Method for suggesting web links and alternate terms for matching search queries
First Claim
1. A method of suggesting links for a search query in an enterprise system, comprising:
- receiving a rule index in an enterprise system, wherein the rule index provides rule patterns for associating links with queries;
receiving a search request from a user comprising a query string that includes a set of query tokens, wherein the user has been authorized to search by a first authentication performed by the enterprise system;
in response to the search request;
generating and displaying search results; and
generating and displaying one or more suggested links to documents, where the suggested links are to documents which have not been crawled by the enterprise system;
wherein generating the suggested links comprises;
generating, using the processor, variations of the set of query tokens; and
applying, using the processor, the rule index to variations of the set of query tokens;
wherein applying the rule index further comprises matching a variation of the set of query tokens to one or more rule index entries to identifyat least one related link,wherein the at least one related link is not included in the search results;
submitting information about the user to a provider of the one or more suggested links, wherein the provider performs a second authentication of the user;
selecting one or more related links to display as suggested links when the second authentication is successful; and
providing the user with a message other than the suggested content when the second authentication fails.
1 Assignment
0 Petitions
Accused Products
Abstract
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries.
231 Citations
18 Claims
-
1. A method of suggesting links for a search query in an enterprise system, comprising:
-
receiving a rule index in an enterprise system, wherein the rule index provides rule patterns for associating links with queries; receiving a search request from a user comprising a query string that includes a set of query tokens, wherein the user has been authorized to search by a first authentication performed by the enterprise system; in response to the search request; generating and displaying search results; and generating and displaying one or more suggested links to documents, where the suggested links are to documents which have not been crawled by the enterprise system; wherein generating the suggested links comprises; generating, using the processor, variations of the set of query tokens; and applying, using the processor, the rule index to variations of the set of query tokens; wherein applying the rule index further comprises matching a variation of the set of query tokens to one or more rule index entries to identify at least one related link, wherein the at least one related link is not included in the search results; submitting information about the user to a provider of the one or more suggested links, wherein the provider performs a second authentication of the user; selecting one or more related links to display as suggested links when the second authentication is successful; and providing the user with a message other than the suggested content when the second authentication fails. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable storage medium storing instructions, which when executed by one or more processors, cause the one or more processors to suggest links for a search query within an enterprise system, the instructions comprising:
-
instructions for receiving a rule index in an enterprise system, wherein the rule index provides rule patterns for associating links with queries; instructions for receiving a search request from a user comprising a query string that includes a set of query tokens, wherein the user has been authorized to search by a first authentication performed by the enterprise system; instructions for generating and displaying, in response to the search request; search results; and one or more suggested links to documents, where the suggested links are to documents which have not been crawled by the enterprise system; wherein the instructions for generating the suggested links comprise; instructions for generating variations of the set of query tokens; and instructions for applying the rule index to variations of the set of query tokens; wherein the instructions for applying the rule index further comprises instructions for matching a variation of the set of query tokens to one or more rule index entries to identify at least one related link, wherein the at least one related link is not included in the search results; instructions for submitting information about the user to a provider of the one or more suggested links, wherein the provider performs a second authentication of the user; instructions for selecting one or more related links to display as suggested links when the second authentication is successful; and instructions for providing the user with a message other than the suggested content when the second authentication fails. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification