Cross domain discovery
First Claim
1. A method for searching, comprising:
- uploading an object into a cross domain discovery system that includes a plurality of user service components;
generating a composite object structure of the uploaded object by one of the user service components, the composite object structure including an object identification that is a random number;
detecting an object identification collision by the one of the user service components and generating a new object identification of the composite object structure;
storing, by an object service component, first keywords in association with a first entity of the object, and second keywords in association with a second entity of the object by a search service component, the first entity having a first restriction level and the second entity having a second restriction level, one of the first and second entities is an existing entity that has at least information of a person to contact for the object, wherein storing the first keywords and second keywords further comprises;
encrypting the first entity using a first symmetric key;
storing the encrypted first entity in the object service component;
encrypting the second entity using a second symmetric key;
storing the encrypted second entity in the object service component;
obtaining the first symmetric key and the second symmetric key in association with the object;
splitting the first symmetric key into a first key split and a second key split; and
splitting the second symmetric key into a third key split and a forth key split;
determining a search request having the first restriction level matching the first keywords by the search service component; and
responding to the search request with the first entity.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the disclosure provide methods and systems for cross domain discovery. According to the disclosure, an object can include multiple entities defined by an originator. The multiple entities have different scopes corresponding to different access restrictions. Further, the originator defines keywords for each of the multiple entities. A system for cross domain discovery stores the multiple entities in an object service component, and stores the keywords and access restrictions in a search service component. The search service component conducts a search based on the keywords and access restrictions in response to a search request from a user. An entity is provided to the user based on the user'"'"'s credential and the searching.
-
Citations
16 Claims
-
1. A method for searching, comprising:
-
uploading an object into a cross domain discovery system that includes a plurality of user service components; generating a composite object structure of the uploaded object by one of the user service components, the composite object structure including an object identification that is a random number; detecting an object identification collision by the one of the user service components and generating a new object identification of the composite object structure; storing, by an object service component, first keywords in association with a first entity of the object, and second keywords in association with a second entity of the object by a search service component, the first entity having a first restriction level and the second entity having a second restriction level, one of the first and second entities is an existing entity that has at least information of a person to contact for the object, wherein storing the first keywords and second keywords further comprises; encrypting the first entity using a first symmetric key; storing the encrypted first entity in the object service component; encrypting the second entity using a second symmetric key; storing the encrypted second entity in the object service component; obtaining the first symmetric key and the second symmetric key in association with the object; splitting the first symmetric key into a first key split and a second key split; and splitting the second symmetric key into a third key split and a forth key split; determining a search request having the first restriction level matching the first keywords by the search service component; and responding to the search request with the first entity. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for searching, comprising:
-
uploading an object into a cross domain discovery system that includes a plurality of user service components; generating a composite object structure of the uploaded object by one of the user service components, the composite object structure including an object identification that is a random number; detecting an object identification collision by the one of the user service components and generating a new object identification of the composite object structure; storing the object, by an object service component, having a first entity with a first restriction level and a second entity with a second restriction level in the object service component, one of the first and second entities is an existing entity that has at least information of a person to contact for the object, wherein storing the object further comprises; encrypting the first entity using a first symmetric key; storing the encrypted first entity in the object service component; encrypting the second entity using a second symmetric key; storing the encrypted second entity in the object service component; obtaining the first symmetric key and the second symmetric key in association with the object; splitting the first symmetric key into a first key split and a second key split; and splitting the second symmetric key into a third key split and a forth key split; transmitting first keywords in association with the first entity and second keywords in association with the second entity to a search service component, wherein the search service component stores the first keywords and the second keywords, determines a search request having the first restriction level matching the first keywords and creates a hit entry including a reference to the first entity stored in the object service component. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A system for cross domain discovery, comprising:
-
a microprocessor configured to execute instructions of the user service component of the system; a plurality of user service components of the system, an object being uploaded into the system, each of user service components configured to generate a composite object structure of the uploaded object, the composite object structure including an object identification that is a random number, to detect an object identification collision, and to generate a new object identification of the composite object structure; an object service component configured to store an object having a first entity with a first restriction level and a second entity with a second restriction level, one of the first and second entities is an existing entity that has at least information of a person to contact for the object; a search service component configured to store first keywords in association with the first entity, and second keywords in association with the second entity, determine a search request having the first restriction level matching the first keywords, and respond to the search request with the first entity stored in the object service component; a policy service component configured to authorize the search request; and a key service component configured to generate a first symmetric key and a second symmetric key in association with the object, wherein the object service component is further configured to encrypt the first entity using the first symmetric key; encrypt the second entity using the second symmetric key; split the first symmetric key into a first key split and a second key split; and split the second symmetric key into a third key split and a forth key split; encrypt the first key split and the third key split using a public key of a first symmetric key pair belonging to the object service component, and encrypt the second key split and the forth key split using a public key of a second asymmetric key pair belonging to the policy service. - View Dependent Claims (13, 14, 15, 16)
-
Specification