Search hit URL modification for secure application integration
First Claim
1. A method for dynamically accessing secure content, comprising:
- crawling a group of documents in a secure data source;
indexing, using a processor, each crawled document and storing document metadata for said each crawled document including a generic link for said each crawled document;
receiving a query from an authenticated user of an enterprise, wherein an indexed document satisfies the query relating to the previously indexed document, and the authenticated user has user security attribute values stored in a computer system;
sending a callback to the secure data source from which the indexed document was crawled, the callback including the metadata for the previously indexed document and the user security attribute values;
building, in response to the callback, an updated document metadata for the indexed document, wherein the updated document metadata for the indexed document is different from the stored document metadata for the indexed document, modifying the metadata for the indexed document based on the updated document metadata, and building an updated link that is updated based on the existing generic link and the user security attribute values, the updated link pointing to results that are appropriate for the user at substantially the time of the query, wherein building the updated link includes receiving an updated link from a secure application, wherein the updated link includes encoded information for the secure data source; and
stamping each of the results in an index with the user security attribute values such that the stamped results are only available for search in the index by the user associated with the user security attribute values.
1 Assignment
0 Petitions
Accused Products
Abstract
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries.
363 Citations
12 Claims
-
1. A method for dynamically accessing secure content, comprising:
-
crawling a group of documents in a secure data source; indexing, using a processor, each crawled document and storing document metadata for said each crawled document including a generic link for said each crawled document; receiving a query from an authenticated user of an enterprise, wherein an indexed document satisfies the query relating to the previously indexed document, and the authenticated user has user security attribute values stored in a computer system; sending a callback to the secure data source from which the indexed document was crawled, the callback including the metadata for the previously indexed document and the user security attribute values; building, in response to the callback, an updated document metadata for the indexed document, wherein the updated document metadata for the indexed document is different from the stored document metadata for the indexed document, modifying the metadata for the indexed document based on the updated document metadata, and building an updated link that is updated based on the existing generic link and the user security attribute values, the updated link pointing to results that are appropriate for the user at substantially the time of the query, wherein building the updated link includes receiving an updated link from a secure application, wherein the updated link includes encoded information for the secure data source; and stamping each of the results in an index with the user security attribute values such that the stamped results are only available for search in the index by the user associated with the user security attribute values. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer system for dynamically accessing secure content, comprising:
-
a hardware processor; a memory communicatively coupled to the hardware processor; a search application including a crawler application configured to crawl a group of documents in a secure data source, the search application being further configured to index, using the hardware processor, each crawled document and store document metadata for said each crawled document including a generic link for said each crawled document; a query application configured to receive a query from an authenticated user of an enterprise, wherein an indexed document satisfies the query relating to the previously indexed document, and the authenticated user having user security attribute values stored in the memory and accessible to the search application; and a callback application configured to send a callback to the secure data source from which the indexed document was crawled by the crawler application, the callback including the metadata for the previously indexed document and the user security attribute values, the callback application configured to build, in response to the callback, an updated document metadata for the indexed document, wherein the updated document metadata for the indexed document is different from the stored document metadata for the indexed document, modify the metadata for the indexed document based on the updated document metadata, and build an updated link that is updated based on the existing generic link and the user security attribute values, the updated link pointing to results that are appropriate for the user at substantially the time of the query, wherein building the updated link includes receiving an updated link from a secure application, wherein the updated link includes encoded information for the secure data source, and the callback application is further configured to stamp each of the results in an index with the user security attribute values such that the stamped results are only available for search in the index by the user associated with the user security attribute values. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium for dynamically accessing secure content, comprising:
-
instructions that cause one or more processors to crawl a group of documents in a secure data source; instructions that cause the one or more processors to index each crawled document and storing document metadata for said each crawled document including a generic link for said each crawled document; instructions that cause the one or more processors to receive a query from an authenticated user of an enterprise, wherein an indexed document satisfies the query relating to the previously indexed document, and the authenticated user having user security attribute values stored in a computer system; instructions that cause the one or more processors to send a callback to the secure data source from which the indexed document was crawled, the callback including the metadata for the previously indexed document and the user security attribute values; instructions that cause the one or more processors to receive, in response to the callback, an updated document metadata for the indexed document, wherein the updated document metadata for the indexed document is different from the stored document metadata for the indexed document, modifying the metadata for the indexed document based on the updated document metadata, and building an updated link that is updated based on the existing generic link and the user security attribute values, the updated link pointing to results that are appropriate for the user at substantially the time of the query, wherein building the updated link includes receiving an updated link from a secure application, wherein the updated link includes encoded information for the secure data source; and instructions for stamping each of the results in an index with the user security attribute values such that the stamped results are only available for search in the index by the user associated with the user security attribute values. - View Dependent Claims (12)
-
Specification