The invention relates to document retrieval and in particular to access control for documents having configurable privacy attributes.
Information is commonly received from innumerable databases over computer networks such as the Internet by using one or more well known search engines or query servers such as the Google® search engine by Google, Inc. of Mountain View Calif. Search engines generally employ various systems and algorithms in response to a user query having one or more search terms to generate a hit list of documents including relevant instances of the search terms. The hit list typically includes uniform resource beaters (URLs), (i.e., web addresses) of the found documents.
A typical search engine uses a proprietary index associating every word in the documents being searched with a URI, or pointer to the document in which the word is found. The proprietary index is automatically generated with a web crawler. In an illustrative search for a document in response to a query having a plurality of search terms, a search engine first accesses the index to generate a list of URLs associated with a first search term then narrows the list of URLs by successively searching for members of the list which are also associated with a second search term in the index, etc.
Search engines have also been employed to control access codes associated with the documents. For example, a search engine may maintain a list of users and their corresponding access code or credentials. Before providing a hit list to a user, the search engine checks the requester's access code on the list and removes from the hit list any URLs for documents for which the requester's access code does not meet the document's authorized access code.
Previously known search engines have maintained the user access code list on a query server or, with improved efficiencies, on a local web server, as in U.S. Pat. No. 7,031,954. Only after the processing involved in generating a hit list is complete, however, do such search engines compare access codes of found documents with searcher's access code. The generation of a preliminary hit list including documents which can not he delivered to the searcher or included on a delivered hit list can be wasteful of processing and storage resources.
Illustrative embodiments of the present invention provide a system and method for controlling access to documents using access control parameters to reduce preliminary search engine hit lists prior to searching the preliminary search hit list for subsequent search terms in a query.
An illustrative embodiment of the invention provides a method of document retrieval in a network environment where documents are stored with a plurality of access codes. The method includes the steps of receiving a query by a query server having access to a first index of words in documents available for searching on document servers in the network and corresponding access codes of the documents. The query includes at least one keyword and an access code identifier of a requester. The method further includes the steps of executing the query by the query server whereby the query server identifies a second index of words in the first index, from documents having access codes corresponding to the access code identifier. Documents associated with the at least one keyword in the second index are identified.
In the illustrative embodiment, a hit list of the documents identified by the query server including the at least on keyword in response to the searching can be generated. The first index also includes a URL corresponding to each of the documents and the hit list includes URLs of the identified documents. The first index can further include an alias for a URL corresponding to each of the documents. The hit list is generated by identifying URLs of the identified documents in a third index of the aliases and corresponding URLs. The hit list includes URLs of the identified documents.
Another illustrative embodiment of the invention provides a method of document retrieval in a network environment where documents are stored with corresponding privacy codes. The privacy codes are privately controllable by at least one document custodian. The method includes the steps of receiving a query by at least one query server having access to a first index of documents available for searching on document servers in the network and privacy codes associated with corresponding documents in the index. The query includes or is otherwise associated with an access level identifier of a requester. The access level identifier indicates particular privacy codes of documents authorized for viewing by the requester. A first list of documents corresponding to the particular privacy codes indicated by the requester's access level identifier is generated by the query server in response to the query.
The query typically includes at least one keyword for identifying requested documents. A second index of words in each document in the first list is generated by the query server. A second list of the documents corresponding to the at least one keyword and being included in the first list is generated by the query server in response to the query. The first index and/or the second index can include a URL corresponding to each of the indexed documents.
In an illustrative embodiment, a list of hyperlinks to the documents in the second list is returned to the requester by the query server. A secure interface is provided for setting privacy codes by authorized document custodians of each document. The first index of documents is updated by the query server to include new documents received by the document server and documents having revised privacy codes.
The invention is illustrated in the figures of the accompanying drawings which are meant to be exemplary and not limiting, in which like references are intended to refer to like or corresponding parts, and in which;
Detailed embodiments of the present invention are disclosed herein, however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. Therefore, specific functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention.
The present invention provides a system and method by which document custodians including private citizens, corporations and institutions can control access to certain documents while allowing authorized persons to search for and access the controlled documents over networks such as the Internet. A search engine is provided which first narrows the universe of searched documents to only those documents which are authorized for viewing by the requester to generate a first list of documents. Once the search is narrowed, a conventional search, such as a keyword search, can be performed on the first list of documents to provide the searcher with the particular private documents of interest.
An illustrative embodiment of the invention utilizes a private access user interface to assign privacy codes to documents containing private information. An example of such a user interface is described in U.S. patent application Ser. No. 12/031,987. By using a private access system, a user can specify one or more parties or groups who are authorized to view particular documents. In an illustrative embodiment, different access levels may he provided by different parties, for example whereby certain parties may have authorization to view/print/forward or change a document while others may have a time limited period for viewing with no printing rights. In an illustrative embodiment, a requester's proximity to a particular station may influence the requester's access code, so that, for example, a requester in a particular location may be authorized to print a document but may not be authorized to do so from another location. Any number of combinations of access levels can be encoded into a particular privacy code which is associated with the document. The custodian or authorized persons can change the privacy codes of a document by securely accessing a private access interface. Encoding of the various access levels to generate a privacy code may he accomplished using any number of encoding methods and/or compression methods as known in the art, for example.
Searching efficiency is greatly enhanced by first narrowing the universe of searchable documents to those that are authorized for viewing or accessing by the searcher/requester. A search engine according to an illustrative embodiment of the invention is described with reference to
The search engine includes a query server which receives a query from a requester. The query generally includes at least one search term such as a keyword or other search parameter along with the privacy codes associated with the requester. In illustrative embodiments, the privacy code may be incorporated with the search parameter, or may be automatically transmitted by the requester in response to preliminary requester identification steps. It should be understood that requester identification may be performed using the private access user interface, or by using any of a variety of well known secure identification methods for remotely certifying the identification and private access codes of a user.
A first list of accessible documents for the particular requester, or the particular requesting condition is generated by identifying all of the documents in the first index associated with the requester's privacy code or codes.
In the illustrative embodiment, the search engine generates a second index 200 as shown in
In an alternative embodiment which may be employed, for example, if the quantity of data in the documents listed in the first list of accessible documents is relatively small, the generation of a second index may be omitted in favor or performing a brute force search for documents in the first list containing the search terms or matching the search parameters. This would include comparing each document in the relatively short first list with the query parameters to generate a hit list, rather than generating a word index from the first list.
In another alternative embodiment, a privacy code index, such as the first index 100 shown in
An illustrative embodiment of the invention is described with reference to
A method for searching for private information according to an illustrative embodiment is described with reference to the process flow diagram in
While the invention has been described and illustrated in connection with preferred embodiments, many variations and modifications will be evident to those skilled in the art and may be made without departing from the spirit and scope of the invention. The invention is thus not to be limited to the precise details of methodology or construction set forth above as such variations and modification are intended to be included within the scope of the invention.
This application claims benefit of U.S. Provisional Application No. 61/318,866 filed on Mar. 30, 2010.
| Number | Date | Country | |
|---|---|---|---|
| 61318866 | Mar 2010 | US |
| Number | Date | Country | |
|---|---|---|---|
| Parent | 13075313 | Mar 2011 | US |
| Child | 14547379 | US |