US20150143536A1 - System and method for locating and retrieving private information on a network - Google Patents

System and method for locating and retrieving private information on a network Download PDF

Info

Publication number
US20150143536A1
US20150143536A1 US14/547,379 US201414547379A US2015143536A1 US 20150143536 A1 US20150143536 A1 US 20150143536A1 US 201414547379 A US201414547379 A US 201414547379A US 2015143536 A1 US2015143536 A1 US 2015143536A1
Authority
US
United States
Prior art keywords
documents
index
query
document
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/547,379
Inventor
Robert Shelton
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US14/547,379 priority Critical patent/US20150143536A1/en
Publication of US20150143536A1 publication Critical patent/US20150143536A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F17/30321

Definitions

  • the invention relates to document retrieval and in particular to access control for documents having configurable privacy attributes.
  • Search engines generally employ various systems and algorithms in response to a user query having one or more search terms to generate a hit list of documents including relevant instances of the search terms.
  • the hit list typically includes uniform resource beaters (URLs), (i.e., web addresses) of the found documents.
  • URLs uniform resource beaters
  • a typical search engine uses a proprietary index associating every word in the documents being searched with a URI, or pointer to the document in which the word is found.
  • the proprietary index is automatically generated with a web crawler.
  • a search engine first accesses the index to generate a list of URLs associated with a first search term then narrows the list of URLs by successively searching for members of the list which are also associated with a second search term in the index, etc.
  • Search engines have also been employed to control access codes associated with the documents.
  • a search engine may maintain a list of users and their corresponding access code or credentials. Before providing a hit list to a user, the search engine checks the requester's access code on the list and removes from the hit list any URLs for documents for which the requester's access code does not meet the document's authorized access code.
  • search engines have maintained the user access code list on a query server or, with improved efficiencies, on a local web server, as in U.S. Pat. No. 7,031,954. Only after the processing involved in generating a hit list is complete, however, do such search engines compare access codes of found documents with searcher's access code. The generation of a preliminary hit list including documents which can not he delivered to the searcher or included on a delivered hit list can be wasteful of processing and storage resources.
  • Illustrative embodiments of the present invention provide a system and method for controlling access to documents using access control parameters to reduce preliminary search engine hit lists prior to searching the preliminary search hit list for subsequent search terms in a query.
  • An illustrative embodiment of the invention provides a method of document retrieval in a network environment where documents are stored with a plurality of access codes.
  • the method includes the steps of receiving a query by a query server having access to a first index of words in documents available for searching on document servers in the network and corresponding access codes of the documents.
  • the query includes at least one keyword and an access code identifier of a requester.
  • the method further includes the steps of executing the query by the query server whereby the query server identifies a second index of words in the first index, from documents having access codes corresponding to the access code identifier. Documents associated with the at least one keyword in the second index are identified.
  • a hit list of the documents identified by the query server including the at least on keyword in response to the searching can be generated.
  • the first index also includes a URL corresponding to each of the documents and the hit list includes URLs of the identified documents.
  • the first index can further include an alias for a URL corresponding to each of the documents.
  • the hit list is generated by identifying URLs of the identified documents in a third index of the aliases and corresponding URLs.
  • the hit list includes URLs of the identified documents.
  • Another illustrative embodiment of the invention provides a method of document retrieval in a network environment where documents are stored with corresponding privacy codes.
  • the privacy codes are privately controllable by at least one document custodian.
  • the method includes the steps of receiving a query by at least one query server having access to a first index of documents available for searching on document servers in the network and privacy codes associated with corresponding documents in the index.
  • the query includes or is otherwise associated with an access level identifier of a requester.
  • the access level identifier indicates particular privacy codes of documents authorized for viewing by the requester.
  • a first list of documents corresponding to the particular privacy codes indicated by the requester's access level identifier is generated by the query server in response to the query.
  • the query typically includes at least one keyword for identifying requested documents.
  • a second index of words in each document in the first list is generated by the query server.
  • a second list of the documents corresponding to the at least one keyword and being included in the first list is generated by the query server in response to the query.
  • the first index and/or the second index can include a URL corresponding to each of the indexed documents.
  • a list of hyperlinks to the documents in the second list is returned to the requester by the query server.
  • a secure interface is provided for setting privacy codes by authorized document custodians of each document.
  • the first index of documents is updated by the query server to include new documents received by the document server and documents having revised privacy codes.
  • FIG. 1 is a listing illustrating a privacy index generated according to an illustrative embodiment of the present invention
  • FIG. 2 is a listing illustrating a word index utilized in various illustrative embodiments of the present invention
  • FIG. 3 is a system block diagram illustrating a system for locating and retrieving private information on a network according to an illustrative embodiment of the invention.
  • FIG. 4 is a process flow diagram illustrating the steps of retrieving private information according to an illustrative embodiment of the invention.
  • the present invention provides a system and method by which document custodians including private citizens, corporations and institutions can control access to certain documents while allowing authorized persons to search for and access the controlled documents over networks such as the Internet.
  • a search engine is provided which first narrows the universe of searched documents to only those documents which are authorized for viewing by the requester to generate a first list of documents. Once the search is narrowed, a conventional search, such as a keyword search, can be performed on the first list of documents to provide the searcher with the particular private documents of interest.
  • An illustrative embodiment of the invention utilizes a private access user interface to assign privacy codes to documents containing private information.
  • An example of such a user interface is described in U.S. patent application Ser. No. 12/031,987.
  • a private access system a user can specify one or more parties or groups who are authorized to view particular documents.
  • different access levels may he provided by different parties, for example whereby certain parties may have authorization to view/print/forward or change a document while others may have a time limited period for viewing with no printing rights.
  • a requester's proximity to a particular station may influence the requester's access code, so that, for example, a requester in a particular location may be authorized to print a document but may not be authorized to do so from another location.
  • Any number of combinations of access levels can be encoded into a particular privacy code which is associated with the document.
  • the custodian or authorized persons can change the privacy codes of a document by securely accessing a private access interface. Encoding of the various access levels to generate a privacy code may he accomplished using any number of encoding methods and/or compression methods as known in the art, for example.
  • a search engine uses a first index 100 to generate a first list of all documents associated with one or more particular privacy codes 102 .
  • the first index is a large scale index which is generated and updated automatically using web crawler applications, for example.
  • the first index may include a high percentage of all documents available on a network such as the interne, for example.
  • For every privacy code 102 the corresponding documents 104 having that privacy code is included in the first index 100 .
  • the documents are represented in FIG. 1 by their URL, however they may be represented by numerous other document identifiers, aliases, pointers or the like within the scope of the present invention.
  • the search engine includes a query server which receives a query from a requester.
  • the query generally includes at least one search term such as a keyword or other search parameter along with the privacy codes associated with the requester.
  • the privacy code may be incorporated with the search parameter, or may be automatically transmitted by the requester in response to preliminary requester identification steps. It should be understood that requester identification may be performed using the private access user interface, or by using any of a variety of well known secure identification methods for remotely certifying the identification and private access codes of a user.
  • a first list of accessible documents for the particular requester, or the particular requesting condition is generated by identifying all of the documents in the first index associated with the requester's privacy code or codes.
  • the search engine generates a second index 200 as shown in FIG. 2 , which associates every word in the documents found in the first list of accessible documents with the document in which the word was found.
  • the second index 200 includes a list of words 202 and a list of document identifiers 204 for documents in the first list of accessible documents corresponding to each word.
  • the search engine then parses the second index 200 using the keyword or search parameter provided in the query to generate a second list of documents which include the keyword. It should be understood that documents having any combination of keywords or search parameters can be found in the second index using traditional data searching methods.
  • the generation of a second index may be omitted in favor or performing a brute force search for documents in the first list containing the search terms or matching the search parameters. This would include comparing each document in the relatively short first list with the query parameters to generate a hit list, rather than generating a word index from the first list.
  • a privacy code index such as the first index 100 shown in FIG. 1
  • a privacy code index can be generated for a list of documents returned by one or more preliminary search operations.
  • a keyword search may be performed using conventional search techniques on a large scale document index, such as that used by the well known Google® search engine to generate a first list.
  • This illustrative embodiment of the present invention can generate a privacy code index of only the documents included in the first index. Documents matching the privacy codes of a requester are then identified and either provided to the searcher in a hit list or provided to further iterations of searching for keywords or other search parameters.
  • a private document query server 302 is in communication with one or more networks 304 such as the internet or intranets, for example.
  • the private document query server 302 includes a privacy search engine 306 .
  • Documents having privacy codes are stored on various storage systems 308 which may be widely distributed and can be accessed by document servers 310 , via the internet 304 for example.
  • Document custodians 312 control the privacy codes of their documents via private access interface 314 .
  • a search user interface 316 executes on a searcher computer, which may be a personal computer or other general purpose computer attached to the network 304 , for example.
  • a method for searching for private information is described with reference to the process flow diagram in FIG. 4 .
  • a method of document retrieval 400 in a network environment starts in step 402 .
  • a privacy index of all privacy codes of documents available for searching on the network indexed to the corresponding documents is generated by a search engine 404 .
  • a query is received 406 by a query server having access to the privacy index of documents available for searching on the network, along with privacy codes of the document requester.
  • the query server parses the query 408 and identifies the privacy codes 410 of the requester.
  • the query server identifies 412 documents in the privacy index that match the requester's codes.
  • the query server then identifies 414 documents of the documents identified as matching the requester's codes which also match the search parameters provided in the search query. A list of hyperlinks to the resulting documents is communicated to the requester.
  • the illustrative method ends at process step 418 .

