Flexible framework for secure search
First Claim
1. A method of generating a user-specific search index across a plurality of data repositories, the method comprising:
- providing a template source for crawling a target data repository, wherein the template source comprises instructions for crawling the target data repository, but the template source does not include user-specific security credentials for crawling the target data repository;
receiving a request to subscribe a user to the template source;
receiving security credentials from the user for the target data repository;
creating a user-subscribed source for the template source using the security credentials from the user for the target data repository;
launching a crawler on the target data repository, wherein the user-subscribed source with the security credentials from the user inherits the instructions for crawling the target data repository from the template source;
causing the crawler to log into the target data repository using the security credentials from the user; and
causing the crawler to crawl the target data repository using the instructions for crawling the target data repository.
1 Assignment
0 Petitions
Accused Products
Abstract
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be received at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries.
245 Citations
20 Claims
-
1. A method of generating a user-specific search index across a plurality of data repositories, the method comprising:
-
providing a template source for crawling a target data repository, wherein the template source comprises instructions for crawling the target data repository, but the template source does not include user-specific security credentials for crawling the target data repository; receiving a request to subscribe a user to the template source; receiving security credentials from the user for the target data repository; creating a user-subscribed source for the template source using the security credentials from the user for the target data repository; launching a crawler on the target data repository, wherein the user-subscribed source with the security credentials from the user inherits the instructions for crawling the target data repository from the template source; causing the crawler to log into the target data repository using the security credentials from the user; and causing the crawler to crawl the target data repository using the instructions for crawling the target data repository. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
one or more processors; and one or more memory devices comprising instructions that, when executed by the one or more processors, cause the one or more processors to perform operations configured to; provide a template source for crawling a target data repository, wherein the template source comprises instructions for crawling the target data repository, but the template source does not include user-specific security credentials for crawling the target data repository; receive a request to subscribe a user to the template source; receive security credentials from the user for the target data repository; create a user-subscribed source for the template source using the security credentials from the user for the target data repository; launch a crawler on the target data repository, wherein the user-subscribed source with the security credentials from the user inherits the instructions for crawling the target data repository from the template source; cause the crawler to log into the target data repository using the security credentials from the user; and cause the crawler to crawl the target data repository using the instructions for crawling the target data repository. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory, computer-readable medium comprising instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
providing a template source for crawling a target data repository, wherein the template source comprises instructions for crawling the target data repository, but the template source does not include user-specific security credentials for crawling the target data repository; receiving a request to subscribe a user to the template source; receiving security credentials from the user for the target data repository; creating a user-subscribed source for the template source using the security credentials from the user for the target data repository; launching a crawler on the target data repository, wherein the user-subscribed source with the security credentials from the user inherits the instructions for crawling the target data repository from the template source; causing the crawler to log into the target data repository using the security credentials from the user; and causing the crawler to crawl the target data repository using the instructions for crawling the target data repository. - View Dependent Claims (17, 18, 19, 20)
-
Specification