the source as the user template with user-specified security credentials;
indexing documents for the user during the crawling in an index; and
stamping identification information for the user with each entry in the index such that the associated documents are only available for search in the index by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries.
-
Citations
25 Claims
-
1. A computer-implemented method of providing user-subscribed sources for secure search, comprising:
-
providing to a user a template for crawling a source, the template defining a location of and crawl settings for a target data repository source, the template not having specified security credentials for the source; allowing a user to subscribe to the source using the template; receiving user-specified security credentials from the user and applying the user-specified security credentials to an instance of the template to create a user-subscribed source; authenticating a crawler as the user on the source; crawling, using a processor associated with a computer system, the source as the user template with user-specified security credentials; indexing documents for the user during the crawling in an index; and stamping identification information for the user with each entry in the index such that the associated documents are only available for search in the index by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 24, 25)
-
-
13. A computer program product embedded in a computer-readable storage medium for providing user-subscribed sources for secure search, comprising:
-
program code for providing to a user a template for crawling a source, the template defining a location of and crawl settings for a target data repository source, the template not having specified security credentials for the source; program code for allowing a user to subscribe to the source using the template; program code for receiving user-specified security credentials from the user and applying the user-specified security credentials to an instance of the template to create a user-subscribed source; program code for authenticating a crawler as the user on the source; program code for crawling the source as the user template with user-specified security credentials; program code for indexing documents for the user during the crawling in an index; and program code for stamping identification information for the user with each entry in the index such that the associated documents are only available for search in the index by the user. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification