Re-ranking search results from an enterprise system
First Claim
1. A method of crawling secure documents in an enterprise system, comprising:
- specifying in metadata for a secure data source an indication that a temporary password storage option is selected for the secure data source;
examining, by a processor, the metadata for the secure data source at crawl time to determine that the temporary password storage option is selected for the secure data source;
prompting for and receiving security credentials;
in response to determining that the temporary password storage option is selected, writing, by a processor, the security credentials to a temporary storage;
reading the security credentials from the temporary storage;
crawling, by a processor, a set of documents provided by the secure data source, wherein each document of the set of documents is associated with a set of security attributes;
wherein crawling further comprises presenting the security credentials to the secure data source;
indexing, by a processor, one or more documents of the set of documents, wherein each document of the one or more documents is associated with a set of security attributes that allow access to said each document based on the security credentials; and
deleting, by a processor, the security credentials in response to completing use of the security credentials.
1 Assignment
0 Petitions
Accused Products
Abstract
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security, recency, or other attributes to be submitted at query time, for example, in order to re-rank query results from enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries.
180 Citations
16 Claims
-
1. A method of crawling secure documents in an enterprise system, comprising:
-
specifying in metadata for a secure data source an indication that a temporary password storage option is selected for the secure data source; examining, by a processor, the metadata for the secure data source at crawl time to determine that the temporary password storage option is selected for the secure data source; prompting for and receiving security credentials; in response to determining that the temporary password storage option is selected, writing, by a processor, the security credentials to a temporary storage; reading the security credentials from the temporary storage; crawling, by a processor, a set of documents provided by the secure data source, wherein each document of the set of documents is associated with a set of security attributes; wherein crawling further comprises presenting the security credentials to the secure data source; indexing, by a processor, one or more documents of the set of documents, wherein each document of the one or more documents is associated with a set of security attributes that allow access to said each document based on the security credentials; and deleting, by a processor, the security credentials in response to completing use of the security credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium storing instructions, the instructions which when executed by one or more processors, cause the one or more processors to crawl secure documents in an enterprise system, the instructions comprising instructions for:
-
specifying in metadata for a secure data source an indication that a temporary password storage option is selected for the secure data source; examining the metadata for the secure data source at crawl time to determine that the temporary password storage option is selected for the secure data source; prompting for and receiving security credentials; in response to determining that the temporary password storage option is selected, writing the security credentials to a temporary storage; reading the security credentials from the temporary storage; crawling a set of documents provided by the secure data source, wherein each document of the set of documents is associated with a set of security attributes; wherein crawling further comprises presenting the security credentials to the secure data source; indexing one or more documents of the set of documents, each document of the one or more documents associated with a set of security attributes that allow access to the one or more documents based on the security credentials; and deleting the security credentials in response to completing use of the security credentials. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification