US20060031206A1 - Searching for data objects - Google Patents

Searching for data objects Download PDF

Info

Publication number
US20060031206A1
US20060031206A1 US11/111,508 US11150805A US2006031206A1 US 20060031206 A1 US20060031206 A1 US 20060031206A1 US 11150805 A US11150805 A US 11150805A US 2006031206 A1 US2006031206 A1 US 2006031206A1
Authority
US
United States
Prior art keywords
data objects
search result
result set
search
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/111,508
Inventor
Christian Deubel
Gertrude Guth
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAP SE
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Assigned to SAP AKTIENGESELLSCHAFT reassignment SAP AKTIENGESELLSCHAFT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GUTH, GERTRUDE, DEUBEL, CHRISTIAN
Publication of US20060031206A1 publication Critical patent/US20060031206A1/en
Priority to US13/358,328 priority Critical patent/US8732174B2/en
Assigned to SAP SE reassignment SAP SE CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SAP AG
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/38Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/80Information retrieval; Database structures therefor; File system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
    • G06F16/81Indexing, e.g. XML tags; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9538Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/48Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/489Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using time information

Definitions

  • This patent application relates generally to searching for data objects.
  • Enterprise solutions use data objects to represent real world items and other information.
  • data objects can be used to store content including, but not limited to, text, images, graphics, video, and/or multimedia.
  • a business object is a special type of data object that can be used to represent information related to a business including, but not limited to, folders, documents, bookmarks, materials, material lists, item lists, data sheets, presentations, and text documents.
  • Data objects can be used to support collaborations, competitions, or official tenders.
  • a public tender can be implemented using a public folder, in which each bidding party can have a reserved area with folders. Inside these folders, bidding parties can read tender documents for particular items, store their bids, and store additional data and communications between parties. Since the data objects are stored centrally, access rights to the data objects need to be managed. For example, it should be possible to prohibit certain users from accessing all data objects. That is, two bidding parties should not be able to access each others' bidding or communication objects.
  • Metadata is data that not directly related to object content. Metadata can include object attributes, such as object identifiers, object names, time stamps, access control attributes, object locations, times of object creation, creator names, object change times, identities of users making changes, and the like. Access control attributes may specify who has access to a particular data object.
  • the access control attributes can specify the identity of a user, a group of users, and/or users having a particular role, who have access to data objects.
  • the access control attributes can also include access right information. Access right information specifies an extent of access. For example, certain users may be permitted only to read a data object, whereas other users may be permitted both to read and to edit the data object.
  • Search engines may be used to search databases, including databases that contain data objects.
  • One disadvantage of conventional search engines is that they do not take user access rights into account when returning search results.
  • This patent application features methods, systems, and apparatus, including computer program products, for use in searching for data objects. Aspects of the methods, systems, and apparatus are set forth below.
  • the invention is directed to searching for data objects.
  • This aspect includes searching a content index for first data objects, where the content index stores content of plural data objects, where the first data objects contain content that corresponds to content of a search query, and where the first data objects define a first search result set.
  • the search for data objects also includes searching an attribute index for second data objects, where the attribute index stores access control attributes for plural data objects, where the second data objects have access control attributes that correspond to user access data associated with the search query, and where the second data objects define a second search result set.
  • a search result is obtained based on the first search result set and the second search result set.
  • This aspect may also include one or more of the following.
  • the search result may include pointers to at least some of the first and/or second data objects.
  • the search result may be obtained by merging the first search result set and the second search result set.
  • Merging the first search result set and the second search result set may include identifying data objects having a predetermined relationship to the first search result set and the second search result set.
  • Merging the first search result set and the second search result set may include performing a logical AND operation on the first search result set and the second search result set to produce a resultant set.
  • the resultant set may be merged with an additional search result set.
  • Merging the resultant set with the additional search result set may include performing a logical OR operation on the resultant set and the additional search result set.
  • the additional search result set may be obtained by searching the attribute index for data objects that have access control attributes that correspond to the user access data and that have metadata that corresponds to the content associated with the search query.
  • the access control attributes may be metadata, and may include user access right information.
  • the access control attributes may include at least one of a user name, a user role, a user group name, and at least one user access right.
  • the user access right may include at least one of read access, read and write access, and full access.
  • the content index may be generated by indexing text of data objects.
  • the attribute index may be generated by indexing metadata of data objects.
  • the attribute index may be updated by indexing only changes to the access control attributes.
  • FIG. 1 is a block diagram of a computer system on which the processes described herein may be implemented.
  • FIG. 2 a is a block diagram of a system that may be used to search for data objects.
  • FIG. 2 b is a block diagram of search engine that may be incorporated into the system of FIG. 2 a.
  • FIG. 3 is a flowchart showing a process for searching for data objects using the search engine of FIG. 2 b and the system of FIG. 2 a.
  • FIG. 4 is a diagram showing indexing of documents and their attributes.
  • FIG. 5 is a diagram of a search query used in the process of FIG. 3 .
  • FIG. 6 is a screenshot showing access authorization of folders.
  • FIG. 7 is a unified modeling language (UML) sequence chart showing a process for indexing data objects and/or attributes of data objects.
  • UML unified modeling language
  • FIG. 8 is a UML sequence chart showing a process for indexing only changes to data objects and/or attributes of data objects.
  • FIG. 9 is block diagram showing ways of combining results of searches conducted according to the process of FIG. 3 .
  • FIG. 10 a is a screenshot of a user interface that may be generated by the search engine of FIG. 2 b.
  • FIG. 10 b is a screenshot of search results that may be produced by the search engine of FIG. 2 b.
  • FIG. 2 shows a computer system 199 , on which the processes described herein may be implemented.
  • Computer system 199 includes a Web server 200 and a user interface 260 .
  • Web server 200 generates user interface 260 .
  • user interface 260 includes a registration page 260 a and a search page 260 b .
  • An example of search page 260 b is shown in FIG. 10 a (described below).
  • Computer system 199 also a database server 201 , an index server 202 , and a robot server 203 .
  • Registration page 260 a can be used to register Web sites with the Web server 200 .
  • Web server 200 operates as middleware between registration page 206 a and database server 201 .
  • URL uniform resource locator
  • index server can reject certain registrations.
  • index server 202 can include functionality to block URLs of Web sites, such as “spam sites”, from being indexed.
  • URLs in index server 202 are processed by robot server 203 .
  • Robot server 203 generates robot programs for searching corresponding Web sites hosted by host computers 204 , 205 , 206 . These robot programs analyze the content and attributes of data objects in the Web sites, and provide the results of their analyses to index server 202 .
  • Index server 202 uses these results to index content and the attributes of the data objects.
  • a user enters a search query on search page 260 b .
  • the search query is sent to index server 202 , where the search query is processed.
  • Data objects that meet one or more criteria of the search query are located, information relating to the objects is retrieved, and search results containing this information are presented to the user.
  • Database server 201 can be used to present page 260 b and search results to the user.
  • Index server 202 is used in connection with a search engine 212 that may be implemented using system 199 or portions thereof, as shown in FIG. 2 b .
  • search engine 212 includes, among other things, a name server 213 , a pre-processor 214 , a queue server 215 , and index server 202 .
  • Index server 202 includes a text mining engine 202 a and corresponding index 202 d, a text search engine 202 b and corresponding index 202 e, and an attribute engine 202 c and corresponding index 202 f.
  • Indices 202 d and 202 e can be content indexes, which enable full-text searches of content of data objects.
  • Index 202 f can be an attribute index, which indexes attributes, rather than content, of data objects. As a result, index 202 f enables searches for data objects based on their attributes, rather than their content.
  • FIG. 4 shows one way of indexing documents that can be used with the processes described herein.
  • FIG. 4 shows a search index 402 , which includes an attribute index 404 and a content index 406 .
  • Content index 406 includes a dictionary of all words in one or more documents.
  • Search index 402 provides, for each word in content index 406 , a link to corresponding document information in attribute index 404 .
  • “Word 1 ” is used in “Doc 1 ”, “Doc 2 ”, and “Doc 3 ”.
  • content index 406 includes a list of document links, “Doclink 1 ”, “Doc 1 ink 2 ”, and “Doc 1 ink 3 ”, which provide links to corresponding documents “Doc 1 ”, “Doc 2 ”, and “Doc 3 ” in attribute index 404 .
  • Each document in attribute index 404 includes information, “DocInfo”, about the document.
  • DocInfo may include one or more pointers to corresponding document(s) in memory.
  • Attribute index 404 stores information about each document, as opposed to document content. This information can be stored as metadata and may include, e.g., attributes of the document, a name of the document, and access control attributes associated with the document.
  • the attributes can include object identifiers (IDs), collaboration IDs, topic IDs, folder IDs, and area IDs.
  • the access control attributes can include a user name, a user group, and/or a user role in combination with an access right for a corresponding data object.
  • the access right can specify an ability to access the document, such whether to provide a user or group with read and/or write or full access to a particular document.
  • search engine 212 is accessible to Web server 200 and to other applications, such as application 218 .
  • search engine 212 incorporates a front-end remote function call (RFC) server 216 .
  • Applications 218 can access search engine 212 by way of remote function calls generated, e.g., by a gateway 217 associated with application 218 .
  • FIG. 3 shows a process 299 for executing searches using search engine 212 of FIG. 2 b .
  • Process 299 includes generating ( 300 ) one or more content indices for data objects, and generating ( 302 ) one or more attribute indices for the data objects.
  • FIGS. 7 and 8 show examples of processes for generating the indices used in process 299 .
  • Search engine 212 receives ( 304 ) a search query.
  • An example of a search query 500 is shown in FIG. 5 .
  • search query 500 includes a search statement 502 and user access data 504 .
  • Search statement 502 can be a string of characters, which correspond to content of data objects to be searched.
  • Search statement 502 can also be a string of characters that correspond to attributes of the data objects to be searched.
  • Search query 500 also includes user access data 504 .
  • User access data 504 can include data that identifies the user who generated the search query. For example, user access data 504 can identify the “current user”, a “current group” that the user is in, and/or a “current role” of the user in that group. In this regard, the user can participate in several groups and can have several roles, each of which can be reflected in search query 500 .
  • process 299 searches ( 306 ) content index 406 for data objects that correspond to parameters of search statement 502 .
  • Searching for data objects within content index 406 includes searching for data objects with elements of content that at least partially meet (e.g., match, or are similar to) parameters of the search statement.
  • All data objects that are obtained ( 310 ) by searching content index 406 constitute a first search result set.
  • the first search result set can include the data objects themselves, IDs or other indicia associated with the data objects, or links or pointers to the data objects.
  • the links or pointers can be references to storage locations of the data objects. Fuzzy logic may be used to perform the search.
  • Such a search may identify data objects with elements of data that are similar, in some way, to parameters of the search query (as opposed to matching the parameters of the search query exactly).
  • process 299 searches ( 308 ) attribute index 404 for data objects that correspond to user access data 504 . That is, process 299 searches for data objects with access control attributes that correspond to access control attributes for the user, which correspond to user access data 504 .
  • Search engine 212 can search for data objects with access control attributes containing the user's name, the user's groups, and/or the user's roles.
  • Process 299 can also determine whether access right information for the user's name, group, and/or role specifies at least read access, meaning that the user is permitted to read information, but not to write the information.
  • Other levels of access include read and write access, in which a user is allowed both to read and to write to the information, and full access, in which the user is permitted virtually unfettered access to the information. It is possible to require that all user names, groups and/or roles stored in the access control attributes be at least read access before allowing the user access to the corresponding data objects.
  • Search engine 212 can also search in attribute index 404 for areas, folders, collaborations, and/or other hierarchical objects, which correspond to the user name, the user groups, and/or the user roles, and which grant at least read access to the user.
  • All data objects that are obtained ( 312 ) as a result of searches performed on attribute index 404 constitute a second search result set.
  • This second search result set can identify, e.g., all data objects for which the user has at least read access.
  • the second search result sets can include the data objects themselves, IDs or other indicia associated with the data objects, or links or pointers to the data objects.
  • the links or pointers can be references to storage locations of the data objects. Fuzzy logic may be used to perform the search.
  • Process 299 merges ( 314 ) the first search result set and the second search result set to thereby obtain an overall search result set.
  • This overall search result set is presented to the user as the end-result of the user's query using the search engine.
  • Merging the first and second search result sets can include combining the first search result set with the second search result set. Other methods of merging search results sets may also be used.
  • FIG. 9 shows ways of merging search result sets.
  • FIG. 9 shows merging search results from different indices into an overall search result set.
  • content indices 902 and 904 are the same type of index as content index 406
  • attribute index 902 is the same type of index as attribute index 404 .
  • “AND” 906 indicates a logical AND operation
  • “OR” 908 indicates a logical OR operation. These logical operations may be performed on index search results.
  • results of searches of context index 904 and of attribute index 902 may be combined using a logical AND, resulting in an overall search result that contains only elements that are common to both searches (e.g., only those data objects that have content with elements of data that meet the search query and that permit read access by the user are provided as search result set 910 ).
  • This logical AND operation may be used alone to combine search results.
  • the logical AND operation may be augmented with other logical operation(s) (as depicted in FIG. 9 ).
  • a user may want to search for data objects that were created at a particular time.
  • This information can be entered into search engine 212 as a search query.
  • the timing information is stored in the metadata of data objects.
  • determination of search result set 910 can include using logical OR 908 to merge the additional search result set with the previous search result set produced by logical AND 906 .
  • data objects in search result set 910 will either have elements of data that meet the search query or have elements of data in their metadata that meet the search query. The resulting data objects also permit at least read access to the user.
  • FIG. 9 shows only some ways of merging search results. Any methods may be used in addition to, or instead of, those above, including, but not limited to, filtering the results and processing the results using one or more computer programs.
  • FIGS. 7 and 8 show examples of processes for generating the indices used in process 299 .
  • FIG. 7 shows a process 701 for generating an attribute index from a set of data objects.
  • Process 701 may also be used to generate a content index.
  • the actors of process 701 may include software modules and/or hardware.
  • an index may be generated from a predetermined set data objects.
  • an administration module 702 sends a request, FullIndexing, for a full indexing 710 , meaning all objects are to be indexed.
  • a dispatching module 704 processes this request to obtain a message, GetObjectIdList, that is used to retrieve IDs of data objects to be indexed. In this case, all available data objects are to be indexed; however, in other cases, a subset of data objects may be targeted for indexing.
  • the foregoing GetObjectIdList message is processed by a server 706 , which stores the data objects, e.g., business objects for a collaboration folder (cFolders) structure.
  • Server 706 instantiates the data objects to obtain the data objects' IDs.
  • the data objects' metadata is also obtained from the instantiated objects, and stored by server 706 .
  • Server 706 returns, to dispatching module 704 , a table, TabObjectsIds, which lists the data objects' IDs. Module 704 uses this table to request, via a GetAttributesNameList message, an attribute name list for the data objects from the server 706 . In response, server 706 returns, to dispatching module 704 , a table, TabAttributeNames. This table contains names of attributes of the data objects listed in the table.
  • Module 704 sends a message, GetAttributeValues, to server 706 and, in response, receives a table, TabAttributeValues, of attribute values for the named attributes.
  • the data object IDs, together with their attributes and attribute values, are provided to an index server 708 of a search engine via a FeedIndex message.
  • Index server 708 generates, and stores, the index for the named data objects.
  • Index server 708 reports successful generation of an index to administration module 702 and status information to module 704 . It is noted that index server 708 corresponds to index server 202 of FIG. 2 a.
  • the attribute information may include a hierarchical folder structure for data objects. This information enables searching to be limited to a particular area, folder or other hierarchy, within a data structure. Generating the attribute index can also include indexing root information and area information for the data objects. This information can be used to determine a position of a data object within a database.
  • Foregoing process 701 may be used to index metadata and/or the content (i.e., full-text) of data objects. Because indexing data objects can be time consuming, the data objects can be indexed periodically. Periodic indexing can include indexing only changed values.
  • FIG. 8 illustrates a unified modeling language (UML) sequence chart for such indexing, which is referred to herein as “delta-indexing”.
  • UML unified modeling language
  • administration module 702 calls a routine, DeltaIndexing, which performs delta-indexing.
  • Module 704 analyzes a log file to determine object IDs of data object that have changed since a last indexing.
  • the log file may be maintained by a one or more computers used to perform process 801 , by one or more computers that store the data objects, by a combination thereof.
  • the list of data object IDs is provided to server 706 in a message, GetAttributeNameList.
  • server 706 In response to GetAttributeNameList, server 706 returns a list, TabAttributesNames, that contains data objects that have changed. The list also identifies attributes of those data objects, and which attributes have changed. Module 704 requests the values of the changed attributes in a message, GetAttributesValues, which identifies data objects for which values are requested. Server 706 responds to GetAttributesValues with a table of attribute values, TabAttributesValues, for data objects identified in GetAttributesValues. To obtain values of the attributes, instances of the data objects may be created and metadata therefor may be read.
  • the attribute values contain access control attributes, which can be used in search engine 212 to support searches using access control.
  • the obtained attribute values are provided by module 704 to index server 708 .
  • Index server 708 updates its index using the values.
  • Index server 708 confirms an index update with appropriate response messages.
  • Page 600 includes a frame 602 with hierarchical folder information.
  • the selected folder in this case is “hard disk”.
  • frame 604 shows different access control attributes including a username, a group, or a role, and user access right information.
  • the user access right information can be inherited from parent data object(s), or it can be defined independently for each data object.
  • the user group “Advanced Technology” has read access to the selected folder; the user “James Brown” has administrative access to the selected folder; and the user group “Integrated Solutions” has no access to the selected folder.
  • FIG. 10 a shows a screenshot of a search page 1000 , which may be generated by search engine 212 to search a database.
  • search page 1000 a user can specify a folder to search in field 1001 .
  • This folder can be a root folder or any sub-folder.
  • the selection of a folder can be used in generation of an attribute search for that folder.
  • This attribute can be the folder ID for data objects that were identified as a result of a search.
  • a user can specify additional attributes, such as, a name, a description, a date of creation, a name of creator, change data, a name of a user who changed data, or other metadata.
  • additional attributes such as, a name, a description, a date of creation, a name of creator, change data, a name of a user who changed data, or other metadata.
  • the user can also specify, in field 1002 b , a search query, which, in this example is “sap”.
  • a search button 1004 is provided. Upon selecting search button 1004 , search engine 212 is activated to obtain a search result set, which is provided in the page shown in FIG. 12 b.
  • search engine 212 When selecting search button 1004 , a search query, including any specified attributes, is provided to search engine 212 .
  • the user who initiated the search request is identified. This can be done by instructing the user to register with system 199 ( FIG. 1 ) upon first use. The identity of the user can also be determined by the user's login name or other identifying indicia. Additionally, at least one user role, or at least one user group is determined. This user access data also provided with the search query.
  • the search query and associated attributes are processed by search engine 212 in the manner described above in FIG. 3 .
  • the search results sets are combined in the manner described above in FIG. 9 , and the results are output, e.g., in page 1003 ( FIG. 10 b ).
  • page 1003 include a frame 1006 that identifies a folder in which the search was conducted.
  • Another frame 1008 presents data objects that turned up during the search.
  • the data objects may be presented with their names, their descriptions, and their original locations.
  • the data objects can be referred to via a link, through which the data objects can be accesses at their corresponding locations.
  • FIG. 1 illustrates a block diagram of an example of computer system 999 on which the processes described herein (“the processes”) may be implemented.
  • computer system 999 includes computers 900 , 901 , 902 . It is noted, however, that the processes can be implemented on any type of processing device(s).
  • Computer 900 can communicate with computers 901 and 902 over network 990 .
  • Computer 900 has processor 910 , memory 920 , bus 930 , and, optionally, input device 940 and output device 950 (I/O devices, user interface 960 ).
  • the processes can be implemented by computer program product 100 (CPP), carrier 970 and/or signal 980 .
  • computer 901 , 902 is sometimes referred to as “remote computer”, computer 901 , 902 may be, for example, a server, a peer device or other common network node, and typically has many or all of the elements described relative to computer 900 .
  • Computer 900 is may be a conventional personal computer (PC), a desktop device or a hand-held device, a multiprocessor computer, a pen computer, a microprocessor-based or programmable consumer electronics device, a minicomputer, a mainframe computer, a personal mobile computing device, a mobile phone, a portable or stationary personal computer, a palmtop computer, or the like.
  • Processor 910 may be a CPU, a micro-controller unit (MCU), digital signal processor (DSP), or the like.
  • Memory 920 includes elements that temporarily or permanently store data and instructions. Although memory 920 is illustrated as part of computer 900 , memory can also be implemented in network 990 , in computers 901 , 902 and in processor 910 itself (e.g., cache, register), or elsewhere.
  • Memory 920 can be a read only memory (ROM), a random access memory (RAM), or a memory with other access options.
  • Memory 920 may be implemented by machine-readable media, for example: (a) magnetic media, like a hard disk, a floppy disk, or other magnetic disk, a tape, a cassette tape; (b) optical media, like optical disk (CD-ROM, digital versatile disk—DVD); (c) semiconductor media, like DRAM, SRAM, EPROM, EEPROM, and memory stick.
  • machine-readable media for example: (a) magnetic media, like a hard disk, a floppy disk, or other magnetic disk, a tape, a cassette tape; (b) optical media, like optical disk (CD-ROM, digital versatile disk—DVD); (c) semiconductor media, like DRAM, SRAM, EPROM, EEPROM, and memory stick.
  • Memory 920 may be distributed. Portions of memory 920 can be removable or non-removable. For reading from media and for writing in media, computer 900 uses well-known devices, for example, disk drives, or tape drives.
  • Memory 920 stores modules such as, for example, a basic input output system (BIOS), an operating system (OS), a program library, a compiler, an interpreter, and a text-processing tool. Modules are commercially available and can be installed on computer 900 . For simplicity, these modules are not illustrated.
  • BIOS basic input output system
  • OS operating system
  • program library a program library
  • compiler a compiler
  • interpreter a text-processing tool
  • CPP 100 includes program instructions and—optionally—data that causes processor 910 to execute method steps of the processes described herein.
  • CPP 100 can control the operation of computer 900 and its interaction in network system 999 so that is operates to perform in accordance with the processes described herein.
  • CPP 100 can be available as source code in any programming language, and as object code (“binary code”) in a compiled form.
  • CPP 100 is illustrated as being stored in memory 920 , CPP 100 can be located elsewhere.
  • CPP 100 can also be embodied in carrier 970 .
  • Carrier 970 is illustrated outside computer 900 .
  • carrier 970 is inserted into input device 940 .
  • Carrier 970 may be implemented as any machine-readable medium, such as a medium largely explained above (memory 920 ).
  • carrier 970 is an article of manufacture having a machine-readable medium with machine-readable program code to cause the computer to perform methods described herein.
  • signal 980 can also embody computer program product 100 .
  • All or part of the processes can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
  • a computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
  • Method steps associated with the processes can be performed by one or more programmable processors executing one or more computer programs to perform the functions of the processes.
  • the method steps can also be performed by, and the processes can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) and/or an ASIC (application-specific integrated circuit).
  • special purpose logic circuitry e.g., an FPGA (field programmable gate array) and/or an ASIC (application-specific integrated circuit).
  • processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
  • a processor will receive instructions and data from a read-only storage area or a random access storage area or both.
  • Elements of a computer include a processor for executing instructions and one or more storage area devices for storing instructions and data.
  • a computer will also include, or be operatively coupled to receive data from, or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks.
  • Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile storage area, including by way of example, semiconductor storage area devices, e.g., EPROM, EEPROM, and flash storage area devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
  • semiconductor storage area devices e.g., EPROM, EEPROM, and flash storage area devices
  • magnetic disks e.g., internal hard disks or removable disks
  • magneto-optical disks e.g., CD-ROM and DVD-ROM disks.
  • All or part of the processes can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface, or any combination of such back-end, middleware, or front-end components.
  • the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a LAN and a WAN, e.g., the Internet.
  • the data objects described herein may be used to store content, which can include, but is not limited to, text, images, graphics, video or other multimedia content.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Library & Information Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Searching for data objects includes searching a content index for first data objects, where the content index stores content of plural data objects, where the first data objects contain content that corresponds to content of a search query, and where the first data objects define a first search result set. The search for data objects also includes searching an attribute index for second data objects, where the attribute index stores access control attributes for plural data objects, where the second data objects have access control attributes that correspond to user access data associated with the search query, and where the second data objects define a second search result set. A search result is obtained based on the first search result set and the second search result set.

Description

    CLAIM TO PRIORITY
  • This patent application claims priority to German Patent Application No. DE 102004038544.0, filed on Aug. 6, 2004, the contents of which are hereby incorporated by reference into this patent application as if set forth herein in full.
  • TECHNICAL FIELD
  • This patent application relates generally to searching for data objects.
  • BACKGROUND
  • Enterprise solutions use data objects to represent real world items and other information. For example, data objects can be used to store content including, but not limited to, text, images, graphics, video, and/or multimedia. A business object is a special type of data object that can be used to represent information related to a business including, but not limited to, folders, documents, bookmarks, materials, material lists, item lists, data sheets, presentations, and text documents.
  • Data objects can be used to support collaborations, competitions, or official tenders. For example, a public tender can be implemented using a public folder, in which each bidding party can have a reserved area with folders. Inside these folders, bidding parties can read tender documents for particular items, store their bids, and store additional data and communications between parties. Since the data objects are stored centrally, access rights to the data objects need to be managed. For example, it should be possible to prohibit certain users from accessing all data objects. That is, two bidding parties should not be able to access each others' bidding or communication objects.
  • Data objects also store metadata. Metadata is data that not directly related to object content. Metadata can include object attributes, such as object identifiers, object names, time stamps, access control attributes, object locations, times of object creation, creator names, object change times, identities of users making changes, and the like. Access control attributes may specify who has access to a particular data object.
  • In more detail, the access control attributes can specify the identity of a user, a group of users, and/or users having a particular role, who have access to data objects. The access control attributes can also include access right information. Access right information specifies an extent of access. For example, certain users may be permitted only to read a data object, whereas other users may be permitted both to read and to edit the data object.
  • Search engines may be used to search databases, including databases that contain data objects. One disadvantage of conventional search engines is that they do not take user access rights into account when returning search results.
  • SUMMARY
  • This patent application features methods, systems, and apparatus, including computer program products, for use in searching for data objects. Aspects of the methods, systems, and apparatus are set forth below.
  • In general, in one aspect, the invention is directed to searching for data objects. This aspect includes searching a content index for first data objects, where the content index stores content of plural data objects, where the first data objects contain content that corresponds to content of a search query, and where the first data objects define a first search result set. The search for data objects also includes searching an attribute index for second data objects, where the attribute index stores access control attributes for plural data objects, where the second data objects have access control attributes that correspond to user access data associated with the search query, and where the second data objects define a second search result set. A search result is obtained based on the first search result set and the second search result set. This aspect may also include one or more of the following.
  • The search result may include pointers to at least some of the first and/or second data objects. The search result may be obtained by merging the first search result set and the second search result set. Merging the first search result set and the second search result set may include identifying data objects having a predetermined relationship to the first search result set and the second search result set. Merging the first search result set and the second search result set may include performing a logical AND operation on the first search result set and the second search result set to produce a resultant set.
  • The resultant set may be merged with an additional search result set. Merging the resultant set with the additional search result set may include performing a logical OR operation on the resultant set and the additional search result set. The additional search result set may be obtained by searching the attribute index for data objects that have access control attributes that correspond to the user access data and that have metadata that corresponds to the content associated with the search query.
  • The access control attributes may be metadata, and may include user access right information. The access control attributes may include at least one of a user name, a user role, a user group name, and at least one user access right. The user access right may include at least one of read access, read and write access, and full access.
  • The content index may be generated by indexing text of data objects. The attribute index may be generated by indexing metadata of data objects. The attribute index may be updated by indexing only changes to the access control attributes.
  • The details of one or more examples are set forth in the accompanying drawings and the description below. Further features, aspects, and advantages of the invention will become apparent from the description, the drawings, and the claims.
  • DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a computer system on which the processes described herein may be implemented.
  • FIG. 2 a is a block diagram of a system that may be used to search for data objects.
  • FIG. 2 b is a block diagram of search engine that may be incorporated into the system of FIG. 2 a.
  • FIG. 3 is a flowchart showing a process for searching for data objects using the search engine of FIG. 2 b and the system of FIG. 2 a.
  • FIG. 4 is a diagram showing indexing of documents and their attributes.
  • FIG. 5 is a diagram of a search query used in the process of FIG. 3.
  • FIG. 6 is a screenshot showing access authorization of folders.
  • FIG. 7 is a unified modeling language (UML) sequence chart showing a process for indexing data objects and/or attributes of data objects.
  • FIG. 8 is a UML sequence chart showing a process for indexing only changes to data objects and/or attributes of data objects.
  • FIG. 9 is block diagram showing ways of combining results of searches conducted according to the process of FIG. 3.
  • FIG. 10 a is a screenshot of a user interface that may be generated by the search engine of FIG. 2 b.
  • FIG. 10 b is a screenshot of search results that may be produced by the search engine of FIG. 2 b.
  • Like reference numerals in different figures denote like elements.
  • DETAILED DESCRIPTION
  • FIG. 2 shows a computer system 199, on which the processes described herein may be implemented. Computer system 199 includes a Web server 200 and a user interface 260. Web server 200 generates user interface 260. In this example, user interface 260 includes a registration page 260 a and a search page 260 b. An example of search page 260 b is shown in FIG. 10 a (described below). Computer system 199 also a database server 201, an index server 202, and a robot server 203.
  • Registration page 260 a can be used to register Web sites with the Web server 200. In this example, Web server 200 operates as middleware between registration page 206 a and database server 201. Once a Web site is registered, its address, in this case its uniform resource locator (URL), is entered into index server 202. It is noted that index server can reject certain registrations. For example, index server 202 can include functionality to block URLs of Web sites, such as “spam sites”, from being indexed.
  • URLs in index server 202 are processed by robot server 203. Robot server 203 generates robot programs for searching corresponding Web sites hosted by host computers 204, 205, 206. These robot programs analyze the content and attributes of data objects in the Web sites, and provide the results of their analyses to index server 202. Index server 202 uses these results to index content and the attributes of the data objects.
  • To search, a user enters a search query on search page 260 b. The search query is sent to index server 202, where the search query is processed. Data objects that meet one or more criteria of the search query are located, information relating to the objects is retrieved, and search results containing this information are presented to the user. Database server 201 can be used to present page 260 b and search results to the user.
  • Index server 202 is used in connection with a search engine 212 that may be implemented using system 199 or portions thereof, as shown in FIG. 2 b. In this example, search engine 212 includes, among other things, a name server 213, a pre-processor 214, a queue server 215, and index server 202.
  • Index server 202 includes a text mining engine 202 a and corresponding index 202 d, a text search engine 202 b and corresponding index 202 e, and an attribute engine 202 c and corresponding index 202 f. Indices 202 d and 202 e can be content indexes, which enable full-text searches of content of data objects. Index 202 f can be an attribute index, which indexes attributes, rather than content, of data objects. As a result, index 202 f enables searches for data objects based on their attributes, rather than their content.
  • FIG. 4 shows one way of indexing documents that can be used with the processes described herein. In particular, FIG. 4 shows a search index 402, which includes an attribute index 404 and a content index 406. Content index 406 includes a dictionary of all words in one or more documents. Search index 402 provides, for each word in content index 406, a link to corresponding document information in attribute index 404. To illustrate, in FIG. 4, “Word1” is used in “Doc1”, “Doc2”, and “Doc3”. As such, content index 406 includes a list of document links, “Doclink1”, “Doc1ink2”, and “Doc1ink3”, which provide links to corresponding documents “Doc1”, “Doc2”, and “Doc3” in attribute index 404. Each document in attribute index 404 includes information, “DocInfo”, about the document. DocInfo may include one or more pointers to corresponding document(s) in memory.
  • Attribute index 404 stores information about each document, as opposed to document content. This information can be stored as metadata and may include, e.g., attributes of the document, a name of the document, and access control attributes associated with the document. The attributes can include object identifiers (IDs), collaboration IDs, topic IDs, folder IDs, and area IDs. The access control attributes can include a user name, a user group, and/or a user role in combination with an access right for a corresponding data object. The access right can specify an ability to access the document, such whether to provide a user or group with read and/or write or full access to a particular document.
  • Referring back to FIG. 2 b, search engine 212 is accessible to Web server 200 and to other applications, such as application 218. To provide access to applications other than Web server 200, search engine 212 incorporates a front-end remote function call (RFC) server 216. Applications 218 can access search engine 212 by way of remote function calls generated, e.g., by a gateway 217 associated with application 218.
  • FIG. 3 shows a process 299 for executing searches using search engine 212 of FIG. 2 b. Process 299 includes generating (300) one or more content indices for data objects, and generating (302) one or more attribute indices for the data objects. FIGS. 7 and 8 (described below) show examples of processes for generating the indices used in process 299.
  • Search engine 212 receives (304) a search query. An example of a search query 500 is shown in FIG. 5. Referring to FIG. 5, search query 500 includes a search statement 502 and user access data 504. Search statement 502 can be a string of characters, which correspond to content of data objects to be searched. Search statement 502 can also be a string of characters that correspond to attributes of the data objects to be searched.
  • Search query 500 also includes user access data 504. User access data 504 can include data that identifies the user who generated the search query. For example, user access data 504 can identify the “current user”, a “current group” that the user is in, and/or a “current role” of the user in that group. In this regard, the user can participate in several groups and can have several roles, each of which can be reflected in search query 500.
  • After receiving the search query, process 299 searches (306) content index 406 for data objects that correspond to parameters of search statement 502. Searching for data objects within content index 406 includes searching for data objects with elements of content that at least partially meet (e.g., match, or are similar to) parameters of the search statement. All data objects that are obtained (310) by searching content index 406 constitute a first search result set. The first search result set can include the data objects themselves, IDs or other indicia associated with the data objects, or links or pointers to the data objects. The links or pointers can be references to storage locations of the data objects. Fuzzy logic may be used to perform the search. Such a search may identify data objects with elements of data that are similar, in some way, to parameters of the search query (as opposed to matching the parameters of the search query exactly).
  • In addition to searching content index 406, process 299 searches (308) attribute index 404 for data objects that correspond to user access data 504. That is, process 299 searches for data objects with access control attributes that correspond to access control attributes for the user, which correspond to user access data 504.
  • Search engine 212 can search for data objects with access control attributes containing the user's name, the user's groups, and/or the user's roles. Process 299 can also determine whether access right information for the user's name, group, and/or role specifies at least read access, meaning that the user is permitted to read information, but not to write the information. Other levels of access include read and write access, in which a user is allowed both to read and to write to the information, and full access, in which the user is permitted virtually unfettered access to the information. It is possible to require that all user names, groups and/or roles stored in the access control attributes be at least read access before allowing the user access to the corresponding data objects.
  • Search engine 212 can also search in attribute index 404 for areas, folders, collaborations, and/or other hierarchical objects, which correspond to the user name, the user groups, and/or the user roles, and which grant at least read access to the user.
  • All data objects that are obtained (312) as a result of searches performed on attribute index 404 constitute a second search result set. This second search result set can identify, e.g., all data objects for which the user has at least read access. The second search result sets can include the data objects themselves, IDs or other indicia associated with the data objects, or links or pointers to the data objects. The links or pointers can be references to storage locations of the data objects. Fuzzy logic may be used to perform the search.