Abstract

A system for document retrieval in a network environment is provided where documents are stored with corresponding privacy codes. A query server computer is in communication with the network and is programmed to generate a privacy index of all documents available on the network indexed by their corresponding privacy codes. The privacy codes define document access permissions that are securely associated with the documents and are assigned by document custodians. A search engine in communication with the network is configured to receive a query from a requester and generate a list of documents from the privacy index which match search parameters of the query and privacy codes of the requester.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application claims benefit of U.S. Provisional Application No. 61/318,866 filed on Mar. 30, 2010.
  • FIELD OF THE INVENTION
  • The invention relates to document retrieval and in particular to access control for documents having configurable privacy attributes.
  • BACKGROUND OF THE INVENTION
  • Information is commonly received from innumerable databases over computer networks such as the Internet by using one or more well known search engines or query servers such as the Google® search engine by Google, Inc. of Mountain View Calif. Search engines generally employ various systems and algorithms in response to a user query having one or more search terms to generate a hit list of documents including relevant instances of the search terms. The hit list typically includes uniform resource beaters (URLs), (i.e., web addresses) of the found documents.
  • A typical search engine uses a proprietary index associating every word in the documents being searched with a URI, or pointer to the document in which the word is found. The proprietary index is automatically generated with a web crawler. In an illustrative search for a document in response to a query having a plurality of search terms, a search engine first accesses the index to generate a list of URLs associated with a first search term then narrows the list of URLs by successively searching for members of the list which are also associated with a second search term in the index, etc.
  • Search engines have also been employed to control access codes associated with the documents. For example, a search engine may maintain a list of users and their corresponding access code or credentials. Before providing a hit list to a user, the search engine checks the requester's access code on the list and removes from the hit list any URLs for documents for which the requester's access code does not meet the document's authorized access code.
  • Previously known search engines have maintained the user access code list on a query server or, with improved efficiencies, on a local web server, as in U.S. Pat. No. 7,031,954. Only after the processing involved in generating a hit list is complete, however, do such search engines compare access codes of found documents with searcher's access code. The generation of a preliminary hit list including documents which can not he delivered to the searcher or included on a delivered hit list can be wasteful of processing and storage resources.
  • SUMMARY OF THE INVENTION
  • Illustrative embodiments of the present invention provide a system and method for controlling access to documents using access control parameters to reduce preliminary search engine hit lists prior to searching the preliminary search hit list for subsequent search terms in a query.
  • An illustrative embodiment of the invention provides a method of document retrieval in a network environment where documents are stored with a plurality of access codes. The method includes the steps of receiving a query by a query server having access to a first index of words in documents available for searching on document servers in the network and corresponding access codes of the documents. The query includes at least one keyword and an access code identifier of a requester. The method further includes the steps of executing the query by the query server whereby the query server identifies a second index of words in the first index, from documents having access codes corresponding to the access code identifier. Documents associated with the at least one keyword in the second index are identified.
  • In the illustrative embodiment, a hit list of the documents identified by the query server including the at least on keyword in response to the searching can be generated. The first index also includes a URL corresponding to each of the documents and the hit list includes URLs of the identified documents. The first index can further include an alias for a URL corresponding to each of the documents. The hit list is generated by identifying URLs of the identified documents in a third index of the aliases and corresponding URLs. The hit list includes URLs of the identified documents.
  • Another illustrative embodiment of the invention provides a method of document retrieval in a network environment where documents are stored with corresponding privacy codes. The privacy codes are privately controllable by at least one document custodian. The method includes the steps of receiving a query by at least one query server having access to a first index of documents available for searching on document servers in the network and privacy codes associated with corresponding documents in the index. The query includes or is otherwise associated with an access level identifier of a requester. The access level identifier indicates particular privacy codes of documents authorized for viewing by the requester. A first list of documents corresponding to the particular privacy codes indicated by the requester's access level identifier is generated by the query server in response to the query.
  • The query typically includes at least one keyword for identifying requested documents. A second index of words in each document in the first list is generated by the query server. A second list of the documents corresponding to the at least one keyword and being included in the first list is generated by the query server in response to the query. The first index and/or the second index can include a URL corresponding to each of the indexed documents.
  • In an illustrative embodiment, a list of hyperlinks to the documents in the second list is returned to the requester by the query server. A secure interface is provided for setting privacy codes by authorized document custodians of each document. The first index of documents is updated by the query server to include new documents received by the document server and documents having revised privacy codes.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention is illustrated in the figures of the accompanying drawings which are meant to be exemplary and not limiting, in which like references are intended to refer to like or corresponding parts, and in which;
  • FIG. 1 is a listing illustrating a privacy index generated according to an illustrative embodiment of the present invention;
  • FIG. 2 is a listing illustrating a word index utilized in various illustrative embodiments of the present invention;
  • FIG. 3 is a system block diagram illustrating a system for locating and retrieving private information on a network according to an illustrative embodiment of the invention; and
  • FIG. 4 is a process flow diagram illustrating the steps of retrieving private information according to an illustrative embodiment of the invention.
  • DETAILED DESCRIPTION
  • Detailed embodiments of the present invention are disclosed herein, however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. Therefore, specific functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention.
  • The present invention provides a system and method by which document custodians including private citizens, corporations and institutions can control access to certain documents while allowing authorized persons to search for and access the controlled documents over networks such as the Internet. A search engine is provided which first narrows the universe of searched documents to only those documents which are authorized for viewing by the requester to generate a first list of documents. Once the search is narrowed, a conventional search, such as a keyword search, can be performed on the first list of documents to provide the searcher with the particular private documents of interest.
  • An illustrative embodiment of the invention utilizes a private access user interface to assign privacy codes to documents containing private information. An example of such a user interface is described in U.S. patent application Ser. No. 12/031,987. By using a private access system, a user can specify one or more parties or groups who are authorized to view particular documents. In an illustrative embodiment, different access levels may he provided by different parties, for example whereby certain parties may have authorization to view/print/forward or change a document while others may have a time limited period for viewing with no printing rights. In an illustrative embodiment, a requester's proximity to a particular station may influence the requester's access code, so that, for example, a requester in a particular location may be authorized to print a document but may not be authorized to do so from another location. Any number of combinations of access levels can be encoded into a particular privacy code which is associated with the document. The custodian or authorized persons can change the privacy codes of a document by securely accessing a private access interface. Encoding of the various access levels to generate a privacy code may he accomplished using any number of encoding methods and/or compression methods as known in the art, for example.
  • Searching efficiency is greatly enhanced by first narrowing the universe of searchable documents to those that are authorized for viewing or accessing by the searcher/requester. A search engine according to an illustrative embodiment of the invention is described with reference to FIG. 1. The search engine uses a first index 100 to generate a first list of all documents associated with one or more particular privacy codes 102. The first index is a large scale index which is generated and updated automatically using web crawler applications, for example. The first index may include a high percentage of all documents available on a network such as the interne, for example. For every privacy code 102, the corresponding documents 104 having that privacy code is included in the first index 100. The documents are represented in FIG. 1 by their URL, however they may be represented by numerous other document identifiers, aliases, pointers or the like within the scope of the present invention.
  • The search engine includes a query server which receives a query from a requester. The query generally includes at least one search term such as a keyword or other search parameter along with the privacy codes associated with the requester. In illustrative embodiments, the privacy code may be incorporated with the search parameter, or may be automatically transmitted by the requester in response to preliminary requester identification steps. It should be understood that requester identification may be performed using the private access user interface, or by using any of a variety of well known secure identification methods for remotely certifying the identification and private access codes of a user.
  • A first list of accessible documents for the particular requester, or the particular requesting condition is generated by identifying all of the documents in the first index associated with the requester's privacy code or codes.
  • In the illustrative embodiment, the search engine generates a second index 200 as shown in FIG. 2, which associates every word in the documents found in the first list of accessible documents with the document in which the word was found. The second index 200 includes a list of words 202 and a list of document identifiers 204 for documents in the first list of accessible documents corresponding to each word. The search engine then parses the second index 200 using the keyword or search parameter provided in the query to generate a second list of documents which include the keyword. It should be understood that documents having any combination of keywords or search parameters can be found in the second index using traditional data searching methods.
  • In an alternative embodiment which may be employed, for example, if the quantity of data in the documents listed in the first list of accessible documents is relatively small, the generation of a second index may be omitted in favor or performing a brute force search for documents in the first list containing the search terms or matching the search parameters. This would include comparing each document in the relatively short first list with the query parameters to generate a hit list, rather than generating a word index from the first list.
  • In another alternative embodiment, a privacy code index, such as the first index 100 shown in FIG. 1, can be generated for a list of documents returned by one or more preliminary search operations. For example, a keyword search may be performed using conventional search techniques on a large scale document index, such as that used by the well known Google® search engine to generate a first list. This illustrative embodiment of the present invention can generate a privacy code index of only the documents included in the first index. Documents matching the privacy codes of a requester are then identified and either provided to the searcher in a hit list or provided to further iterations of searching for keywords or other search parameters.
  • An illustrative embodiment of the invention is described with reference to FIG. 3 in which a private document query server 302 is in communication with one or more networks 304 such as the internet or intranets, for example. The private document query server 302 includes a privacy search engine 306. Documents having privacy codes are stored on various storage systems 308 which may be widely distributed and can be accessed by document servers 310, via the internet 304 for example. Document custodians 312 control the privacy codes of their documents via private access interface 314. A search user interface 316 executes on a searcher computer, which may be a personal computer or other general purpose computer attached to the network 304, for example.
  • A method for searching for private information according to an illustrative embodiment is described with reference to the process flow diagram in FIG. 4. A method of document retrieval 400 in a network environment starts in step 402. A privacy index of all privacy codes of documents available for searching on the network indexed to the corresponding documents is generated by a search engine 404. A query is received 406 by a query server having access to the privacy index of documents available for searching on the network, along with privacy codes of the document requester. The query server parses the query 408 and identifies the privacy codes 410 of the requester. The query server identifies 412 documents in the privacy index that match the requester's codes. The query server then identifies 414 documents of the documents identified as matching the requester's codes which also match the search parameters provided in the search query. A list of hyperlinks to the resulting documents is communicated to the requester. The illustrative method ends at process step 418.
  • While the invention has been described and illustrated in connection with preferred embodiments, many variations and modifications will be evident to those skilled in the art and may be made without departing from the spirit and scope of the invention. The invention is thus not to be limited to the precise details of methodology or construction set forth above as such variations and modification are intended to be included within the scope of the invention.

Claims (20)

What is claimed is:
1. A method of document retrieval in a network environment where documents are stored with a plurality of access codes comprising:
receiving a query by a query server having access to a first index of words in documents available for searching on document servers in said network and corresponding access codes of said documents, said query including a keyword and being associated with an access code identifier of a requester; and
executing said query by said query server identifying a second index of words in said first index from documents having access codes corresponding to said access code identifier, and identifying documents associated with said at least one keyword in said second index.
2. The method of claim 1, comprising:
generating a hit list of said documents identified by said query server including said at least on keyword in response to said searching.
3. The method of claim 2, wherein said first index further comprises a URL corresponding to each of said documents and wherein said hit list includes URLs of said identified documents.
4. The method of claim 2, wherein said first index further comprises an alias for a URL corresponding to each of said documents, and wherein said generating a hit list comprises:
identifying URLs of said identified documents in a third index of said aliases and corresponding URLs, and wherein said hit list includes URLs of said identified documents.
5. The method of claim 1 wherein said access codes are privately controllable by at least one document custodian.
6. A method of document retrieval in a network environment where documents are stored with corresponding privacy codes comprising:
receiving a query by at least one query server having access to a first index of documents available for searching on document servers in said network and privacy codes associated with corresponding documents in said index; said query being associated with an access level identifier of a requester, said access level identifier indicating particular privacy codes of documents authorized for viewing by said requester; and
generating by said query server in response to said query, a first list of said documents corresponding to said particular privacy codes indicated by said requester's access level identifier.
7. The method of claim 6 wherein said query including at least one keyword for identifying requested documents, the method further comprising:
generating a second index of words in each document in said first list by said query server; and
generating by said query server in response to said query, a second list of said documents corresponding to said at least one keyword and being included in said first list.
8. The method of claim 7, further comprising:
returning to said requester by said query server, a list of hyperlinks to said documents in said second list.
9. The method of claim 6, comprising:
providing a secure interface for setting privacy codes by authorized document custodians of each document.
10. The method of claim 6, comprising:
receiving new documents having a privacy code or a document having a revised privacy code by said document server; and
updating by said query server said first index of documents to include said new document or said revised privacy code in response to receiving said new document or said revised privacy code.
11. The method of claim 7, wherein at least one of said first index or second index comprises a URL corresponding to each of said documents and wherein at least one of said first list and said second list includes URLs of said documents included therein.
12. The method of claim 6 wherein said access levels are privately controllable by at least one document custodian.
13. A system for document retrieval in a network environment where documents are stored with corresponding privacy codes, comprising:
a query server computer in communication with the network, the query server computer configured to:
generate a privacy index of all documents available on the network indexed by their corresponding privacy codes, the privacy codes defining permitted conditions of document access that are securely associated with the documents according to the control of at least one document custodian for each document.
14. The system according to claim 13, comprising:
a search engine in communication with the network and configured to:
receive a query from a requester; and
generate a list of documents from said privacy index which match search parameters of the query and privacy codes of the requester.
15. The system according to claim 13 wherein the query server computer is further configured to receive a query including a keyword and an access code identifier from a requester.
16. The system according to claim 15 wherein the query server computer is further configured to generate a second index of words in the privacy index from documents having access codes corresponding to the access code identifier.
17. The system according to claim 16 wherein the query server computer is further configured to identify documents associated with the keyword in the second index.
18. The system according to claim 17 wherein the query server computer is further configured to generate a hit list of the identified documents associated with the keyword and associated with the access code identifier.
19. The system according to claim 18 wherein the query server computer is further configured to return to the requester the hit list.
20. The system according to claim 19 wherein the query server computer is further configured to return to the requester a list of hyperlinks to the documents in the hit list.
US14/547,379 2010-03-30 2014-11-19 System and method for locating and retrieving private information on a network Abandoned US20150143536A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/547,379 US20150143536A1 (en) 2010-03-30 2014-11-19 System and method for locating and retrieving private information on a network

