Custom search index data security
First Claim
Patent Images
1. A method, comprising:
- receiving, by a first device, user-selected metadata uploaded from a first client device,where the metadata includes data that describes encrypted data stored at a second device that is different from the first device;
indexing, by the first device, the metadata to produce a metadata search index for the encrypted data;
receiving, by the first device, a search query from a second client device;
searching, by the first device, the metadata search index, based on the search query, to produce metadata search results associated with the encrypted data;
identifying, by the first device and based on the search query, web content; and
sending, by the first device, the web content, the metadata search results, and a link to the second device, to the second client device,where the link to the second device enables the second client device to access the encrypted data stored at the second device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system includes a server to store content and a content searching system. The content search system includes an application programming interface to receive user-selected metadata uploaded from a first user, where the metadata includes data that describes content stored at a server. The content searching system further includes an indexer to index the metadata to produce a metadata search index, a search engine to search the metadata search index based on a search query received from a user to produce metadata search results, and a delivery engine to send the metadata search results, and a link to the remote server, to the user to permit the user to access the content stored at the remote server.
61 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a first device, user-selected metadata uploaded from a first client device, where the metadata includes data that describes encrypted data stored at a second device that is different from the first device; indexing, by the first device, the metadata to produce a metadata search index for the encrypted data; receiving, by the first device, a search query from a second client device; searching, by the first device, the metadata search index, based on the search query, to produce metadata search results associated with the encrypted data; identifying, by the first device and based on the search query, web content; and sending, by the first device, the web content, the metadata search results, and a link to the second device, to the second client device, where the link to the second device enables the second client device to access the encrypted data stored at the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
a first device to; receive user-selected metadata, the metadata including data that describes encrypted data stored at a second device that is different from the first device, index the metadata to produce a metadata search index for the encrypted data, receive a search query from a client, search the metadata search index, based on the search query, to produce metadata search results associated with the encrypted data, identify, based on the search query, web content, and provide the web content, the metadata search results, and a link to the second device to the client, the link to the second device enables the client to access the encrypted data stored at the second device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors of a first device, cause the one or more processors to; receive user-selected metadata, the metadata including data that describes encrypted data stored at a second device that is different from the first device, index the metadata to produce a metadata search index for the encrypted data; receive a search query from a client, search the metadata search index, based on the search query, to produce metadata search results associated with the encrypted data, identify, based on the search query, web content, and provide the web content, the metadata search results, and a link to the second device to the client, the link to the second device enables the client to access the encrypted data stored at the second device. - View Dependent Claims (16, 17, 18, 19, 20)
Specification