  • Process 299 merges (314) the first search result set and the second search result set to thereby obtain an overall search result set. This overall search result set is presented to the user as the end-result of the user's query using the search engine. Merging the first and second search result sets can include combining the first search result set with the second search result set. Other methods of merging search results sets may also be used.
  • FIG. 9 shows ways of merging search result sets. In particular, FIG. 9 shows merging search results from different indices into an overall search result set. In FIG. 9, content indices 902 and 904 are the same type of index as content index 406, and attribute index 902 is the same type of index as attribute index 404. “AND” 906 indicates a logical AND operation, and “OR” 908 indicates a logical OR operation. These logical operations may be performed on index search results. Thus, the results of searches of context index 904 and of attribute index 902 may be combined using a logical AND, resulting in an overall search result that contains only elements that are common to both searches (e.g., only those data objects that have content with elements of data that meet the search query and that permit read access by the user are provided as search result set 910). This logical AND operation may be used alone to combine search results. Alternatively, the logical AND operation may be augmented with other logical operation(s) (as depicted in FIG. 9).
  • By way example, a user may want to search for data objects that were created at a particular time. This information can be entered into search engine 212 as a search query. The timing information is stored in the metadata of data objects. Thus, in some cases, it is useful to search the metadata of data objects using the search statement. Results of such a search of a content index 903 can constitute an additional search result set.
  • In this example, determination of search result set 910 can include using logical OR 908 to merge the additional search result set with the previous search result set produced by logical AND 906. In this example, data objects in search result set 910 will either have elements of data that meet the search query or have elements of data in their metadata that meet the search query. The resulting data objects also permit at least read access to the user.
  • FIG. 9 shows only some ways of merging search results. Any methods may be used in addition to, or instead of, those above, including, but not limited to, filtering the results and processing the results using one or more computer programs.
  • As noted above, FIGS. 7 and 8 show examples of processes for generating the indices used in process 299. In this regard, FIG. 7 shows a process 701 for generating an attribute index from a set of data objects. Process 701 may also be used to generate a content index. It is noted that the actors of process 701 may include software modules and/or hardware.
  • According to process 701, an index may be generated from a predetermined set data objects. To do this, an administration module 702 sends a request, FullIndexing, for a full indexing 710, meaning all objects are to be indexed. A dispatching module 704 processes this request to obtain a message, GetObjectIdList, that is used to retrieve IDs of data objects to be indexed. In this case, all available data objects are to be indexed; however, in other cases, a subset of data objects may be targeted for indexing.
  • The foregoing GetObjectIdList message is processed by a server 706, which stores the data objects, e.g., business objects for a collaboration folder (cFolders) structure. Server 706 instantiates the data objects to obtain the data objects' IDs. The data objects' metadata is also obtained from the instantiated objects, and stored by server 706.
  • Server 706 returns, to dispatching module 704, a table, TabObjectsIds, which lists the data objects' IDs. Module 704 uses this table to request, via a GetAttributesNameList message, an attribute name list for the data objects from the server 706. In response, server 706 returns, to dispatching module 704, a table, TabAttributeNames. This table contains names of attributes of the data objects listed in the table.
  • The attributes' names are used to request attribute values for the named attributes. Module 704 sends a message, GetAttributeValues, to server 706 and, in response, receives a table, TabAttributeValues, of attribute values for the named attributes. The data object IDs, together with their attributes and attribute values, are provided to an index server 708 of a search engine via a FeedIndex message. Index server 708 generates, and stores, the index for the named data objects. Index server 708 reports successful generation of an index to administration module 702 and status information to module 704. It is noted that index server 708 corresponds to index server 202 of FIG. 2 a.
  • The attribute information may include a hierarchical folder structure for data objects. This information enables searching to be limited to a particular area, folder or other hierarchy, within a data structure. Generating the attribute index can also include indexing root information and area information for the data objects. This information can be used to determine a position of a data object within a database.
  • Foregoing process 701 may be used to index metadata and/or the content (i.e., full-text) of data objects. Because indexing data objects can be time consuming, the data objects can be indexed periodically. Periodic indexing can include indexing only changed values. FIG. 8 illustrates a unified modeling language (UML) sequence chart for such indexing, which is referred to herein as “delta-indexing”.
  • Referring to process 801 of FIG. 8, administration module 702 calls a routine, DeltaIndexing, which performs delta-indexing. Module 704 analyzes a log file to determine object IDs of data object that have changed since a last indexing. The log file may be maintained by a one or more computers used to perform process 801, by one or more computers that store the data objects, by a combination thereof. The list of data object IDs is provided to server 706 in a message, GetAttributeNameList.
  • In response to GetAttributeNameList, server 706 returns a list, TabAttributesNames, that contains data objects that have changed. The list also identifies attributes of those data objects, and which attributes have changed. Module 704 requests the values of the changed attributes in a message, GetAttributesValues, which identifies data objects for which values are requested. Server 706 responds to GetAttributesValues with a table of attribute values, TabAttributesValues, for data objects identified in GetAttributesValues. To obtain values of the attributes, instances of the data objects may be created and metadata therefor may be read.
  • The attribute values contain access control attributes, which can be used in search engine 212 to support searches using access control. The obtained attribute values are provided by module 704 to index server 708. Index server 708 updates its index using the values. Index server 708 confirms an index update with appropriate response messages.
  • Referring now to FIG. 6, a page is shown that includes access control attributes for a folder having a hierarchical structure. Page 600 includes a frame 602 with hierarchical folder information. The selected folder in this case is “hard disk”. For the selected folder, frame 604 shows different access control attributes including a username, a group, or a role, and user access right information. The user access right information can be inherited from parent data object(s), or it can be defined independently for each data object. In the example shown in FIG. 6, the user group “Advanced Technology” has read access to the selected folder; the user “James Brown” has administrative access to the selected folder; and the user group “Integrated Solutions” has no access to the selected folder.
  • FIG. 10 a shows a screenshot of a search page 1000, which may be generated by search engine 212 to search a database. In search page 1000, a user can specify a folder to search in field 1001. This folder can be a root folder or any sub-folder. The selection of a folder can be used in generation of an attribute search for that folder. This attribute can be the folder ID for data objects that were identified as a result of a search.
  • In a field 1002 a, a user can specify additional attributes, such as, a name, a description, a date of creation, a name of creator, change data, a name of a user who changed data, or other metadata. The user can also specify, in field 1002 b, a search query, which, in this example is “sap”. A search button 1004 is provided. Upon selecting search button 1004, search engine 212 is activated to obtain a search result set, which is provided in the page shown in FIG. 12 b.
  • When selecting search button 1004, a search query, including any specified attributes, is provided to search engine 212. In addition, the user who initiated the search request is identified. This can be done by instructing the user to register with system 199 (FIG. 1) upon first use. The identity of the user can also be determined by the user's login name or other identifying indicia. Additionally, at least one user role, or at least one user group is determined. This user access data also provided with the search query.
  • The search query and associated attributes are processed by search engine 212 in the manner described above in FIG. 3. The search results sets are combined in the manner described above in FIG. 9, and the results are output, e.g., in page 1003 (FIG. 10 b).
  • As shown in FIG. 10 b, page 1003 include a frame 1006 that identifies a folder in which the search was conducted. Another frame 1008 presents data objects that turned up during the search. The data objects may be presented with their names, their descriptions, and their original locations. The data objects can be referred to via a link, through which the data objects can be accesses at their corresponding locations.
  • FIG. 1 illustrates a block diagram of an example of computer system 999 on which the processes described herein (“the processes”) may be implemented. In this example, computer system 999 includes computers 900, 901, 902. It is noted, however, that the processes can be implemented on any type of processing device(s).
  • Computer 900 can communicate with computers 901 and 902 over network 990. Computer 900 has processor 910, memory 920, bus 930, and, optionally, input device 940 and output device 950 (I/O devices, user interface 960). The processes can be implemented by computer program product 100 (CPP), carrier 970 and/or signal 980.
  • With respect to computer 900, computer 901, 902 is sometimes referred to as “remote computer”, computer 901, 902 may be, for example, a server, a peer device or other common network node, and typically has many or all of the elements described relative to computer 900. Computer 900 is may be a conventional personal computer (PC), a desktop device or a hand-held device, a multiprocessor computer, a pen computer, a microprocessor-based or programmable consumer electronics device, a minicomputer, a mainframe computer, a personal mobile computing device, a mobile phone, a portable or stationary personal computer, a palmtop computer, or the like.
  • Processor 910 may be a CPU, a micro-controller unit (MCU), digital signal processor (DSP), or the like. Memory 920 includes elements that temporarily or permanently store data and instructions. Although memory 920 is illustrated as part of computer 900, memory can also be implemented in network 990, in computers 901, 902 and in processor 910 itself (e.g., cache, register), or elsewhere. Memory 920 can be a read only memory (ROM), a random access memory (RAM), or a memory with other access options. Memory 920 may be implemented by machine-readable media, for example: (a) magnetic media, like a hard disk, a floppy disk, or other magnetic disk, a tape, a cassette tape; (b) optical media, like optical disk (CD-ROM, digital versatile disk—DVD); (c) semiconductor media, like DRAM, SRAM, EPROM, EEPROM, and memory stick.
  • Memory 920 may be distributed. Portions of memory 920 can be removable or non-removable. For reading from media and for writing in media, computer 900 uses well-known devices, for example, disk drives, or tape drives.
  • Memory 920 stores modules such as, for example, a basic input output system (BIOS), an operating system (OS), a program library, a compiler, an interpreter, and a text-processing tool. Modules are commercially available and can be installed on computer 900. For simplicity, these modules are not illustrated.
  • CPP 100 includes program instructions and—optionally—data that causes processor 910 to execute method steps of the processes described herein. In other words, CPP 100 can control the operation of computer 900 and its interaction in network system 999 so that is operates to perform in accordance with the processes described herein. For example, CPP 100 can be available as source code in any programming language, and as object code (“binary code”) in a compiled form.
  • Although CPP 100 is illustrated as being stored in memory 920, CPP 100 can be located elsewhere. CPP 100 can also be embodied in carrier 970. Carrier 970 is illustrated outside computer 900. For communicating between CPP 100 and computer 900, carrier 970 is inserted into input device 940. Carrier 970 may be implemented as any machine-readable medium, such as a medium largely explained above (memory 920). Generally, carrier 970 is an article of manufacture having a machine-readable medium with machine-readable program code to cause the computer to perform methods described herein. Further, signal 980 can also embody computer program product 100.
  • The processes described herein are not limited to use with any particular hardware and software; they may find applicability in any computing or processing environment and with any type of machine that is capable of running machine-readable instructions. All or part of the processes can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations thereof.
  • All or part of the processes can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
  • Method steps associated with the processes can be performed by one or more programmable processors executing one or more computer programs to perform the functions of the processes. The method steps can also be performed by, and the processes can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) and/or an ASIC (application-specific integrated circuit).
  • Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only storage area or a random access storage area or both. Elements of a computer include a processor for executing instructions and one or more storage area devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from, or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile storage area, including by way of example, semiconductor storage area devices, e.g., EPROM, EEPROM, and flash storage area devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
  • All or part of the processes can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface, or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a LAN and a WAN, e.g., the Internet.
  • Method steps associated with the processes can be rearranged and/or one or more such steps can be omitted to achieve the same, or similar, results to those described herein.
  • The data objects described herein may be used to store content, which can include, but is not limited to, text, images, graphics, video or other multimedia content.
  • Elements of different embodiments described herein may be combined to form other embodiments not specifically set forth above. Other embodiments not specifically described herein are also within the scope of the following claims.

Claims (20)

1. A method of searching for data objects, the method comprising:
searching a content index for first data objects, the content index storing content of plural data objects, the first data objects containing content that corresponds to content of a search query, the first data objects defining a first search result set;
searching an attribute index for second data objects, the attribute index storing access control attributes for plural data objects, the second data objects having access control attributes that correspond to user access data associated with the search query, the second data objects defining a second search result set; and
obtaining a search result based on the first search result set and the second search result set.
2. The method of claim 1, wherein the search result comprises pointers to at least some of the first and/or second data objects.
3. The method of claim 1, wherein obtaining comprises merging the first search result set and the second search result set.
4. The method of claim 3, wherein merging the first search result set and the second search result set comprises identifying data objects having a predetermined relationship to the first search result set and the second search result set.
5. The method of claim 3, wherein merging the first search result set and the second search result set comprises performing a logical AND operation on the first search result set and the second search result set to produce a resultant set.
6. The method of claim 4, further comprising:
merging the resultant set with an additional search result set.
7. The method of claim 6, wherein merging the resultant set with the additional search result set comprising performing a logical OR operation on the resultant set and the additional search result set.
8. The method of claim 6, further comprising:
obtaining the additional search result set by searching the attribute index for data objects that have access control attributes that correspond to the user access data and that have metadata that corresponds to the content associated with the search query.
9. The method of claim 1, wherein the access control attributes comprise metadata.
10. The method of claim 1, wherein the access control attributes comprise user access right information.
11. The method of claim 1, wherein the access control attributes comprise at least one of a user name, a user role, a user group name, and at least one user access right.
12. The method of claim 10, wherein the user access right information comprises at least one of read access, read and write access, and full access.
13. The method of claim 1, further comprising:
generating the content index by indexing text of data objects.
14. The method of claim 1, further comprising:
generating the attribute index by indexing metadata of data objects.
15. The method of claim 14, further comprising:
updating the attribute index by indexing only changes to the access control attributes.
16. A computer program product tangibly embodied in an information carrier, the computer program product comprising instructions that, when executed, cause at least one processor to perform operations comprising:
searching a content index for first data objects, the content index storing content of plural data objects, the first data objects containing content that corresponds to content of a search query, the first data objects defining a first search result set;
searching an attribute index for second data objects, the attribute index storing access control attributes for plural data objects, the second data objects having access control attributes that correspond to user access data associated with the search query, the second data objects defining a second search result set; and
obtaining a search result based on the first search result set and the second search result set.
17. The computer program product of claim 16, wherein obtaining comprises merging the first search result set and the second search result set.
18. The computer program product of claim 16, wherein merging the first search result set and the second search result set comprises identifying data objects having a predetermined relationship to the first search result set and the second search result set.
19. The computer program product of claim 16, wherein merging the first search result set and the second search result set comprises performing a logical AND operation on the first search result set and the second search result set to produce a resultant set.
20. A system for searching for data objects, the system comprising:
memory that stores executable instructions; and
a processing device that executes the executable instructions to:
search a content index for first data objects, the content index storing content of plural data objects, the first data objects containing content that corresponds to content of a search query, the first data objects defining a first search result set;
search an attribute index for second data objects, the attribute index storing access control attributes for plural data objects, the second data objects having access control attributes that correspond to user access data associated with the search query, the second data objects defining a second search result set; and
obtain a search result based on the first search result set and the second search result set.
US11/111,508 2004-08-06 2005-04-21 Searching for data objects Abandoned US20060031206A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/358,328 US8732174B2 (en) 2004-08-06 2012-01-25 Searching for data objects

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102004038544.0 2004-08-06
DE102004038544 2004-08-06

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/358,328 Continuation US8732174B2 (en) 2004-08-06 2012-01-25 Searching for data objects

Publications (1)

Publication Number Publication Date
US20060031206A1 true US20060031206A1 (en) 2006-02-09

Family

ID=35427497

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/111,508 Abandoned US20060031206A1 (en) 2004-08-06 2005-04-21 Searching for data objects
US13/358,328 Active US8732174B2 (en) 2004-08-06 2012-01-25 Searching for data objects

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/358,328 Active US8732174B2 (en) 2004-08-06 2012-01-25 Searching for data objects

Country Status (2)

Country Link
US (2) US20060031206A1 (en)
EP (1) EP1624386B1 (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040162816A1 (en) * 2003-02-13 2004-08-19 Klaus Irle Text and attribute searches of data stores that include business objects
US20060149712A1 (en) * 2004-12-30 2006-07-06 Uwe Kindsvogel Searching based on object relationships
US20080104665A1 (en) * 2006-10-31 2008-05-01 Microsoft Corporation Analyzing access control configurations
US20080109427A1 (en) * 2006-11-07 2008-05-08 Microsoft Corporation Trimmed and merged search result sets in a versioned data environment
US20080162603A1 (en) * 2006-12-28 2008-07-03 Google Inc. Document archiving system
US20090063448A1 (en) * 2007-08-29 2009-03-05 Microsoft Corporation Aggregated Search Results for Local and Remote Services
US20090063423A1 (en) * 2007-06-19 2009-03-05 Jackson Bruce Kelly User interfaces for service object located in a distributed system
US20090077480A1 (en) * 2007-06-19 2009-03-19 Caunter Mark Leslie Apparatus and method of managing electronic communities of users
US20090319599A1 (en) * 2008-06-18 2009-12-24 Caunter Mark Leslie Remote selection and authorization of collected media transmission
US20090319385A1 (en) * 2008-06-18 2009-12-24 Jackson Bruce Kelly Monetizing and prioritizing results of a distributed search
US20090319615A1 (en) * 2008-06-18 2009-12-24 Caunter Mark Leslie Persistent personal messaging in a distributed system
US20090320097A1 (en) * 2008-06-18 2009-12-24 Jackson Bruce Kelly Method for carrying out a distributed search
US7657626B1 (en) 2006-09-19 2010-02-02 Enquisite, Inc. Click fraud detection
US7685191B1 (en) 2005-06-16 2010-03-23 Enquisite, Inc. Selection of advertisements to present on a web page or other destination based on search activities of users who selected the destination
US20100257206A1 (en) * 2009-04-07 2010-10-07 International Business Machines Corporation Visibility Control of Resources
US8082242B1 (en) * 2006-12-29 2011-12-20 Google Inc. Custom search
US8364529B1 (en) 2008-09-05 2013-01-29 Gere Dev. Applications, LLC Search engine optimization performance valuation
US20140096031A1 (en) * 2012-09-28 2014-04-03 Ge Medical Systems Global Technology Company, Llc Image display system and image display device
US8732174B2 (en) 2004-08-06 2014-05-20 Sap Ag Searching for data objects
US20150256566A1 (en) * 2014-03-06 2015-09-10 Call-It-Out, Inc. Project Collaboration
US20160125049A1 (en) * 2014-11-01 2016-05-05 Veeva Systems Inc. System and method for reporting multiple objects in enterprise content management
US20180218043A1 (en) * 2012-04-26 2018-08-02 Alibaba Group Holding Limited Information providing method and system
CN109902255A (en) * 2019-02-27 2019-06-18 百度在线网络技术(北京)有限公司 Page mixing browsing record generation method, device, equipment and storage medium
US10496663B2 (en) 2016-06-16 2019-12-03 International Business Machines Corporation Search journaling for operations analysis
US10579442B2 (en) 2012-12-14 2020-03-03 Microsoft Technology Licensing, Llc Inversion-of-control component service models for virtual environments

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9846696B2 (en) 2012-02-29 2017-12-19 Telefonaktiebolaget Lm Ericsson (Publ) Apparatus and methods for indexing multimedia content
US9633015B2 (en) * 2012-07-26 2017-04-25 Telefonaktiebolaget Lm Ericsson (Publ) Apparatus and methods for user generated content indexing
US8924425B1 (en) * 2012-12-06 2014-12-30 Netapp, Inc. Migrating data from legacy storage systems to object storage systems
US9047325B2 (en) * 2013-04-08 2015-06-02 International Business Machines Corporation Modularizing complex XML data for generation and extraction
US10445367B2 (en) 2013-05-14 2019-10-15 Telefonaktiebolaget Lm Ericsson (Publ) Search engine for textual content and non-textual content
US9830354B2 (en) * 2013-08-07 2017-11-28 International Business Machines Corporation Accelerating multiple query processing operations
US9251218B2 (en) 2013-08-07 2016-02-02 International Business Machines Corporation Tunable hardware sort engine for performing composite sorting algorithms
US9619499B2 (en) 2013-08-07 2017-04-11 International Business Machines Corporation Hardware implementation of a tournament tree sort algorithm
US9495418B2 (en) 2013-08-07 2016-11-15 International Business Machines Corporation Scalable acceleration of database query operations
US10311038B2 (en) 2013-08-29 2019-06-04 Telefonaktiebolaget Lm Ericsson (Publ) Methods, computer program, computer program product and indexing systems for indexing or updating index
WO2015030646A1 (en) 2013-08-29 2015-03-05 Telefonaktiebolaget L M Ericsson (Publ) Method, content owner device, computer program, and computer program product for distributing content items to authorized users
US10310813B2 (en) 2014-12-29 2019-06-04 International Business Machines Corporation Hardware implementation of a tournament tree sort algorithm using an external memory

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010027451A1 (en) * 2000-03-29 2001-10-04 Fujitsu Limited Information processing apparatus
US20030018632A1 (en) * 1999-10-28 2003-01-23 International Business Machines Corporation System for organizing an annotation structure and for querying data and annotations
US20030018624A1 (en) * 2001-07-20 2003-01-23 International Business Machines Corporation Scalable eContent management system and method of using the same
US20030088576A1 (en) * 1997-10-22 2003-05-08 Masakazu Hattori Object-oriented data storage and retrieval system using index table
US20030105746A1 (en) * 2001-03-21 2003-06-05 Patrick Stickler Query resolution system and service
US6704747B1 (en) * 1999-03-16 2004-03-09 Joseph Shi-Piu Fong Method and system for providing internet-based database interoperability using a frame model for universal database
US20040122958A1 (en) * 2002-12-19 2004-06-24 International Business Machines Corporation Method and system for peer-to-peer authorization
US20040143569A1 (en) * 2002-09-03 2004-07-22 William Gross Apparatus and methods for locating data
US20040162816A1 (en) * 2003-02-13 2004-08-19 Klaus Irle Text and attribute searches of data stores that include business objects
US20050050023A1 (en) * 2003-08-29 2005-03-03 Gosse David B. Method, device and software for querying and presenting search results
US20050076024A1 (en) * 2003-10-06 2005-04-07 International Business Machines Corporation System, method and program for database searching
US20050256865A1 (en) * 2004-05-14 2005-11-17 Microsoft Corporation Method and system for indexing and searching databases
US7062563B1 (en) * 2001-02-28 2006-06-13 Oracle International Corporation Method and system for implementing current user links

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2048039A1 (en) * 1991-07-19 1993-01-20 Steven Derose Data processing system and method for generating a representation for and random access rendering of electronic documents
US7007034B1 (en) * 2000-01-21 2006-02-28 International Business Machines Corporation File structure for storing content objects in a data repository
WO2002017123A2 (en) 2000-08-24 2002-02-28 Debellis Joseph L Search-on-the-fly with merge function
US6654734B1 (en) * 2000-08-30 2003-11-25 International Business Machines Corporation System and method for query processing and optimization for XML repositories
US7882258B1 (en) * 2003-02-05 2011-02-01 Silver Screen Tele-Reality, Inc. System, method, and computer readable medium for creating a video clip
JP4326236B2 (en) * 2003-02-28 2009-09-02 ソニー株式会社 Recording apparatus and method
JP2004310621A (en) * 2003-04-10 2004-11-04 Hitachi Ltd File access method, and program for file access in storage system
US7546284B1 (en) * 2003-06-11 2009-06-09 Blue Titan Software, Inc. Virtual message persistence service
US7296011B2 (en) * 2003-06-20 2007-11-13 Microsoft Corporation Efficient fuzzy match for evaluating data records
DE10333530A1 (en) * 2003-07-23 2005-03-17 Siemens Ag Automatic indexing of digital image archives for content-based, context-sensitive search
US20050114319A1 (en) * 2003-11-21 2005-05-26 Microsoft Corporation System and method for checking a content site for efficacy
US20060031206A1 (en) 2004-08-06 2006-02-09 Christian Deubel Searching for data objects
US20060095345A1 (en) * 2004-10-28 2006-05-04 Microsoft Corporation System and method for an online catalog system having integrated search and browse capability

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030088576A1 (en) * 1997-10-22 2003-05-08 Masakazu Hattori Object-oriented data storage and retrieval system using index table
US6704747B1 (en) * 1999-03-16 2004-03-09 Joseph Shi-Piu Fong Method and system for providing internet-based database interoperability using a frame model for universal database
US20030018632A1 (en) * 1999-10-28 2003-01-23 International Business Machines Corporation System for organizing an annotation structure and for querying data and annotations
US20010027451A1 (en) * 2000-03-29 2001-10-04 Fujitsu Limited Information processing apparatus
US7062563B1 (en) * 2001-02-28 2006-06-13 Oracle International Corporation Method and system for implementing current user links
US20030105746A1 (en) * 2001-03-21 2003-06-05 Patrick Stickler Query resolution system and service
US20030018624A1 (en) * 2001-07-20 2003-01-23 International Business Machines Corporation Scalable eContent management system and method of using the same
US20040143569A1 (en) * 2002-09-03 2004-07-22 William Gross Apparatus and methods for locating data
US20040122958A1 (en) * 2002-12-19 2004-06-24 International Business Machines Corporation Method and system for peer-to-peer authorization
US20040162816A1 (en) * 2003-02-13 2004-08-19 Klaus Irle Text and attribute searches of data stores that include business objects
US20050050023A1 (en) * 2003-08-29 2005-03-03 Gosse David B. Method, device and software for querying and presenting search results
US20050076024A1 (en) * 2003-10-06 2005-04-07 International Business Machines Corporation System, method and program for database searching
US20050256865A1 (en) * 2004-05-14 2005-11-17 Microsoft Corporation Method and system for indexing and searching databases

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040162816A1 (en) * 2003-02-13 2004-08-19 Klaus Irle Text and attribute searches of data stores that include business objects
US7133867B2 (en) 2003-02-13 2006-11-07 Sap Aktiengesellschaft Text and attribute searches of data stores that include business objects
US8732174B2 (en) 2004-08-06 2014-05-20 Sap Ag Searching for data objects
US20060149712A1 (en) * 2004-12-30 2006-07-06 Uwe Kindsvogel Searching based on object relationships
US8745020B2 (en) 2005-06-16 2014-06-03 Gere Dev. Applications, LLC. Analysis and reporting of collected search activity data over multiple search engines
US10599735B2 (en) 2005-06-16 2020-03-24 Gula Consulting Limited Liability Company Auto-refinement of search results based on monitored search activities of users
US9965561B2 (en) 2005-06-16 2018-05-08 Gula Consulting Limited Liability Company Auto-refinement of search results based on monitored search activities of users
US9268862B2 (en) 2005-06-16 2016-02-23 Gere Dev. Applications, LLC Auto-refinement of search results based on monitored search activities of users
US8832055B1 (en) * 2005-06-16 2014-09-09 Gere Dev. Applications, LLC Auto-refinement of search results based on monitored search activities of users
US8812473B1 (en) * 2005-06-16 2014-08-19 Gere Dev. Applications, LLC Analysis and reporting of collected search activity data over multiple search engines
US8751473B2 (en) 2005-06-16 2014-06-10 Gere Dev. Applications, LLC Auto-refinement of search results based on monitored search activities of users
US7844590B1 (en) 2005-06-16 2010-11-30 Eightfold Logic, Inc. Collection and organization of actual search results data for particular destinations
US11188604B2 (en) 2005-06-16 2021-11-30 Gula Consulting Limited Liability Company Auto-refinement of search results based on monitored search activities of users
US7685191B1 (en) 2005-06-16 2010-03-23 Enquisite, Inc. Selection of advertisements to present on a web page or other destination based on search activities of users who selected the destination
US11809504B2 (en) 2005-06-16 2023-11-07 Gula Consulting Limited Liability Company Auto-refinement of search results based on monitored search activities of users
US8312002B2 (en) 2005-06-16 2012-11-13 Gere Dev. Applications, LLC Selection of advertisements to present on a web page or other destination based on search activities of users who selected the destination
US9152977B2 (en) 2006-06-16 2015-10-06 Gere Dev. Applications, LLC Click fraud detection
US7657626B1 (en) 2006-09-19 2010-02-02 Enquisite, Inc. Click fraud detection
US8103543B1 (en) 2006-09-19 2012-01-24 Gere Dev. Applications, LLC Click fraud detection
US8682718B2 (en) 2006-09-19 2014-03-25 Gere Dev. Applications, LLC Click fraud detection
US8266702B2 (en) * 2006-10-31 2012-09-11 Microsoft Corporation Analyzing access control configurations
US20080104665A1 (en) * 2006-10-31 2008-05-01 Microsoft Corporation Analyzing access control configurations
US8701200B2 (en) 2006-10-31 2014-04-15 Microsoft Corporation Analyzing access control configurations
US7765195B2 (en) 2006-11-07 2010-07-27 Microsoft Corporation Trimmed and merged search result sets in a versioned data environment
US20080109427A1 (en) * 2006-11-07 2008-05-08 Microsoft Corporation Trimmed and merged search result sets in a versioned data environment
US20080162603A1 (en) * 2006-12-28 2008-07-03 Google Inc. Document archiving system
US8082242B1 (en) * 2006-12-29 2011-12-20 Google Inc. Custom search
US20090063423A1 (en) * 2007-06-19 2009-03-05 Jackson Bruce Kelly User interfaces for service object located in a distributed system
US20090077480A1 (en) * 2007-06-19 2009-03-19 Caunter Mark Leslie Apparatus and method of managing electronic communities of users
US20090063448A1 (en) * 2007-08-29 2009-03-05 Microsoft Corporation Aggregated Search Results for Local and Remote Services
US8977710B2 (en) * 2008-06-18 2015-03-10 Qualcomm, Incorporated Remote selection and authorization of collected media transmission
US20090320097A1 (en) * 2008-06-18 2009-12-24 Jackson Bruce Kelly Method for carrying out a distributed search
US20090319615A1 (en) * 2008-06-18 2009-12-24 Caunter Mark Leslie Persistent personal messaging in a distributed system
US20090319385A1 (en) * 2008-06-18 2009-12-24 Jackson Bruce Kelly Monetizing and prioritizing results of a distributed search
US20090319599A1 (en) * 2008-06-18 2009-12-24 Caunter Mark Leslie Remote selection and authorization of collected media transmission
US8930531B2 (en) 2008-06-18 2015-01-06 Qualcomm Incorporated Persistent personal messaging in a distributed system
US9680949B2 (en) 2008-06-18 2017-06-13 Qualcomm Incorporated Remote selection and authorization of collected media transmission
JP2011525281A (en) * 2008-06-18 2011-09-15 クゥアルコム・インコーポレイテッド Method for performing a distributed search
CN103279576A (en) * 2008-06-18 2013-09-04 高通股份有限公司 Method for carrying out a distributed search
US8060603B2 (en) 2008-06-18 2011-11-15 Qualcomm Incorporated Persistent personal messaging in a distributed system
US9183301B2 (en) 2008-09-05 2015-11-10 Gere Dev. Applications, LLC Search engine optimization performance valuation
US8364529B1 (en) 2008-09-05 2013-01-29 Gere Dev. Applications, LLC Search engine optimization performance valuation
US8676847B2 (en) 2009-04-07 2014-03-18 International Business Machines Corporation Visibility control of resources
US20100257206A1 (en) * 2009-04-07 2010-10-07 International Business Machines Corporation Visibility Control of Resources
US20180218043A1 (en) * 2012-04-26 2018-08-02 Alibaba Group Holding Limited Information providing method and system
US20140096031A1 (en) * 2012-09-28 2014-04-03 Ge Medical Systems Global Technology Company, Llc Image display system and image display device
US10579442B2 (en) 2012-12-14 2020-03-03 Microsoft Technology Licensing, Llc Inversion-of-control component service models for virtual environments
US20150256566A1 (en) * 2014-03-06 2015-09-10 Call-It-Out, Inc. Project Collaboration
US9619533B2 (en) * 2014-11-01 2017-04-11 Veeva Systems Inc. System and method for reporting multiple objects in enterprise content management
US20160125049A1 (en) * 2014-11-01 2016-05-05 Veeva Systems Inc. System and method for reporting multiple objects in enterprise content management
US10496663B2 (en) 2016-06-16 2019-12-03 International Business Machines Corporation Search journaling for operations analysis
CN109902255A (en) * 2019-02-27 2019-06-18 百度在线网络技术(北京)有限公司 Page mixing browsing record generation method, device, equipment and storage medium

Also Published As

Publication number Publication date
EP1624386A3 (en) 2006-04-19
EP1624386B1 (en) 2013-08-28
US8732174B2 (en) 2014-05-20
US20120124055A1 (en) 2012-05-17
EP1624386A2 (en) 2006-02-08

Similar Documents

Publication Publication Date Title
US8732174B2 (en) Searching for data objects
JP5787963B2 (en) Computer platform programming interface
Lange An object-oriented design method for hypermedia information systems
JP5559140B2 (en) Representation of computing environment
Franklin et al. From databases to dataspaces: a new abstraction for information management
JP2020091902A (en) Versioned hierarchical type data structure of distributed type data store
US7685106B2 (en) Sharing of full text index entries across application boundaries
JP4738908B2 (en) System and method for providing contention processing for peer-to-peer synchronization of units of information manageable by a hardware / software interface system
JP4394643B2 (en) System and method for data modeling in an item-based storage platform
KR20200093569A (en) Resolving violations in client synchronization
US20080104032A1 (en) Method and System for Organizing Items
US7991767B2 (en) Method for providing a shared search index in a peer to peer network
US20140236958A1 (en) Evolving metadata
JP2000090074A (en) Managing method for document
JP2007521533A (en) System and method for interfacing application programs with item-based storage platforms
MXPA05007092A (en) Systems and methods for providing synchronization services for units of information manageable by a hardware/software interface system.
MXPA05005535A (en) Anti virus for an item store.
MXPA05006260A (en) Systems and methods for extensions and inheritance for units of information manageable by a hardware/software interface system.
Williams The associative model of data
US10944756B2 (en) Access control
JP4394644B2 (en) Storage platform for organizing, searching, and sharing data
US9348978B2 (en) Universal content traceability
US20210349888A1 (en) Personalized Spelling Correction
Chen et al. Search your memory!-an associative memory based desktop search system
Catarci et al. Structure everything

Legal Events

Date Code Title Description
AS Assignment

Owner name: SAP AKTIENGESELLSCHAFT, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DEUBEL, CHRISTIAN;GUTH, GERTRUDE;REEL/FRAME:016297/0304;SIGNING DATES FROM 20050408 TO 20050414

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION

AS Assignment

Owner name: SAP SE, GERMANY

Free format text: CHANGE OF NAME;ASSIGNOR:SAP AG;REEL/FRAME:033625/0223

Effective date: 20140707