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US31886610P 2010-03-30 2010-03-30
US13/075,313 US8909669B2 (en) 2010-03-30 2011-03-30 System and method for locating and retrieving private information on a network
US14/547,379 US20150143536A1 (en) 2010-03-30 2014-11-19 System and method for locating and retrieving private information on a network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/075,313 Continuation US8909669B2 (en) 2010-03-30 2011-03-30 System and method for locating and retrieving private information on a network

Publications (1)

Publication Number Publication Date
US20150143536A1 true US20150143536A1 (en) 2015-05-21

Family

ID=44710852

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/075,313 Expired - Fee Related US8909669B2 (en) 2010-03-30 2011-03-30 System and method for locating and retrieving private information on a network
US14/547,379 Abandoned US20150143536A1 (en) 2010-03-30 2014-11-19 System and method for locating and retrieving private information on a network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/075,313 Expired - Fee Related US8909669B2 (en) 2010-03-30 2011-03-30 System and method for locating and retrieving private information on a network

Country Status (1)

Country Link
US (2) US8909669B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160246881A1 (en) * 2015-02-19 2016-08-25 At&T Intellectual Property I, L.P. Apparatus and method for automatically redirecting a search

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186542B (en) * 2011-12-27 2017-09-12 腾讯科技(北京)有限公司 The method and device of data query
US9158825B1 (en) * 2012-11-09 2015-10-13 Symantec Corporation Search validity in data backup systems
US20140344952A1 (en) * 2013-05-14 2014-11-20 Google Inc. Indexing and searching documents with restricted portions
US9792315B2 (en) * 2014-08-21 2017-10-17 Dropbox, Inc. Multi-user search system with methodology for bypassing instant indexing
US9384357B2 (en) * 2014-10-01 2016-07-05 Quixey, Inc. Providing application privacy information
US9384226B1 (en) 2015-01-30 2016-07-05 Dropbox, Inc. Personal content item searching system and method
US9183303B1 (en) 2015-01-30 2015-11-10 Dropbox, Inc. Personal content item searching system and method
US9578006B2 (en) * 2015-03-21 2017-02-21 International Business Machines Corporation Restricted content publishing with search engine registry
EP3274890A4 (en) 2015-03-23 2019-03-13 Private Access Inc. System, method and apparatus to enhance privacy and enable broad sharing of bioinformatic data
US9959416B1 (en) * 2015-03-27 2018-05-01 Google Llc Systems and methods for joining online meetings
EP3179385A1 (en) * 2015-12-09 2017-06-14 Tata Consultancy Services Limited Method and system for user authorization based information search and access

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7707039B2 (en) * 2004-02-15 2010-04-27 Exbiblio B.V. Automatic modification of web pages
US20110029504A1 (en) * 2004-12-03 2011-02-03 King Martin T Searching and accessing documents on private networks for use with captures from rendered documents
US8200775B2 (en) * 2005-02-01 2012-06-12 Newsilike Media Group, Inc Enhanced syndication
US8347088B2 (en) * 2005-02-01 2013-01-01 Newsilike Media Group, Inc Security systems and methods for use with structured and unstructured data
US20130104251A1 (en) * 2005-02-01 2013-04-25 Newsilike Media Group, Inc. Security systems and methods for use with structured and unstructured data
US20130173582A1 (en) * 2006-03-01 2013-07-04 Oracle International Corporation Indexing secure enterprise documents using generic references

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5845067A (en) * 1996-09-09 1998-12-01 Porter; Jack Edward Method and apparatus for document management utilizing a messaging system
US20030079030A1 (en) * 2001-08-22 2003-04-24 Cocotis Thomas A. Output management system and method for enabling access to private network resources
US7444413B2 (en) * 2002-06-26 2008-10-28 Microsoft Corporation Authorization access controlled content exchange
US20070276823A1 (en) * 2003-05-22 2007-11-29 Bruce Borden Data management systems and methods for distributed data storage and management using content signatures
US7409406B2 (en) * 2003-09-08 2008-08-05 International Business Machines Corporation Uniform search system and method for selectively sharing distributed access-controlled documents
US8275632B2 (en) * 2004-07-23 2012-09-25 Privit, Inc. Privacy compliant consent and data access management system and methods
US8332430B2 (en) * 2006-03-01 2012-12-11 Oracle International Corporation Secure search performance improvement
US8214394B2 (en) * 2006-03-01 2012-07-03 Oracle International Corporation Propagating user identities in a secure federated search system
US7941419B2 (en) * 2006-03-01 2011-05-10 Oracle International Corporation Suggested content with attribute parameterization
US8433712B2 (en) * 2006-03-01 2013-04-30 Oracle International Corporation Link analysis for enterprise environment
US20090106271A1 (en) * 2007-10-19 2009-04-23 International Business Machines Corporation Secure search of private documents in an enterprise content management system
US9805123B2 (en) * 2008-11-18 2017-10-31 Excalibur Ip, Llc System and method for data privacy in URL based context queries

