US20060031206A1 - Searching for data objects - Google Patents
Searching for data objects Download PDFInfo
- Publication number
- US20060031206A1 US20060031206A1 US11/111,508 US11150805A US2006031206A1 US 20060031206 A1 US20060031206 A1 US 20060031206A1 US 11150805 A US11150805 A US 11150805A US 2006031206 A1 US2006031206 A1 US 2006031206A1
- Authority
- US
- United States
- Prior art keywords
- data objects
- search result
- result set
- search
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/38—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/80—Information retrieval; Database structures therefor; File system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
- G06F16/81—Indexing, e.g. XML tags; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9538—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/40—Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/40—Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
- G06F16/48—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/489—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using time information
Definitions
- This patent application relates generally to searching for data objects.
- Enterprise solutions use data objects to represent real world items and other information.
- data objects can be used to store content including, but not limited to, text, images, graphics, video, and/or multimedia.
- a business object is a special type of data object that can be used to represent information related to a business including, but not limited to, folders, documents, bookmarks, materials, material lists, item lists, data sheets, presentations, and text documents.
- Data objects can be used to support collaborations, competitions, or official tenders.
- a public tender can be implemented using a public folder, in which each bidding party can have a reserved area with folders. Inside these folders, bidding parties can read tender documents for particular items, store their bids, and store additional data and communications between parties. Since the data objects are stored centrally, access rights to the data objects need to be managed. For example, it should be possible to prohibit certain users from accessing all data objects. That is, two bidding parties should not be able to access each others' bidding or communication objects.
- Metadata is data that not directly related to object content. Metadata can include object attributes, such as object identifiers, object names, time stamps, access control attributes, object locations, times of object creation, creator names, object change times, identities of users making changes, and the like. Access control attributes may specify who has access to a particular data object.
- the access control attributes can specify the identity of a user, a group of users, and/or users having a particular role, who have access to data objects.
- the access control attributes can also include access right information. Access right information specifies an extent of access. For example, certain users may be permitted only to read a data object, whereas other users may be permitted both to read and to edit the data object.
- Search engines may be used to search databases, including databases that contain data objects.
- One disadvantage of conventional search engines is that they do not take user access rights into account when returning search results.
- This patent application features methods, systems, and apparatus, including computer program products, for use in searching for data objects. Aspects of the methods, systems, and apparatus are set forth below.
- the invention is directed to searching for data objects.
- This aspect includes searching a content index for first data objects, where the content index stores content of plural data objects, where the first data objects contain content that corresponds to content of a search query, and where the first data objects define a first search result set.
- the search for data objects also includes searching an attribute index for second data objects, where the attribute index stores access control attributes for plural data objects, where the second data objects have access control attributes that correspond to user access data associated with the search query, and where the second data objects define a second search result set.
- a search result is obtained based on the first search result set and the second search result set.
- This aspect may also include one or more of the following.
- the search result may include pointers to at least some of the first and/or second data objects.
- the search result may be obtained by merging the first search result set and the second search result set.
- Merging the first search result set and the second search result set may include identifying data objects having a predetermined relationship to the first search result set and the second search result set.
- Merging the first search result set and the second search result set may include performing a logical AND operation on the first search result set and the second search result set to produce a resultant set.
- the resultant set may be merged with an additional search result set.
- Merging the resultant set with the additional search result set may include performing a logical OR operation on the resultant set and the additional search result set.
- the additional search result set may be obtained by searching the attribute index for data objects that have access control attributes that correspond to the user access data and that have metadata that corresponds to the content associated with the search query.
- the access control attributes may be metadata, and may include user access right information.
- the access control attributes may include at least one of a user name, a user role, a user group name, and at least one user access right.
- the user access right may include at least one of read access, read and write access, and full access.
- the content index may be generated by indexing text of data objects.
- the attribute index may be generated by indexing metadata of data objects.
- the attribute index may be updated by indexing only changes to the access control attributes.
- FIG. 1 is a block diagram of a computer system on which the processes described herein may be implemented.
- FIG. 2 a is a block diagram of a system that may be used to search for data objects.
- FIG. 2 b is a block diagram of search engine that may be incorporated into the system of FIG. 2 a.
- FIG. 3 is a flowchart showing a process for searching for data objects using the search engine of FIG. 2 b and the system of FIG. 2 a.
- FIG. 4 is a diagram showing indexing of documents and their attributes.
- FIG. 5 is a diagram of a search query used in the process of FIG. 3 .
- FIG. 6 is a screenshot showing access authorization of folders.
- FIG. 7 is a unified modeling language (UML) sequence chart showing a process for indexing data objects and/or attributes of data objects.
- UML unified modeling language
- FIG. 8 is a UML sequence chart showing a process for indexing only changes to data objects and/or attributes of data objects.
- FIG. 9 is block diagram showing ways of combining results of searches conducted according to the process of FIG. 3 .
- FIG. 10 a is a screenshot of a user interface that may be generated by the search engine of FIG. 2 b.
- FIG. 10 b is a screenshot of search results that may be produced by the search engine of FIG. 2 b.
- FIG. 2 shows a computer system 199 , on which the processes described herein may be implemented.
- Computer system 199 includes a Web server 200 and a user interface 260 .
- Web server 200 generates user interface 260 .
- user interface 260 includes a registration page 260 a and a search page 260 b .
- An example of search page 260 b is shown in FIG. 10 a (described below).
- Computer system 199 also a database server 201 , an index server 202 , and a robot server 203 .
- Registration page 260 a can be used to register Web sites with the Web server 200 .
- Web server 200 operates as middleware between registration page 206 a and database server 201 .
- URL uniform resource locator
- index server can reject certain registrations.
- index server 202 can include functionality to block URLs of Web sites, such as “spam sites”, from being indexed.
- URLs in index server 202 are processed by robot server 203 .
- Robot server 203 generates robot programs for searching corresponding Web sites hosted by host computers 204 , 205 , 206 . These robot programs analyze the content and attributes of data objects in the Web sites, and provide the results of their analyses to index server 202 .
- Index server 202 uses these results to index content and the attributes of the data objects.
- a user enters a search query on search page 260 b .
- the search query is sent to index server 202 , where the search query is processed.
- Data objects that meet one or more criteria of the search query are located, information relating to the objects is retrieved, and search results containing this information are presented to the user.
- Database server 201 can be used to present page 260 b and search results to the user.
- Index server 202 is used in connection with a search engine 212 that may be implemented using system 199 or portions thereof, as shown in FIG. 2 b .
- search engine 212 includes, among other things, a name server 213 , a pre-processor 214 , a queue server 215 , and index server 202 .
- Index server 202 includes a text mining engine 202 a and corresponding index 202 d, a text search engine 202 b and corresponding index 202 e, and an attribute engine 202 c and corresponding index 202 f.
- Indices 202 d and 202 e can be content indexes, which enable full-text searches of content of data objects.
- Index 202 f can be an attribute index, which indexes attributes, rather than content, of data objects. As a result, index 202 f enables searches for data objects based on their attributes, rather than their content.
- FIG. 4 shows one way of indexing documents that can be used with the processes described herein.
- FIG. 4 shows a search index 402 , which includes an attribute index 404 and a content index 406 .
- Content index 406 includes a dictionary of all words in one or more documents.
- Search index 402 provides, for each word in content index 406 , a link to corresponding document information in attribute index 404 .
- “Word 1 ” is used in “Doc 1 ”, “Doc 2 ”, and “Doc 3 ”.
- content index 406 includes a list of document links, “Doclink 1 ”, “Doc 1 ink 2 ”, and “Doc 1 ink 3 ”, which provide links to corresponding documents “Doc 1 ”, “Doc 2 ”, and “Doc 3 ” in attribute index 404 .
- Each document in attribute index 404 includes information, “DocInfo”, about the document.
- DocInfo may include one or more pointers to corresponding document(s) in memory.
- Attribute index 404 stores information about each document, as opposed to document content. This information can be stored as metadata and may include, e.g., attributes of the document, a name of the document, and access control attributes associated with the document.
- the attributes can include object identifiers (IDs), collaboration IDs, topic IDs, folder IDs, and area IDs.
- the access control attributes can include a user name, a user group, and/or a user role in combination with an access right for a corresponding data object.
- the access right can specify an ability to access the document, such whether to provide a user or group with read and/or write or full access to a particular document.
- search engine 212 is accessible to Web server 200 and to other applications, such as application 218 .
- search engine 212 incorporates a front-end remote function call (RFC) server 216 .
- Applications 218 can access search engine 212 by way of remote function calls generated, e.g., by a gateway 217 associated with application 218 .
- FIG. 3 shows a process 299 for executing searches using search engine 212 of FIG. 2 b .
- Process 299 includes generating ( 300 ) one or more content indices for data objects, and generating ( 302 ) one or more attribute indices for the data objects.
- FIGS. 7 and 8 show examples of processes for generating the indices used in process 299 .
- Search engine 212 receives ( 304 ) a search query.
- An example of a search query 500 is shown in FIG. 5 .
- search query 500 includes a search statement 502 and user access data 504 .
- Search statement 502 can be a string of characters, which correspond to content of data objects to be searched.
- Search statement 502 can also be a string of characters that correspond to attributes of the data objects to be searched.
- Search query 500 also includes user access data 504 .
- User access data 504 can include data that identifies the user who generated the search query. For example, user access data 504 can identify the “current user”, a “current group” that the user is in, and/or a “current role” of the user in that group. In this regard, the user can participate in several groups and can have several roles, each of which can be reflected in search query 500 .
- process 299 searches ( 306 ) content index 406 for data objects that correspond to parameters of search statement 502 .
- Searching for data objects within content index 406 includes searching for data objects with elements of content that at least partially meet (e.g., match, or are similar to) parameters of the search statement.
- All data objects that are obtained ( 310 ) by searching content index 406 constitute a first search result set.
- the first search result set can include the data objects themselves, IDs or other indicia associated with the data objects, or links or pointers to the data objects.
- the links or pointers can be references to storage locations of the data objects. Fuzzy logic may be used to perform the search.
- Such a search may identify data objects with elements of data that are similar, in some way, to parameters of the search query (as opposed to matching the parameters of the search query exactly).
- process 299 searches ( 308 ) attribute index 404 for data objects that correspond to user access data 504 . That is, process 299 searches for data objects with access control attributes that correspond to access control attributes for the user, which correspond to user access data 504 .
- Search engine 212 can search for data objects with access control attributes containing the user's name, the user's groups, and/or the user's roles.
- Process 299 can also determine whether access right information for the user's name, group, and/or role specifies at least read access, meaning that the user is permitted to read information, but not to write the information.
- Other levels of access include read and write access, in which a user is allowed both to read and to write to the information, and full access, in which the user is permitted virtually unfettered access to the information. It is possible to require that all user names, groups and/or roles stored in the access control attributes be at least read access before allowing the user access to the corresponding data objects.
- Search engine 212 can also search in attribute index 404 for areas, folders, collaborations, and/or other hierarchical objects, which correspond to the user name, the user groups, and/or the user roles, and which grant at least read access to the user.
- All data objects that are obtained ( 312 ) as a result of searches performed on attribute index 404 constitute a second search result set.
- This second search result set can identify, e.g., all data objects for which the user has at least read access.
- the second search result sets can include the data objects themselves, IDs or other indicia associated with the data objects, or links or pointers to the data objects.
- the links or pointers can be references to storage locations of the data objects. Fuzzy logic may be used to perform the search.
- Process 299 merges ( 314 ) the first search result set and the second search result set to thereby obtain an overall search result set.
- This overall search result set is presented to the user as the end-result of the user's query using the search engine.
- Merging the first and second search result sets can include combining the first search result set with the second search result set. Other methods of merging search results sets may also be used.
- FIG. 9 shows ways of merging search result sets.
- FIG. 9 shows merging search results from different indices into an overall search result set.
- content indices 902 and 904 are the same type of index as content index 406
- attribute index 902 is the same type of index as attribute index 404 .
- “AND” 906 indicates a logical AND operation
- “OR” 908 indicates a logical OR operation. These logical operations may be performed on index search results.
- results of searches of context index 904 and of attribute index 902 may be combined using a logical AND, resulting in an overall search result that contains only elements that are common to both searches (e.g., only those data objects that have content with elements of data that meet the search query and that permit read access by the user are provided as search result set 910 ).
- This logical AND operation may be used alone to combine search results.
- the logical AND operation may be augmented with other logical operation(s) (as depicted in FIG. 9 ).
- a user may want to search for data objects that were created at a particular time.
- This information can be entered into search engine 212 as a search query.
- the timing information is stored in the metadata of data objects.
- determination of search result set 910 can include using logical OR 908 to merge the additional search result set with the previous search result set produced by logical AND 906 .
- data objects in search result set 910 will either have elements of data that meet the search query or have elements of data in their metadata that meet the search query. The resulting data objects also permit at least read access to the user.
- FIG. 9 shows only some ways of merging search results. Any methods may be used in addition to, or instead of, those above, including, but not limited to, filtering the results and processing the results using one or more computer programs.
- FIGS. 7 and 8 show examples of processes for generating the indices used in process 299 .
- FIG. 7 shows a process 701 for generating an attribute index from a set of data objects.
- Process 701 may also be used to generate a content index.
- the actors of process 701 may include software modules and/or hardware.
- an index may be generated from a predetermined set data objects.
- an administration module 702 sends a request, FullIndexing, for a full indexing 710 , meaning all objects are to be indexed.
- a dispatching module 704 processes this request to obtain a message, GetObjectIdList, that is used to retrieve IDs of data objects to be indexed. In this case, all available data objects are to be indexed; however, in other cases, a subset of data objects may be targeted for indexing.
- the foregoing GetObjectIdList message is processed by a server 706 , which stores the data objects, e.g., business objects for a collaboration folder (cFolders) structure.
- Server 706 instantiates the data objects to obtain the data objects' IDs.
- the data objects' metadata is also obtained from the instantiated objects, and stored by server 706 .
- Server 706 returns, to dispatching module 704 , a table, TabObjectsIds, which lists the data objects' IDs. Module 704 uses this table to request, via a GetAttributesNameList message, an attribute name list for the data objects from the server 706 . In response, server 706 returns, to dispatching module 704 , a table, TabAttributeNames. This table contains names of attributes of the data objects listed in the table.
- Module 704 sends a message, GetAttributeValues, to server 706 and, in response, receives a table, TabAttributeValues, of attribute values for the named attributes.
- the data object IDs, together with their attributes and attribute values, are provided to an index server 708 of a search engine via a FeedIndex message.
- Index server 708 generates, and stores, the index for the named data objects.
- Index server 708 reports successful generation of an index to administration module 702 and status information to module 704 . It is noted that index server 708 corresponds to index server 202 of FIG. 2 a.
- the attribute information may include a hierarchical folder structure for data objects. This information enables searching to be limited to a particular area, folder or other hierarchy, within a data structure. Generating the attribute index can also include indexing root information and area information for the data objects. This information can be used to determine a position of a data object within a database.
- Foregoing process 701 may be used to index metadata and/or the content (i.e., full-text) of data objects. Because indexing data objects can be time consuming, the data objects can be indexed periodically. Periodic indexing can include indexing only changed values.
- FIG. 8 illustrates a unified modeling language (UML) sequence chart for such indexing, which is referred to herein as “delta-indexing”.
- UML unified modeling language
- administration module 702 calls a routine, DeltaIndexing, which performs delta-indexing.
- Module 704 analyzes a log file to determine object IDs of data object that have changed since a last indexing.
- the log file may be maintained by a one or more computers used to perform process 801 , by one or more computers that store the data objects, by a combination thereof.
- the list of data object IDs is provided to server 706 in a message, GetAttributeNameList.
- server 706 In response to GetAttributeNameList, server 706 returns a list, TabAttributesNames, that contains data objects that have changed. The list also identifies attributes of those data objects, and which attributes have changed. Module 704 requests the values of the changed attributes in a message, GetAttributesValues, which identifies data objects for which values are requested. Server 706 responds to GetAttributesValues with a table of attribute values, TabAttributesValues, for data objects identified in GetAttributesValues. To obtain values of the attributes, instances of the data objects may be created and metadata therefor may be read.
- the attribute values contain access control attributes, which can be used in search engine 212 to support searches using access control.
- the obtained attribute values are provided by module 704 to index server 708 .
- Index server 708 updates its index using the values.
- Index server 708 confirms an index update with appropriate response messages.
- Page 600 includes a frame 602 with hierarchical folder information.
- the selected folder in this case is “hard disk”.
- frame 604 shows different access control attributes including a username, a group, or a role, and user access right information.
- the user access right information can be inherited from parent data object(s), or it can be defined independently for each data object.
- the user group “Advanced Technology” has read access to the selected folder; the user “James Brown” has administrative access to the selected folder; and the user group “Integrated Solutions” has no access to the selected folder.
- FIG. 10 a shows a screenshot of a search page 1000 , which may be generated by search engine 212 to search a database.
- search page 1000 a user can specify a folder to search in field 1001 .
- This folder can be a root folder or any sub-folder.
- the selection of a folder can be used in generation of an attribute search for that folder.
- This attribute can be the folder ID for data objects that were identified as a result of a search.
- a user can specify additional attributes, such as, a name, a description, a date of creation, a name of creator, change data, a name of a user who changed data, or other metadata.
- additional attributes such as, a name, a description, a date of creation, a name of creator, change data, a name of a user who changed data, or other metadata.
- the user can also specify, in field 1002 b , a search query, which, in this example is “sap”.
- a search button 1004 is provided. Upon selecting search button 1004 , search engine 212 is activated to obtain a search result set, which is provided in the page shown in FIG. 12 b.
- search engine 212 When selecting search button 1004 , a search query, including any specified attributes, is provided to search engine 212 .
- the user who initiated the search request is identified. This can be done by instructing the user to register with system 199 ( FIG. 1 ) upon first use. The identity of the user can also be determined by the user's login name or other identifying indicia. Additionally, at least one user role, or at least one user group is determined. This user access data also provided with the search query.
- the search query and associated attributes are processed by search engine 212 in the manner described above in FIG. 3 .
- the search results sets are combined in the manner described above in FIG. 9 , and the results are output, e.g., in page 1003 ( FIG. 10 b ).
- page 1003 include a frame 1006 that identifies a folder in which the search was conducted.
- Another frame 1008 presents data objects that turned up during the search.
- the data objects may be presented with their names, their descriptions, and their original locations.
- the data objects can be referred to via a link, through which the data objects can be accesses at their corresponding locations.
- FIG. 1 illustrates a block diagram of an example of computer system 999 on which the processes described herein (“the processes”) may be implemented.
- computer system 999 includes computers 900 , 901 , 902 . It is noted, however, that the processes can be implemented on any type of processing device(s).
- Computer 900 can communicate with computers 901 and 902 over network 990 .
- Computer 900 has processor 910 , memory 920 , bus 930 , and, optionally, input device 940 and output device 950 (I/O devices, user interface 960 ).
- the processes can be implemented by computer program product 100 (CPP), carrier 970 and/or signal 980 .
- computer 901 , 902 is sometimes referred to as “remote computer”, computer 901 , 902 may be, for example, a server, a peer device or other common network node, and typically has many or all of the elements described relative to computer 900 .
- Computer 900 is may be a conventional personal computer (PC), a desktop device or a hand-held device, a multiprocessor computer, a pen computer, a microprocessor-based or programmable consumer electronics device, a minicomputer, a mainframe computer, a personal mobile computing device, a mobile phone, a portable or stationary personal computer, a palmtop computer, or the like.
- Processor 910 may be a CPU, a micro-controller unit (MCU), digital signal processor (DSP), or the like.
- Memory 920 includes elements that temporarily or permanently store data and instructions. Although memory 920 is illustrated as part of computer 900 , memory can also be implemented in network 990 , in computers 901 , 902 and in processor 910 itself (e.g., cache, register), or elsewhere.
- Memory 920 can be a read only memory (ROM), a random access memory (RAM), or a memory with other access options.
- Memory 920 may be implemented by machine-readable media, for example: (a) magnetic media, like a hard disk, a floppy disk, or other magnetic disk, a tape, a cassette tape; (b) optical media, like optical disk (CD-ROM, digital versatile disk—DVD); (c) semiconductor media, like DRAM, SRAM, EPROM, EEPROM, and memory stick.
- machine-readable media for example: (a) magnetic media, like a hard disk, a floppy disk, or other magnetic disk, a tape, a cassette tape; (b) optical media, like optical disk (CD-ROM, digital versatile disk—DVD); (c) semiconductor media, like DRAM, SRAM, EPROM, EEPROM, and memory stick.
- Memory 920 may be distributed. Portions of memory 920 can be removable or non-removable. For reading from media and for writing in media, computer 900 uses well-known devices, for example, disk drives, or tape drives.
- Memory 920 stores modules such as, for example, a basic input output system (BIOS), an operating system (OS), a program library, a compiler, an interpreter, and a text-processing tool. Modules are commercially available and can be installed on computer 900 . For simplicity, these modules are not illustrated.
- BIOS basic input output system
- OS operating system
- program library a program library
- compiler a compiler
- interpreter a text-processing tool
- CPP 100 includes program instructions and—optionally—data that causes processor 910 to execute method steps of the processes described herein.
- CPP 100 can control the operation of computer 900 and its interaction in network system 999 so that is operates to perform in accordance with the processes described herein.
- CPP 100 can be available as source code in any programming language, and as object code (“binary code”) in a compiled form.
- CPP 100 is illustrated as being stored in memory 920 , CPP 100 can be located elsewhere.
- CPP 100 can also be embodied in carrier 970 .
- Carrier 970 is illustrated outside computer 900 .
- carrier 970 is inserted into input device 940 .
- Carrier 970 may be implemented as any machine-readable medium, such as a medium largely explained above (memory 920 ).
- carrier 970 is an article of manufacture having a machine-readable medium with machine-readable program code to cause the computer to perform methods described herein.
- signal 980 can also embody computer program product 100 .
- All or part of the processes can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
- a computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
- a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- Method steps associated with the processes can be performed by one or more programmable processors executing one or more computer programs to perform the functions of the processes.
- the method steps can also be performed by, and the processes can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) and/or an ASIC (application-specific integrated circuit).
- special purpose logic circuitry e.g., an FPGA (field programmable gate array) and/or an ASIC (application-specific integrated circuit).
- processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
- a processor will receive instructions and data from a read-only storage area or a random access storage area or both.
- Elements of a computer include a processor for executing instructions and one or more storage area devices for storing instructions and data.
- a computer will also include, or be operatively coupled to receive data from, or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks.
- Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile storage area, including by way of example, semiconductor storage area devices, e.g., EPROM, EEPROM, and flash storage area devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
- semiconductor storage area devices e.g., EPROM, EEPROM, and flash storage area devices
- magnetic disks e.g., internal hard disks or removable disks
- magneto-optical disks e.g., CD-ROM and DVD-ROM disks.
- All or part of the processes can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface, or any combination of such back-end, middleware, or front-end components.
- the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a LAN and a WAN, e.g., the Internet.
- the data objects described herein may be used to store content, which can include, but is not limited to, text, images, graphics, video or other multimedia content.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Library & Information Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Searching for data objects includes searching a content index for first data objects, where the content index stores content of plural data objects, where the first data objects contain content that corresponds to content of a search query, and where the first data objects define a first search result set. The search for data objects also includes searching an attribute index for second data objects, where the attribute index stores access control attributes for plural data objects, where the second data objects have access control attributes that correspond to user access data associated with the search query, and where the second data objects define a second search result set. A search result is obtained based on the first search result set and the second search result set.
Description
- This patent application claims priority to German Patent Application No. DE 102004038544.0, filed on Aug. 6, 2004, the contents of which are hereby incorporated by reference into this patent application as if set forth herein in full.
- This patent application relates generally to searching for data objects.
- Enterprise solutions use data objects to represent real world items and other information. For example, data objects can be used to store content including, but not limited to, text, images, graphics, video, and/or multimedia. A business object is a special type of data object that can be used to represent information related to a business including, but not limited to, folders, documents, bookmarks, materials, material lists, item lists, data sheets, presentations, and text documents.
- Data objects can be used to support collaborations, competitions, or official tenders. For example, a public tender can be implemented using a public folder, in which each bidding party can have a reserved area with folders. Inside these folders, bidding parties can read tender documents for particular items, store their bids, and store additional data and communications between parties. Since the data objects are stored centrally, access rights to the data objects need to be managed. For example, it should be possible to prohibit certain users from accessing all data objects. That is, two bidding parties should not be able to access each others' bidding or communication objects.
- Data objects also store metadata. Metadata is data that not directly related to object content. Metadata can include object attributes, such as object identifiers, object names, time stamps, access control attributes, object locations, times of object creation, creator names, object change times, identities of users making changes, and the like. Access control attributes may specify who has access to a particular data object.
- In more detail, the access control attributes can specify the identity of a user, a group of users, and/or users having a particular role, who have access to data objects. The access control attributes can also include access right information. Access right information specifies an extent of access. For example, certain users may be permitted only to read a data object, whereas other users may be permitted both to read and to edit the data object.
- Search engines may be used to search databases, including databases that contain data objects. One disadvantage of conventional search engines is that they do not take user access rights into account when returning search results.
- This patent application features methods, systems, and apparatus, including computer program products, for use in searching for data objects. Aspects of the methods, systems, and apparatus are set forth below.
- In general, in one aspect, the invention is directed to searching for data objects. This aspect includes searching a content index for first data objects, where the content index stores content of plural data objects, where the first data objects contain content that corresponds to content of a search query, and where the first data objects define a first search result set. The search for data objects also includes searching an attribute index for second data objects, where the attribute index stores access control attributes for plural data objects, where the second data objects have access control attributes that correspond to user access data associated with the search query, and where the second data objects define a second search result set. A search result is obtained based on the first search result set and the second search result set. This aspect may also include one or more of the following.
- The search result may include pointers to at least some of the first and/or second data objects. The search result may be obtained by merging the first search result set and the second search result set. Merging the first search result set and the second search result set may include identifying data objects having a predetermined relationship to the first search result set and the second search result set. Merging the first search result set and the second search result set may include performing a logical AND operation on the first search result set and the second search result set to produce a resultant set.
- The resultant set may be merged with an additional search result set. Merging the resultant set with the additional search result set may include performing a logical OR operation on the resultant set and the additional search result set. The additional search result set may be obtained by searching the attribute index for data objects that have access control attributes that correspond to the user access data and that have metadata that corresponds to the content associated with the search query.
- The access control attributes may be metadata, and may include user access right information. The access control attributes may include at least one of a user name, a user role, a user group name, and at least one user access right. The user access right may include at least one of read access, read and write access, and full access.
- The content index may be generated by indexing text of data objects. The attribute index may be generated by indexing metadata of data objects. The attribute index may be updated by indexing only changes to the access control attributes.
- The details of one or more examples are set forth in the accompanying drawings and the description below. Further features, aspects, and advantages of the invention will become apparent from the description, the drawings, and the claims.
-
FIG. 1 is a block diagram of a computer system on which the processes described herein may be implemented. -
FIG. 2 a is a block diagram of a system that may be used to search for data objects. -
FIG. 2 b is a block diagram of search engine that may be incorporated into the system ofFIG. 2 a. -
FIG. 3 is a flowchart showing a process for searching for data objects using the search engine ofFIG. 2 b and the system ofFIG. 2 a. -
FIG. 4 is a diagram showing indexing of documents and their attributes. -
FIG. 5 is a diagram of a search query used in the process ofFIG. 3 . -
FIG. 6 is a screenshot showing access authorization of folders. -
FIG. 7 is a unified modeling language (UML) sequence chart showing a process for indexing data objects and/or attributes of data objects. -
FIG. 8 is a UML sequence chart showing a process for indexing only changes to data objects and/or attributes of data objects. -
FIG. 9 is block diagram showing ways of combining results of searches conducted according to the process ofFIG. 3 . -
FIG. 10 a is a screenshot of a user interface that may be generated by the search engine ofFIG. 2 b. -
FIG. 10 b is a screenshot of search results that may be produced by the search engine ofFIG. 2 b. - Like reference numerals in different figures denote like elements.
-
FIG. 2 shows acomputer system 199, on which the processes described herein may be implemented.Computer system 199 includes aWeb server 200 and auser interface 260.Web server 200 generatesuser interface 260. In this example,user interface 260 includes aregistration page 260 a and asearch page 260 b. An example ofsearch page 260 b is shown inFIG. 10 a (described below).Computer system 199 also adatabase server 201, anindex server 202, and arobot server 203. -
Registration page 260 a can be used to register Web sites with theWeb server 200. In this example,Web server 200 operates as middleware between registration page 206 a anddatabase server 201. Once a Web site is registered, its address, in this case its uniform resource locator (URL), is entered intoindex server 202. It is noted that index server can reject certain registrations. For example,index server 202 can include functionality to block URLs of Web sites, such as “spam sites”, from being indexed. - URLs in
index server 202 are processed byrobot server 203.Robot server 203 generates robot programs for searching corresponding Web sites hosted byhost computers index server 202.Index server 202 uses these results to index content and the attributes of the data objects. - To search, a user enters a search query on
search page 260 b. The search query is sent toindex server 202, where the search query is processed. Data objects that meet one or more criteria of the search query are located, information relating to the objects is retrieved, and search results containing this information are presented to the user.Database server 201 can be used to presentpage 260 b and search results to the user. -
Index server 202 is used in connection with asearch engine 212 that may be implemented usingsystem 199 or portions thereof, as shown inFIG. 2 b. In this example,search engine 212 includes, among other things, aname server 213, apre-processor 214, aqueue server 215, andindex server 202. -
Index server 202 includes atext mining engine 202 a andcorresponding index 202 d, atext search engine 202 b andcorresponding index 202 e, and anattribute engine 202 c andcorresponding index 202 f.Indices Index 202 f can be an attribute index, which indexes attributes, rather than content, of data objects. As a result,index 202 f enables searches for data objects based on their attributes, rather than their content. -
FIG. 4 shows one way of indexing documents that can be used with the processes described herein. In particular,FIG. 4 shows asearch index 402, which includes anattribute index 404 and acontent index 406.Content index 406 includes a dictionary of all words in one or more documents.Search index 402 provides, for each word incontent index 406, a link to corresponding document information inattribute index 404. To illustrate, inFIG. 4 , “Word1” is used in “Doc1”, “Doc2”, and “Doc3”. As such,content index 406 includes a list of document links, “Doclink1”, “Doc1ink2”, and “Doc1ink3”, which provide links to corresponding documents “Doc1”, “Doc2”, and “Doc3” inattribute index 404. Each document inattribute index 404 includes information, “DocInfo”, about the document. DocInfo may include one or more pointers to corresponding document(s) in memory. -
Attribute index 404 stores information about each document, as opposed to document content. This information can be stored as metadata and may include, e.g., attributes of the document, a name of the document, and access control attributes associated with the document. The attributes can include object identifiers (IDs), collaboration IDs, topic IDs, folder IDs, and area IDs. The access control attributes can include a user name, a user group, and/or a user role in combination with an access right for a corresponding data object. The access right can specify an ability to access the document, such whether to provide a user or group with read and/or write or full access to a particular document. - Referring back to
FIG. 2 b,search engine 212 is accessible toWeb server 200 and to other applications, such asapplication 218. To provide access to applications other thanWeb server 200,search engine 212 incorporates a front-end remote function call (RFC)server 216.Applications 218 can accesssearch engine 212 by way of remote function calls generated, e.g., by agateway 217 associated withapplication 218. -
FIG. 3 shows aprocess 299 for executing searches usingsearch engine 212 ofFIG. 2 b.Process 299 includes generating (300) one or more content indices for data objects, and generating (302) one or more attribute indices for the data objects.FIGS. 7 and 8 (described below) show examples of processes for generating the indices used inprocess 299. -
Search engine 212 receives (304) a search query. An example of asearch query 500 is shown inFIG. 5 . Referring toFIG. 5 ,search query 500 includes asearch statement 502 anduser access data 504.Search statement 502 can be a string of characters, which correspond to content of data objects to be searched.Search statement 502 can also be a string of characters that correspond to attributes of the data objects to be searched. -
Search query 500 also includesuser access data 504.User access data 504 can include data that identifies the user who generated the search query. For example,user access data 504 can identify the “current user”, a “current group” that the user is in, and/or a “current role” of the user in that group. In this regard, the user can participate in several groups and can have several roles, each of which can be reflected insearch query 500. - After receiving the search query,
process 299 searches (306)content index 406 for data objects that correspond to parameters ofsearch statement 502. Searching for data objects withincontent index 406 includes searching for data objects with elements of content that at least partially meet (e.g., match, or are similar to) parameters of the search statement. All data objects that are obtained (310) by searchingcontent index 406 constitute a first search result set. The first search result set can include the data objects themselves, IDs or other indicia associated with the data objects, or links or pointers to the data objects. The links or pointers can be references to storage locations of the data objects. Fuzzy logic may be used to perform the search. Such a search may identify data objects with elements of data that are similar, in some way, to parameters of the search query (as opposed to matching the parameters of the search query exactly). - In addition to searching
content index 406,process 299 searches (308)attribute index 404 for data objects that correspond touser access data 504. That is,process 299 searches for data objects with access control attributes that correspond to access control attributes for the user, which correspond touser access data 504. -
Search engine 212 can search for data objects with access control attributes containing the user's name, the user's groups, and/or the user's roles.Process 299 can also determine whether access right information for the user's name, group, and/or role specifies at least read access, meaning that the user is permitted to read information, but not to write the information. Other levels of access include read and write access, in which a user is allowed both to read and to write to the information, and full access, in which the user is permitted virtually unfettered access to the information. It is possible to require that all user names, groups and/or roles stored in the access control attributes be at least read access before allowing the user access to the corresponding data objects. -
Search engine 212 can also search inattribute index 404 for areas, folders, collaborations, and/or other hierarchical objects, which correspond to the user name, the user groups, and/or the user roles, and which grant at least read access to the user. - All data objects that are obtained (312) as a result of searches performed on
attribute index 404 constitute a second search result set. This second search result set can identify, e.g., all data objects for which the user has at least read access. The second search result sets can include the data objects themselves, IDs or other indicia associated with the data objects, or links or pointers to the data objects. The links or pointers can be references to storage locations of the data objects. Fuzzy logic may be used to perform the search. -
Process 299 merges (314) the first search result set and the second search result set to thereby obtain an overall search result set. This overall search result set is presented to the user as the end-result of the user's query using the search engine. Merging the first and second search result sets can include combining the first search result set with the second search result set. Other methods of merging search results sets may also be used. -
FIG. 9 shows ways of merging search result sets. In particular,FIG. 9 shows merging search results from different indices into an overall search result set. InFIG. 9 ,content indices content index 406, andattribute index 902 is the same type of index asattribute index 404. “AND” 906 indicates a logical AND operation, and “OR” 908 indicates a logical OR operation. These logical operations may be performed on index search results. Thus, the results of searches ofcontext index 904 and ofattribute index 902 may be combined using a logical AND, resulting in an overall search result that contains only elements that are common to both searches (e.g., only those data objects that have content with elements of data that meet the search query and that permit read access by the user are provided as search result set 910). This logical AND operation may be used alone to combine search results. Alternatively, the logical AND operation may be augmented with other logical operation(s) (as depicted inFIG. 9 ). - By way example, a user may want to search for data objects that were created at a particular time. This information can be entered into
search engine 212 as a search query. The timing information is stored in the metadata of data objects. Thus, in some cases, it is useful to search the metadata of data objects using the search statement. Results of such a search of acontent index 903 can constitute an additional search result set. - In this example, determination of search result set 910 can include using logical OR 908 to merge the additional search result set with the previous search result set produced by logical AND 906. In this example, data objects in search result set 910 will either have elements of data that meet the search query or have elements of data in their metadata that meet the search query. The resulting data objects also permit at least read access to the user.
-
FIG. 9 shows only some ways of merging search results. Any methods may be used in addition to, or instead of, those above, including, but not limited to, filtering the results and processing the results using one or more computer programs. - As noted above,
FIGS. 7 and 8 show examples of processes for generating the indices used inprocess 299. In this regard,FIG. 7 shows aprocess 701 for generating an attribute index from a set of data objects.Process 701 may also be used to generate a content index. It is noted that the actors ofprocess 701 may include software modules and/or hardware. - According to
process 701, an index may be generated from a predetermined set data objects. To do this, anadministration module 702 sends a request, FullIndexing, for a full indexing 710, meaning all objects are to be indexed. Adispatching module 704 processes this request to obtain a message, GetObjectIdList, that is used to retrieve IDs of data objects to be indexed. In this case, all available data objects are to be indexed; however, in other cases, a subset of data objects may be targeted for indexing. - The foregoing GetObjectIdList message is processed by a
server 706, which stores the data objects, e.g., business objects for a collaboration folder (cFolders) structure.Server 706 instantiates the data objects to obtain the data objects' IDs. The data objects' metadata is also obtained from the instantiated objects, and stored byserver 706. -
Server 706 returns, to dispatchingmodule 704, a table, TabObjectsIds, which lists the data objects' IDs.Module 704 uses this table to request, via a GetAttributesNameList message, an attribute name list for the data objects from theserver 706. In response,server 706 returns, to dispatchingmodule 704, a table, TabAttributeNames. This table contains names of attributes of the data objects listed in the table. - The attributes' names are used to request attribute values for the named attributes.
Module 704 sends a message, GetAttributeValues, toserver 706 and, in response, receives a table, TabAttributeValues, of attribute values for the named attributes. The data object IDs, together with their attributes and attribute values, are provided to anindex server 708 of a search engine via a FeedIndex message.Index server 708 generates, and stores, the index for the named data objects.Index server 708 reports successful generation of an index toadministration module 702 and status information tomodule 704. It is noted thatindex server 708 corresponds to indexserver 202 ofFIG. 2 a. - The attribute information may include a hierarchical folder structure for data objects. This information enables searching to be limited to a particular area, folder or other hierarchy, within a data structure. Generating the attribute index can also include indexing root information and area information for the data objects. This information can be used to determine a position of a data object within a database.
- Foregoing
process 701 may be used to index metadata and/or the content (i.e., full-text) of data objects. Because indexing data objects can be time consuming, the data objects can be indexed periodically. Periodic indexing can include indexing only changed values.FIG. 8 illustrates a unified modeling language (UML) sequence chart for such indexing, which is referred to herein as “delta-indexing”. - Referring to process 801 of
FIG. 8 ,administration module 702 calls a routine, DeltaIndexing, which performs delta-indexing.Module 704 analyzes a log file to determine object IDs of data object that have changed since a last indexing. The log file may be maintained by a one or more computers used to performprocess 801, by one or more computers that store the data objects, by a combination thereof. The list of data object IDs is provided toserver 706 in a message, GetAttributeNameList. - In response to GetAttributeNameList,
server 706 returns a list, TabAttributesNames, that contains data objects that have changed. The list also identifies attributes of those data objects, and which attributes have changed.Module 704 requests the values of the changed attributes in a message, GetAttributesValues, which identifies data objects for which values are requested.Server 706 responds to GetAttributesValues with a table of attribute values, TabAttributesValues, for data objects identified in GetAttributesValues. To obtain values of the attributes, instances of the data objects may be created and metadata therefor may be read. - The attribute values contain access control attributes, which can be used in
search engine 212 to support searches using access control. The obtained attribute values are provided bymodule 704 toindex server 708.Index server 708 updates its index using the values.Index server 708 confirms an index update with appropriate response messages. - Referring now to
FIG. 6 , a page is shown that includes access control attributes for a folder having a hierarchical structure.Page 600 includes aframe 602 with hierarchical folder information. The selected folder in this case is “hard disk”. For the selected folder,frame 604 shows different access control attributes including a username, a group, or a role, and user access right information. The user access right information can be inherited from parent data object(s), or it can be defined independently for each data object. In the example shown inFIG. 6 , the user group “Advanced Technology” has read access to the selected folder; the user “James Brown” has administrative access to the selected folder; and the user group “Integrated Solutions” has no access to the selected folder. -
FIG. 10 a shows a screenshot of asearch page 1000, which may be generated bysearch engine 212 to search a database. Insearch page 1000, a user can specify a folder to search infield 1001. This folder can be a root folder or any sub-folder. The selection of a folder can be used in generation of an attribute search for that folder. This attribute can be the folder ID for data objects that were identified as a result of a search. - In a
field 1002 a, a user can specify additional attributes, such as, a name, a description, a date of creation, a name of creator, change data, a name of a user who changed data, or other metadata. The user can also specify, in field 1002 b, a search query, which, in this example is “sap”. Asearch button 1004 is provided. Upon selectingsearch button 1004,search engine 212 is activated to obtain a search result set, which is provided in the page shown inFIG. 12 b. - When selecting
search button 1004, a search query, including any specified attributes, is provided tosearch engine 212. In addition, the user who initiated the search request is identified. This can be done by instructing the user to register with system 199 (FIG. 1 ) upon first use. The identity of the user can also be determined by the user's login name or other identifying indicia. Additionally, at least one user role, or at least one user group is determined. This user access data also provided with the search query. - The search query and associated attributes are processed by
search engine 212 in the manner described above inFIG. 3 . The search results sets are combined in the manner described above inFIG. 9 , and the results are output, e.g., in page 1003 (FIG. 10 b). - As shown in
FIG. 10 b,page 1003 include aframe 1006 that identifies a folder in which the search was conducted. Anotherframe 1008 presents data objects that turned up during the search. The data objects may be presented with their names, their descriptions, and their original locations. The data objects can be referred to via a link, through which the data objects can be accesses at their corresponding locations. -
FIG. 1 illustrates a block diagram of an example ofcomputer system 999 on which the processes described herein (“the processes”) may be implemented. In this example,computer system 999 includescomputers -
Computer 900 can communicate withcomputers network 990.Computer 900 hasprocessor 910,memory 920,bus 930, and, optionally, input device 940 and output device 950 (I/O devices, user interface 960). The processes can be implemented by computer program product 100 (CPP),carrier 970 and/or signal 980. - With respect to
computer 900,computer computer computer 900.Computer 900 is may be a conventional personal computer (PC), a desktop device or a hand-held device, a multiprocessor computer, a pen computer, a microprocessor-based or programmable consumer electronics device, a minicomputer, a mainframe computer, a personal mobile computing device, a mobile phone, a portable or stationary personal computer, a palmtop computer, or the like. -
Processor 910 may be a CPU, a micro-controller unit (MCU), digital signal processor (DSP), or the like.Memory 920 includes elements that temporarily or permanently store data and instructions. Althoughmemory 920 is illustrated as part ofcomputer 900, memory can also be implemented innetwork 990, incomputers processor 910 itself (e.g., cache, register), or elsewhere.Memory 920 can be a read only memory (ROM), a random access memory (RAM), or a memory with other access options.Memory 920 may be implemented by machine-readable media, for example: (a) magnetic media, like a hard disk, a floppy disk, or other magnetic disk, a tape, a cassette tape; (b) optical media, like optical disk (CD-ROM, digital versatile disk—DVD); (c) semiconductor media, like DRAM, SRAM, EPROM, EEPROM, and memory stick. -
Memory 920 may be distributed. Portions ofmemory 920 can be removable or non-removable. For reading from media and for writing in media,computer 900 uses well-known devices, for example, disk drives, or tape drives. -
Memory 920 stores modules such as, for example, a basic input output system (BIOS), an operating system (OS), a program library, a compiler, an interpreter, and a text-processing tool. Modules are commercially available and can be installed oncomputer 900. For simplicity, these modules are not illustrated. -
CPP 100 includes program instructions and—optionally—data that causesprocessor 910 to execute method steps of the processes described herein. In other words,CPP 100 can control the operation ofcomputer 900 and its interaction innetwork system 999 so that is operates to perform in accordance with the processes described herein. For example,CPP 100 can be available as source code in any programming language, and as object code (“binary code”) in a compiled form. - Although
CPP 100 is illustrated as being stored inmemory 920,CPP 100 can be located elsewhere.CPP 100 can also be embodied incarrier 970.Carrier 970 is illustrated outsidecomputer 900. For communicating betweenCPP 100 andcomputer 900,carrier 970 is inserted into input device 940.Carrier 970 may be implemented as any machine-readable medium, such as a medium largely explained above (memory 920). Generally,carrier 970 is an article of manufacture having a machine-readable medium with machine-readable program code to cause the computer to perform methods described herein. Further, signal 980 can also embodycomputer program product 100. - The processes described herein are not limited to use with any particular hardware and software; they may find applicability in any computing or processing environment and with any type of machine that is capable of running machine-readable instructions. All or part of the processes can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations thereof.
- All or part of the processes can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- Method steps associated with the processes can be performed by one or more programmable processors executing one or more computer programs to perform the functions of the processes. The method steps can also be performed by, and the processes can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) and/or an ASIC (application-specific integrated circuit).
- Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only storage area or a random access storage area or both. Elements of a computer include a processor for executing instructions and one or more storage area devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from, or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile storage area, including by way of example, semiconductor storage area devices, e.g., EPROM, EEPROM, and flash storage area devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
- All or part of the processes can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface, or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a LAN and a WAN, e.g., the Internet.
- Method steps associated with the processes can be rearranged and/or one or more such steps can be omitted to achieve the same, or similar, results to those described herein.
- The data objects described herein may be used to store content, which can include, but is not limited to, text, images, graphics, video or other multimedia content.
- Elements of different embodiments described herein may be combined to form other embodiments not specifically set forth above. Other embodiments not specifically described herein are also within the scope of the following claims.
Claims (20)
1. A method of searching for data objects, the method comprising:
searching a content index for first data objects, the content index storing content of plural data objects, the first data objects containing content that corresponds to content of a search query, the first data objects defining a first search result set;
searching an attribute index for second data objects, the attribute index storing access control attributes for plural data objects, the second data objects having access control attributes that correspond to user access data associated with the search query, the second data objects defining a second search result set; and
obtaining a search result based on the first search result set and the second search result set.
2. The method of claim 1 , wherein the search result comprises pointers to at least some of the first and/or second data objects.
3. The method of claim 1 , wherein obtaining comprises merging the first search result set and the second search result set.
4. The method of claim 3 , wherein merging the first search result set and the second search result set comprises identifying data objects having a predetermined relationship to the first search result set and the second search result set.
5. The method of claim 3 , wherein merging the first search result set and the second search result set comprises performing a logical AND operation on the first search result set and the second search result set to produce a resultant set.
6. The method of claim 4 , further comprising:
merging the resultant set with an additional search result set.
7. The method of claim 6 , wherein merging the resultant set with the additional search result set comprising performing a logical OR operation on the resultant set and the additional search result set.
8. The method of claim 6 , further comprising:
obtaining the additional search result set by searching the attribute index for data objects that have access control attributes that correspond to the user access data and that have metadata that corresponds to the content associated with the search query.
9. The method of claim 1 , wherein the access control attributes comprise metadata.
10. The method of claim 1 , wherein the access control attributes comprise user access right information.
11. The method of claim 1 , wherein the access control attributes comprise at least one of a user name, a user role, a user group name, and at least one user access right.
12. The method of claim 10 , wherein the user access right information comprises at least one of read access, read and write access, and full access.
13. The method of claim 1 , further comprising:
generating the content index by indexing text of data objects.
14. The method of claim 1 , further comprising:
generating the attribute index by indexing metadata of data objects.
15. The method of claim 14 , further comprising:
updating the attribute index by indexing only changes to the access control attributes.
16. A computer program product tangibly embodied in an information carrier, the computer program product comprising instructions that, when executed, cause at least one processor to perform operations comprising:
searching a content index for first data objects, the content index storing content of plural data objects, the first data objects containing content that corresponds to content of a search query, the first data objects defining a first search result set;
searching an attribute index for second data objects, the attribute index storing access control attributes for plural data objects, the second data objects having access control attributes that correspond to user access data associated with the search query, the second data objects defining a second search result set; and
obtaining a search result based on the first search result set and the second search result set.
17. The computer program product of claim 16 , wherein obtaining comprises merging the first search result set and the second search result set.
18. The computer program product of claim 16 , wherein merging the first search result set and the second search result set comprises identifying data objects having a predetermined relationship to the first search result set and the second search result set.
19. The computer program product of claim 16 , wherein merging the first search result set and the second search result set comprises performing a logical AND operation on the first search result set and the second search result set to produce a resultant set.
20. A system for searching for data objects, the system comprising:
memory that stores executable instructions; and
a processing device that executes the executable instructions to:
search a content index for first data objects, the content index storing content of plural data objects, the first data objects containing content that corresponds to content of a search query, the first data objects defining a first search result set;
search an attribute index for second data objects, the attribute index storing access control attributes for plural data objects, the second data objects having access control attributes that correspond to user access data associated with the search query, the second data objects defining a second search result set; and
obtain a search result based on the first search result set and the second search result set.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/358,328 US8732174B2 (en) | 2004-08-06 | 2012-01-25 | Searching for data objects |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102004038544.0 | 2004-08-06 | ||
DE102004038544 | 2004-08-06 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/358,328 Continuation US8732174B2 (en) | 2004-08-06 | 2012-01-25 | Searching for data objects |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060031206A1 true US20060031206A1 (en) | 2006-02-09 |
Family
ID=35427497
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/111,508 Abandoned US20060031206A1 (en) | 2004-08-06 | 2005-04-21 | Searching for data objects |
US13/358,328 Active US8732174B2 (en) | 2004-08-06 | 2012-01-25 | Searching for data objects |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/358,328 Active US8732174B2 (en) | 2004-08-06 | 2012-01-25 | Searching for data objects |
Country Status (2)
Country | Link |
---|---|
US (2) | US20060031206A1 (en) |
EP (1) | EP1624386B1 (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040162816A1 (en) * | 2003-02-13 | 2004-08-19 | Klaus Irle | Text and attribute searches of data stores that include business objects |
US20060149712A1 (en) * | 2004-12-30 | 2006-07-06 | Uwe Kindsvogel | Searching based on object relationships |
US20080104665A1 (en) * | 2006-10-31 | 2008-05-01 | Microsoft Corporation | Analyzing access control configurations |
US20080109427A1 (en) * | 2006-11-07 | 2008-05-08 | Microsoft Corporation | Trimmed and merged search result sets in a versioned data environment |
US20080162603A1 (en) * | 2006-12-28 | 2008-07-03 | Google Inc. | Document archiving system |
US20090063448A1 (en) * | 2007-08-29 | 2009-03-05 | Microsoft Corporation | Aggregated Search Results for Local and Remote Services |
US20090063423A1 (en) * | 2007-06-19 | 2009-03-05 | Jackson Bruce Kelly | User interfaces for service object located in a distributed system |
US20090077480A1 (en) * | 2007-06-19 | 2009-03-19 | Caunter Mark Leslie | Apparatus and method of managing electronic communities of users |
US20090319599A1 (en) * | 2008-06-18 | 2009-12-24 | Caunter Mark Leslie | Remote selection and authorization of collected media transmission |
US20090319385A1 (en) * | 2008-06-18 | 2009-12-24 | Jackson Bruce Kelly | Monetizing and prioritizing results of a distributed search |
US20090319615A1 (en) * | 2008-06-18 | 2009-12-24 | Caunter Mark Leslie | Persistent personal messaging in a distributed system |
US20090320097A1 (en) * | 2008-06-18 | 2009-12-24 | Jackson Bruce Kelly | Method for carrying out a distributed search |
US7657626B1 (en) | 2006-09-19 | 2010-02-02 | Enquisite, Inc. | Click fraud detection |
US7685191B1 (en) | 2005-06-16 | 2010-03-23 | Enquisite, Inc. | Selection of advertisements to present on a web page or other destination based on search activities of users who selected the destination |
US20100257206A1 (en) * | 2009-04-07 | 2010-10-07 | International Business Machines Corporation | Visibility Control of Resources |
US8082242B1 (en) * | 2006-12-29 | 2011-12-20 | Google Inc. | Custom search |
US8364529B1 (en) | 2008-09-05 | 2013-01-29 | Gere Dev. Applications, LLC | Search engine optimization performance valuation |
US20140096031A1 (en) * | 2012-09-28 | 2014-04-03 | Ge Medical Systems Global Technology Company, Llc | Image display system and image display device |
US8732174B2 (en) | 2004-08-06 | 2014-05-20 | Sap Ag | Searching for data objects |
US20150256566A1 (en) * | 2014-03-06 | 2015-09-10 | Call-It-Out, Inc. | Project Collaboration |
US20160125049A1 (en) * | 2014-11-01 | 2016-05-05 | Veeva Systems Inc. | System and method for reporting multiple objects in enterprise content management |
US20180218043A1 (en) * | 2012-04-26 | 2018-08-02 | Alibaba Group Holding Limited | Information providing method and system |
CN109902255A (en) * | 2019-02-27 | 2019-06-18 | 百度在线网络技术(北京)有限公司 | Page mixing browsing record generation method, device, equipment and storage medium |
US10496663B2 (en) | 2016-06-16 | 2019-12-03 | International Business Machines Corporation | Search journaling for operations analysis |
US10579442B2 (en) | 2012-12-14 | 2020-03-03 | Microsoft Technology Licensing, Llc | Inversion-of-control component service models for virtual environments |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9846696B2 (en) | 2012-02-29 | 2017-12-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Apparatus and methods for indexing multimedia content |
US9633015B2 (en) * | 2012-07-26 | 2017-04-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Apparatus and methods for user generated content indexing |
US8924425B1 (en) * | 2012-12-06 | 2014-12-30 | Netapp, Inc. | Migrating data from legacy storage systems to object storage systems |
US9047325B2 (en) * | 2013-04-08 | 2015-06-02 | International Business Machines Corporation | Modularizing complex XML data for generation and extraction |
US10445367B2 (en) | 2013-05-14 | 2019-10-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Search engine for textual content and non-textual content |
US9830354B2 (en) * | 2013-08-07 | 2017-11-28 | International Business Machines Corporation | Accelerating multiple query processing operations |
US9251218B2 (en) | 2013-08-07 | 2016-02-02 | International Business Machines Corporation | Tunable hardware sort engine for performing composite sorting algorithms |
US9619499B2 (en) | 2013-08-07 | 2017-04-11 | International Business Machines Corporation | Hardware implementation of a tournament tree sort algorithm |
US9495418B2 (en) | 2013-08-07 | 2016-11-15 | International Business Machines Corporation | Scalable acceleration of database query operations |
US10311038B2 (en) | 2013-08-29 | 2019-06-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods, computer program, computer program product and indexing systems for indexing or updating index |
WO2015030646A1 (en) | 2013-08-29 | 2015-03-05 | Telefonaktiebolaget L M Ericsson (Publ) | Method, content owner device, computer program, and computer program product for distributing content items to authorized users |
US10310813B2 (en) | 2014-12-29 | 2019-06-04 | International Business Machines Corporation | Hardware implementation of a tournament tree sort algorithm using an external memory |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010027451A1 (en) * | 2000-03-29 | 2001-10-04 | Fujitsu Limited | Information processing apparatus |
US20030018632A1 (en) * | 1999-10-28 | 2003-01-23 | International Business Machines Corporation | System for organizing an annotation structure and for querying data and annotations |
US20030018624A1 (en) * | 2001-07-20 | 2003-01-23 | International Business Machines Corporation | Scalable eContent management system and method of using the same |
US20030088576A1 (en) * | 1997-10-22 | 2003-05-08 | Masakazu Hattori | Object-oriented data storage and retrieval system using index table |
US20030105746A1 (en) * | 2001-03-21 | 2003-06-05 | Patrick Stickler | Query resolution system and service |
US6704747B1 (en) * | 1999-03-16 | 2004-03-09 | Joseph Shi-Piu Fong | Method and system for providing internet-based database interoperability using a frame model for universal database |
US20040122958A1 (en) * | 2002-12-19 | 2004-06-24 | International Business Machines Corporation | Method and system for peer-to-peer authorization |
US20040143569A1 (en) * | 2002-09-03 | 2004-07-22 | William Gross | Apparatus and methods for locating data |
US20040162816A1 (en) * | 2003-02-13 | 2004-08-19 | Klaus Irle | Text and attribute searches of data stores that include business objects |
US20050050023A1 (en) * | 2003-08-29 | 2005-03-03 | Gosse David B. | Method, device and software for querying and presenting search results |
US20050076024A1 (en) * | 2003-10-06 | 2005-04-07 | International Business Machines Corporation | System, method and program for database searching |
US20050256865A1 (en) * | 2004-05-14 | 2005-11-17 | Microsoft Corporation | Method and system for indexing and searching databases |
US7062563B1 (en) * | 2001-02-28 | 2006-06-13 | Oracle International Corporation | Method and system for implementing current user links |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2048039A1 (en) * | 1991-07-19 | 1993-01-20 | Steven Derose | Data processing system and method for generating a representation for and random access rendering of electronic documents |
US7007034B1 (en) * | 2000-01-21 | 2006-02-28 | International Business Machines Corporation | File structure for storing content objects in a data repository |
WO2002017123A2 (en) | 2000-08-24 | 2002-02-28 | Debellis Joseph L | Search-on-the-fly with merge function |
US6654734B1 (en) * | 2000-08-30 | 2003-11-25 | International Business Machines Corporation | System and method for query processing and optimization for XML repositories |
US7882258B1 (en) * | 2003-02-05 | 2011-02-01 | Silver Screen Tele-Reality, Inc. | System, method, and computer readable medium for creating a video clip |
JP4326236B2 (en) * | 2003-02-28 | 2009-09-02 | ソニー株式会社 | Recording apparatus and method |
JP2004310621A (en) * | 2003-04-10 | 2004-11-04 | Hitachi Ltd | File access method, and program for file access in storage system |
US7546284B1 (en) * | 2003-06-11 | 2009-06-09 | Blue Titan Software, Inc. | Virtual message persistence service |
US7296011B2 (en) * | 2003-06-20 | 2007-11-13 | Microsoft Corporation | Efficient fuzzy match for evaluating data records |
DE10333530A1 (en) * | 2003-07-23 | 2005-03-17 | Siemens Ag | Automatic indexing of digital image archives for content-based, context-sensitive search |
US20050114319A1 (en) * | 2003-11-21 | 2005-05-26 | Microsoft Corporation | System and method for checking a content site for efficacy |
US20060031206A1 (en) | 2004-08-06 | 2006-02-09 | Christian Deubel | Searching for data objects |
US20060095345A1 (en) * | 2004-10-28 | 2006-05-04 | Microsoft Corporation | System and method for an online catalog system having integrated search and browse capability |
-
2005
- 2005-04-21 US US11/111,508 patent/US20060031206A1/en not_active Abandoned
- 2005-04-21 EP EP05008735.2A patent/EP1624386B1/en active Active
-
2012
- 2012-01-25 US US13/358,328 patent/US8732174B2/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030088576A1 (en) * | 1997-10-22 | 2003-05-08 | Masakazu Hattori | Object-oriented data storage and retrieval system using index table |
US6704747B1 (en) * | 1999-03-16 | 2004-03-09 | Joseph Shi-Piu Fong | Method and system for providing internet-based database interoperability using a frame model for universal database |
US20030018632A1 (en) * | 1999-10-28 | 2003-01-23 | International Business Machines Corporation | System for organizing an annotation structure and for querying data and annotations |
US20010027451A1 (en) * | 2000-03-29 | 2001-10-04 | Fujitsu Limited | Information processing apparatus |
US7062563B1 (en) * | 2001-02-28 | 2006-06-13 | Oracle International Corporation | Method and system for implementing current user links |
US20030105746A1 (en) * | 2001-03-21 | 2003-06-05 | Patrick Stickler | Query resolution system and service |
US20030018624A1 (en) * | 2001-07-20 | 2003-01-23 | International Business Machines Corporation | Scalable eContent management system and method of using the same |
US20040143569A1 (en) * | 2002-09-03 | 2004-07-22 | William Gross | Apparatus and methods for locating data |
US20040122958A1 (en) * | 2002-12-19 | 2004-06-24 | International Business Machines Corporation | Method and system for peer-to-peer authorization |
US20040162816A1 (en) * | 2003-02-13 | 2004-08-19 | Klaus Irle | Text and attribute searches of data stores that include business objects |
US20050050023A1 (en) * | 2003-08-29 | 2005-03-03 | Gosse David B. | Method, device and software for querying and presenting search results |
US20050076024A1 (en) * | 2003-10-06 | 2005-04-07 | International Business Machines Corporation | System, method and program for database searching |
US20050256865A1 (en) * | 2004-05-14 | 2005-11-17 | Microsoft Corporation | Method and system for indexing and searching databases |
Cited By (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040162816A1 (en) * | 2003-02-13 | 2004-08-19 | Klaus Irle | Text and attribute searches of data stores that include business objects |
US7133867B2 (en) | 2003-02-13 | 2006-11-07 | Sap Aktiengesellschaft | Text and attribute searches of data stores that include business objects |
US8732174B2 (en) | 2004-08-06 | 2014-05-20 | Sap Ag | Searching for data objects |
US20060149712A1 (en) * | 2004-12-30 | 2006-07-06 | Uwe Kindsvogel | Searching based on object relationships |
US8745020B2 (en) | 2005-06-16 | 2014-06-03 | Gere Dev. Applications, LLC. | Analysis and reporting of collected search activity data over multiple search engines |
US10599735B2 (en) | 2005-06-16 | 2020-03-24 | Gula Consulting Limited Liability Company | Auto-refinement of search results based on monitored search activities of users |
US9965561B2 (en) | 2005-06-16 | 2018-05-08 | Gula Consulting Limited Liability Company | Auto-refinement of search results based on monitored search activities of users |
US9268862B2 (en) | 2005-06-16 | 2016-02-23 | Gere Dev. Applications, LLC | Auto-refinement of search results based on monitored search activities of users |
US8832055B1 (en) * | 2005-06-16 | 2014-09-09 | Gere Dev. Applications, LLC | Auto-refinement of search results based on monitored search activities of users |
US8812473B1 (en) * | 2005-06-16 | 2014-08-19 | Gere Dev. Applications, LLC | Analysis and reporting of collected search activity data over multiple search engines |
US8751473B2 (en) | 2005-06-16 | 2014-06-10 | Gere Dev. Applications, LLC | Auto-refinement of search results based on monitored search activities of users |
US7844590B1 (en) | 2005-06-16 | 2010-11-30 | Eightfold Logic, Inc. | Collection and organization of actual search results data for particular destinations |
US11188604B2 (en) | 2005-06-16 | 2021-11-30 | Gula Consulting Limited Liability Company | Auto-refinement of search results based on monitored search activities of users |
US7685191B1 (en) | 2005-06-16 | 2010-03-23 | Enquisite, Inc. | Selection of advertisements to present on a web page or other destination based on search activities of users who selected the destination |
US11809504B2 (en) | 2005-06-16 | 2023-11-07 | Gula Consulting Limited Liability Company | Auto-refinement of search results based on monitored search activities of users |
US8312002B2 (en) | 2005-06-16 | 2012-11-13 | Gere Dev. Applications, LLC | Selection of advertisements to present on a web page or other destination based on search activities of users who selected the destination |
US9152977B2 (en) | 2006-06-16 | 2015-10-06 | Gere Dev. Applications, LLC | Click fraud detection |
US7657626B1 (en) | 2006-09-19 | 2010-02-02 | Enquisite, Inc. | Click fraud detection |
US8103543B1 (en) | 2006-09-19 | 2012-01-24 | Gere Dev. Applications, LLC | Click fraud detection |
US8682718B2 (en) | 2006-09-19 | 2014-03-25 | Gere Dev. Applications, LLC | Click fraud detection |
US8266702B2 (en) * | 2006-10-31 | 2012-09-11 | Microsoft Corporation | Analyzing access control configurations |
US20080104665A1 (en) * | 2006-10-31 | 2008-05-01 | Microsoft Corporation | Analyzing access control configurations |
US8701200B2 (en) | 2006-10-31 | 2014-04-15 | Microsoft Corporation | Analyzing access control configurations |
US7765195B2 (en) | 2006-11-07 | 2010-07-27 | Microsoft Corporation | Trimmed and merged search result sets in a versioned data environment |
US20080109427A1 (en) * | 2006-11-07 | 2008-05-08 | Microsoft Corporation | Trimmed and merged search result sets in a versioned data environment |
US20080162603A1 (en) * | 2006-12-28 | 2008-07-03 | Google Inc. | Document archiving system |
US8082242B1 (en) * | 2006-12-29 | 2011-12-20 | Google Inc. | Custom search |
US20090063423A1 (en) * | 2007-06-19 | 2009-03-05 | Jackson Bruce Kelly | User interfaces for service object located in a distributed system |
US20090077480A1 (en) * | 2007-06-19 | 2009-03-19 | Caunter Mark Leslie | Apparatus and method of managing electronic communities of users |
US20090063448A1 (en) * | 2007-08-29 | 2009-03-05 | Microsoft Corporation | Aggregated Search Results for Local and Remote Services |
US8977710B2 (en) * | 2008-06-18 | 2015-03-10 | Qualcomm, Incorporated | Remote selection and authorization of collected media transmission |
US20090320097A1 (en) * | 2008-06-18 | 2009-12-24 | Jackson Bruce Kelly | Method for carrying out a distributed search |
US20090319615A1 (en) * | 2008-06-18 | 2009-12-24 | Caunter Mark Leslie | Persistent personal messaging in a distributed system |
US20090319385A1 (en) * | 2008-06-18 | 2009-12-24 | Jackson Bruce Kelly | Monetizing and prioritizing results of a distributed search |
US20090319599A1 (en) * | 2008-06-18 | 2009-12-24 | Caunter Mark Leslie | Remote selection and authorization of collected media transmission |
US8930531B2 (en) | 2008-06-18 | 2015-01-06 | Qualcomm Incorporated | Persistent personal messaging in a distributed system |
US9680949B2 (en) | 2008-06-18 | 2017-06-13 | Qualcomm Incorporated | Remote selection and authorization of collected media transmission |
JP2011525281A (en) * | 2008-06-18 | 2011-09-15 | クゥアルコム・インコーポレイテッド | Method for performing a distributed search |
CN103279576A (en) * | 2008-06-18 | 2013-09-04 | 高通股份有限公司 | Method for carrying out a distributed search |
US8060603B2 (en) | 2008-06-18 | 2011-11-15 | Qualcomm Incorporated | Persistent personal messaging in a distributed system |
US9183301B2 (en) | 2008-09-05 | 2015-11-10 | Gere Dev. Applications, LLC | Search engine optimization performance valuation |
US8364529B1 (en) | 2008-09-05 | 2013-01-29 | Gere Dev. Applications, LLC | Search engine optimization performance valuation |
US8676847B2 (en) | 2009-04-07 | 2014-03-18 | International Business Machines Corporation | Visibility control of resources |
US20100257206A1 (en) * | 2009-04-07 | 2010-10-07 | International Business Machines Corporation | Visibility Control of Resources |
US20180218043A1 (en) * | 2012-04-26 | 2018-08-02 | Alibaba Group Holding Limited | Information providing method and system |
US20140096031A1 (en) * | 2012-09-28 | 2014-04-03 | Ge Medical Systems Global Technology Company, Llc | Image display system and image display device |
US10579442B2 (en) | 2012-12-14 | 2020-03-03 | Microsoft Technology Licensing, Llc | Inversion-of-control component service models for virtual environments |
US20150256566A1 (en) * | 2014-03-06 | 2015-09-10 | Call-It-Out, Inc. | Project Collaboration |
US9619533B2 (en) * | 2014-11-01 | 2017-04-11 | Veeva Systems Inc. | System and method for reporting multiple objects in enterprise content management |
US20160125049A1 (en) * | 2014-11-01 | 2016-05-05 | Veeva Systems Inc. | System and method for reporting multiple objects in enterprise content management |
US10496663B2 (en) | 2016-06-16 | 2019-12-03 | International Business Machines Corporation | Search journaling for operations analysis |
CN109902255A (en) * | 2019-02-27 | 2019-06-18 | 百度在线网络技术(北京)有限公司 | Page mixing browsing record generation method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
EP1624386A3 (en) | 2006-04-19 |
EP1624386B1 (en) | 2013-08-28 |
US8732174B2 (en) | 2014-05-20 |
US20120124055A1 (en) | 2012-05-17 |
EP1624386A2 (en) | 2006-02-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8732174B2 (en) | Searching for data objects | |
JP5787963B2 (en) | Computer platform programming interface | |
Lange | An object-oriented design method for hypermedia information systems | |
JP5559140B2 (en) | Representation of computing environment | |
Franklin et al. | From databases to dataspaces: a new abstraction for information management | |
JP2020091902A (en) | Versioned hierarchical type data structure of distributed type data store | |
US7685106B2 (en) | Sharing of full text index entries across application boundaries | |
JP4738908B2 (en) | System and method for providing contention processing for peer-to-peer synchronization of units of information manageable by a hardware / software interface system | |
JP4394643B2 (en) | System and method for data modeling in an item-based storage platform | |
KR20200093569A (en) | Resolving violations in client synchronization | |
US20080104032A1 (en) | Method and System for Organizing Items | |
US7991767B2 (en) | Method for providing a shared search index in a peer to peer network | |
US20140236958A1 (en) | Evolving metadata | |
JP2000090074A (en) | Managing method for document | |
JP2007521533A (en) | System and method for interfacing application programs with item-based storage platforms | |
MXPA05007092A (en) | Systems and methods for providing synchronization services for units of information manageable by a hardware/software interface system. | |
MXPA05005535A (en) | Anti virus for an item store. | |
MXPA05006260A (en) | Systems and methods for extensions and inheritance for units of information manageable by a hardware/software interface system. | |
Williams | The associative model of data | |
US10944756B2 (en) | Access control | |
JP4394644B2 (en) | Storage platform for organizing, searching, and sharing data | |
US9348978B2 (en) | Universal content traceability | |
US20210349888A1 (en) | Personalized Spelling Correction | |
Chen et al. | Search your memory!-an associative memory based desktop search system | |
Catarci et al. | Structure everything |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SAP AKTIENGESELLSCHAFT, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DEUBEL, CHRISTIAN;GUTH, GERTRUDE;REEL/FRAME:016297/0304;SIGNING DATES FROM 20050408 TO 20050414 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |
|
AS | Assignment |
Owner name: SAP SE, GERMANY Free format text: CHANGE OF NAME;ASSIGNOR:SAP AG;REEL/FRAME:033625/0223 Effective date: 20140707 |