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7707039B2 (en) * 2004-02-15 2010-04-27 Exbiblio B.V. Automatic modification of web pages
US7742953B2 (en) * 2004-02-15 2010-06-22 Exbiblio B.V. Adding information or functionality to a rendered document via association with an electronic counterpart
US20110029504A1 (en) * 2004-12-03 2011-02-03 King Martin T Searching and accessing documents on private networks for use with captures from rendered documents
US8200775B2 (en) * 2005-02-01 2012-06-12 Newsilike Media Group, Inc Enhanced syndication
US8347088B2 (en) * 2005-02-01 2013-01-01 Newsilike Media Group, Inc Security systems and methods for use with structured and unstructured data
US20130104251A1 (en) * 2005-02-01 2013-04-25 Newsilike Media Group, Inc. Security systems and methods for use with structured and unstructured data
US20130173582A1 (en) * 2006-03-01 2013-07-04 Oracle International Corporation Indexing secure enterprise documents using generic references
US8626794B2 (en) * 2006-03-01 2014-01-07 Oracle International Corporation Indexing secure enterprise documents using generic references

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160246881A1 (en) * 2015-02-19 2016-08-25 At&T Intellectual Property I, L.P. Apparatus and method for automatically redirecting a search
US10180985B2 (en) * 2015-02-19 2019-01-15 At&T Intellectual Property I, L.P. Apparatus and method for automatically redirecting a search

Also Published As

Publication number Publication date
US20110246475A1 (en) 2011-10-06
US8909669B2 (en) 2014-12-09

Similar Documents

Publication Publication Date Title
US8909669B2 (en) System and method for locating and retrieving private information on a network
US6947924B2 (en) Group based search engine generating search results ranking based on at least one nomination previously made by member of the user group where nomination system is independent from visitation system
US7953775B2 (en) Sharing tagged data on the internet
US7627569B2 (en) Document access control
US6898592B2 (en) Scoping queries in a search engine
US7505956B2 (en) Method for classification
US6985948B2 (en) User's right information and keywords input based search query generating means method and apparatus for searching a file
CN100476828C (en) Safety search engine system based on accessing control
US9324113B2 (en) Presenting social network connections on a search engine results page
US20060080316A1 (en) Multiple indexing of an electronic document to selectively permit access to the content and metadata thereof
US20090063448A1 (en) Aggregated Search Results for Local and Remote Services
US20090106207A1 (en) Method for restricting access to search results and a search engine supporting the method
US8095545B2 (en) System and methodology for a multi-site search engine
US8799321B2 (en) License management apparatus, license management method, and computer readable medium
CN1932816A (en) Full text search system based on ciphertext
US20150113019A1 (en) Obtaining Access-Restricted Search Related Structured Data
CN110727663A (en) Data cleaning method, device, equipment and medium
CN108154024B (en) Data retrieval method and device and electronic equipment
CN105224555A (en) A kind of methods, devices and systems of search
CN113377876A (en) Domino platform-based data sub-database processing method, device and platform
US20080172371A1 (en) Methods and computer program product for searching and providing access to web-searchable documents based on keyword analysis
US20110246500A1 (en) Storing and querying of user feedback in a personal repository accessible to a personal computing device
CN103646034A (en) Web search engine system and search method based content credibility
US20060053092A1 (en) Method and system to perform dynamic search over a network
US20050076033A1 (en) Method and system distribute search queries over a network

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION