CA2300239C - A content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine - Google Patents
A content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine Download PDFInfo
- Publication number
- CA2300239C CA2300239C CA002300239A CA2300239A CA2300239C CA 2300239 C CA2300239 C CA 2300239C CA 002300239 A CA002300239 A CA 002300239A CA 2300239 A CA2300239 A CA 2300239A CA 2300239 C CA2300239 C CA 2300239C
- Authority
- CA
- Canada
- Prior art keywords
- content
- blocking
- indexing
- engine
- search
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000000903 blocking effect Effects 0.000 title claims abstract description 89
- 238000001914 filtration Methods 0.000 title claims abstract description 51
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000008569 process Effects 0.000 claims description 26
- 230000008859 change Effects 0.000 claims description 5
- 230000007717 exclusion Effects 0.000 claims description 5
- 208000036758 Postinfectious cerebellitis Diseases 0.000 claims description 3
- 239000008186 active pharmaceutical agent Substances 0.000 claims 1
- 230000008901 benefit Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 230000010354 integration Effects 0.000 description 3
- 239000000463 material Substances 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 235000014510 cooky Nutrition 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/953—Organization of data
- Y10S707/959—Network
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99944—Object-oriented database structure
- Y10S707/99945—Object-oriented database structure processing
Abstract
A content-indexing search system and method provides search results consistent with content filtering and blocking policies. The search system comprises a content-indexing search engine including a database coupled to an information network. A user provides search queries to the search engine through a gateway serving as a proxy server and cache and blocking engine. The blocking engine implements content filtering and blocking policies with respect to the search results.
Alternative embodiments provide consistency between the results of the user content searches and the content filtering/blocking policies. One embodiment modifies the search engine to implement the same content blocking policy as the caching and filtering engine. Another embodiment modifies the search engine to build an indexing database by searching the caching and engine content. A third embodiment modifies the search engine to go through the cache and filter engine as the search engine builds its indexing database. A fourth embodiment modifies a search engine to go through a caching and filtering engine as it builds an indexing database.
Alternative embodiments provide consistency between the results of the user content searches and the content filtering/blocking policies. One embodiment modifies the search engine to implement the same content blocking policy as the caching and filtering engine. Another embodiment modifies the search engine to build an indexing database by searching the caching and engine content. A third embodiment modifies the search engine to go through the cache and filter engine as the search engine builds its indexing database. A fourth embodiment modifies a search engine to go through a caching and filtering engine as it builds an indexing database.
Description
A CONTENT-INDEXING SEARCH SYSTEM AND METHOD PROVIDING
SEARCH RESULTS CONSISTENT WITH CONTENT FILTERING AND
BLOCKING POLICIES IMPLEMENTED IN A BLOCKING ENGINE
BACKGROUND OF THE INVENTION
Field of Invention:
This invention relates to information retrieval systems. More particularly, the invention relates to a content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine.
Description of Prior Art:
With the explosive growth of text and multimedia content that is available in the Internet and other data networks and systems, end users are increasingly relying on text and key word based search tools to locate information of potential interest. End users typically enter as input to a search tool or engine, key words describing the information and documents they are seeking. The search tool or engine will then search in an existing indexing database, and return a list of pointers to documents of potential interest, with document titles and often with a few descriptive lines of text extracted from the document body. End users will then proceed to navigate to some or all of the returned pointers to retrieve and view the actual document or online content.
The search engine indexing database is typically built automatically or semi-automatically by launching an automaton program against a content source (such as Internet Web Sites), and having the automaton search the root content source as well as links to the content tree (often going to other sites), and indexing the information in the database for future searches. For large content sources, such as Web Sites on the Internet, automated searching and indexing is the only practical way to create an index search database.
With the increased diversity of information available on online systems and networks, corporations, individuals, groups, and Network Service Providers (NSPs) are increasingly implementing policies and controls to filter or otherwise limit the availability of content that is deemed inappropriate or undesirable for end users. Such content access control policies typically block undesirable content from reaching all or a subset of end users in a given online service and network. The blocking of content is typically performed in a content proxy gateway, data-network firewall, or other device inserted between the end user and the ultimate content source. Often the content filtering is implemented as part of a content caching engine, where only desirable content are kept in the cache for the user population, and undesirable content is prevented from being cached.
All users can only access network content through the cache. Content is typically blocked for being offensive or inappropriate for a user group or business use or viewing at a particular time of day and other similar reasons. Often NSPs and corporations will rely on a rating system or service such as Platform For Internet Content Selection (PICS) to determine the suitability of a content site or document for a particular population. End users may also select their own self-imposed set of blocking policies in some systems.
A significant problem is presented to NSPs and data delivery providers between the need for automated search engines that automatically index vast amounts of content and the need for blocking engines to block some of the content to ultimately reach end users.
Specifically, the problem is the lack of integration and coordination of the search engines with the filter and blocking policy engines.
The lack of integration is caused by several reasons, including:
(a) Many organizations deploy and implement content filtering blocking policies on their sites or service which rely on search engines, such as those available on the Internet, over which they have no control.
(b) Search engines by design must find and index as much content as possible and are biased toward seeking all content aggressively. On the other hand, filtering and blocking engines by design attempt to be selective in the documents that are stored on caches and presented to end users.
The intrinsically different missions between search engines and blocking engines combined with the need for high performance and efficiency of implementation, impedes integration and coordination of these two information retrieval functions.
The problem is manifested in the fact that end users while utilizing the services of a search engine will be presented with search results containing content/document titles and descriptions to content documents that will be ultimately inaccessible based on the filtering/blocking policies. In addition to the end user inconvenience and frustration from the inconsistency, the titles and short description of the content/documents returned by the search engine may, in themselves, be highly offensive or otherwise undesirable.
Accordingly, the need exists in information retrieval systems to have search results conformed to and be consistent with blocking policies with as little protocol and performance impact as feasible.
Prior art related to content-indexing search and blocking systems includes the following:
USP 5,701,469 issued December 23, 1997 (Brandli et al.) discloses a contact index search system which invokes search result correction routines to remove from the results stored search results incorrectly included and to add stored search results that were incorrectly excluded. In this manner, the search results generated in response to a user query is made accurate even though the content-index used to generate the initial search result was not up to date.
USP 5,835,722 issued November 10, 1998, filed June 27, 1996, (Bradshaw et al.) discloses a terminal for blocking the use and transmission of inappropriate material by comprehensively monitoring computer operations for creation or transmission of search inappropriate material, upon which the terminal is blocked and may only be unblocked by supervisory intervention.
USP 5,706,507 issued January 6, 1998, filed July 5, 1995, (Schloss) discloses an advisory server operated by a third party which rates the content of data downloaded from a content server to a client in order to block or sensor unwanted material.
USP 5,619,648 issued April 8, 1997 (Canale et al.) discloses an e-mail filter which determines whether an e-mail message should be provided to a user in accordance with models of the users correspondence.
None of the prior art discloses a content-indexing search system which provides search results consistent with blocking policies implemented in a blocking engine whereby only content allowed by the blocking policies is returned to the end user as the result of the content search, making the search results consistent with the blocking policies.
SUMMARY OF THE INVENTION
An object of the invention is an improved information retrieval system and method of operation providing consistency between search engine results and content blocking policies.
Another object is an improved content-index search system and method of operation providing search results consistent with blocking policies.
Another object is an improved content indexing search system which implements blocking policies in a caching and filtering engine.
Another object is an improved content-indexing search system and method of operation implementing blocking policies during a content-indexing phase.
Another object is an improved content-indexing search system and method of operation implementing blocking policies during an end user's search result presentation phase.
Another object is an improved content-indexing search system and method of operation by searching a local repository of a caching and blocking engine in lieu of searching and indexing ultimate content site sources and content servers.
Another object is an improved content-indexing searching system and method of operation configured to go through a caching and filtering engine to reach a target content.
These and other objects, features and advantages are achieved in an information retrieval network including a content-indexing search engine having a database and a caching engine coupled between the search engine and the end user, for implementing control policies typically blocking undesirable content such that search results are consistent with an end users organization's filtering and blocking policies implemented in alternative embodiments.
In one embodiment, only content that is allowable by the blocking policy is added to the search engine indexing database. In a second embodiment, the search and presentation process of the search engine is modified to implement the blocking policies. In a third embodiment, the target of the search engine's scanning and indexing automaton process is modified to build an indexing database by searching the caching engine's content. In a fourth embodiment, the search engine's scanning and indexing automaton is configured in the same way as an end user browser, i.e., going through a caching and filtering engine to reach a target content.
DESCRIPTION OF DRAWING
The invention will be further understood from the following detailed description taken in conjunction with the appended drawing, in which:
Figure 1 is a block diagram of an information retrieval system including a content server having a database; a caching engine implementing blocking policies, an external search engine, the search engine coupled to an end user and the content server and incorporating the principles of the present invention.
Figure 2 is a representative content blocking rules table implemented in Figure 1.
Figure 3 is a flow diagram illustrating the operation in a first embodiment implementing a blocking policy during a content search and indexing phase.
Figure 4 is a flow diagram of Figure 1 in a second embodiment implementing a blocking policy during an end user's search result presentation phase.
Figure 5 is a flow diagram of the search engine of Figure 1 in a third embodiment in which the search engine is modified to building an indexing database by searching the caching engine content.
Figure 6 is a flow diagram of the search engine of Figure 1 in a fourth embodiment modifying a search engine to go through a caching and filtering engine as it builds an indexing database.
DESCRIPTION PREFERRED EMBODIMENT
In Figure 1 an information retrieval system 100 includes a plurality of client devices 102,104 connected through an internal or controlled network 107 to an external information system 106 such as the Internet or other distributed data network. A typical client is a PC
having a display 110, a keyboard 111, a CPU 112, a memory 113 and a network connectivity I/O device 115. Examples of these clients and networks include business users of PCs connected to an internal company network and home users of PCs connected to a service provider network, both ultimately connected to the larger Internet. A browser 116, such as those sold under the trademark Netscape Communicator, IBM Web Explorer, and the like, is installed in the memory 113 along with a standard operating system 117 and application programs 118. The browser 116 runs or executes in the client device 102, 104 for loading or downloading content from a content server 120 coupled to the Internet 106. Each content server includes a database 122 for storing data responsive to content requests from the clients 102, 104, etc. In one form, data is stored as a collection of HTML documents containing text and other multi-media content.
A gateway 124 is usually used to interface more than one client or internal network segments 107 to the Internet 106 as shown. Typically a proxy server that includes a cache and content filtering engine 126 is inserted in the connection path from the internal network 107 to the Internet 106, to increase performance and control by implementing a content blocking policy.
The caching and blocking proxy server can be connected to the gateway or have parallel direct connections to the internal 107 and external 106 networks.
A client system 102, 104 running the web browser 116 requests content from the content server 120 using a Hypertext Transfer Protocol (HTTP) request and receiving the content in a HTTP
response. HTTP requests and responses occur over TCP/IP sockets that are communicated over the communication link between the client and the content server. A user may generate a content request by explicitly asking for content stored in the content server or by taking on a hyperlink anchor which points to contents stored on content servers. Upon receipt, the browser loads that content using an HTTP session. A more detailed description of HTTP may be found in Berners-Lee et al., "Hypertext Transfer Protocol - HTTP/1.0" Draft IEFT-HTTP-V 10 - Spec -0.0 Text." 1995 (March 8) Internet Draft. A more detailed description of HTML may be found in Berners-Lee "Hypertext Markup Language (HTML)" Draft IEFT.IIIR-HTML-0l, June 1993 (expired working draft). A
detailed description of TCP/IP Sockets and Communication on the Internet may be found in W. Richard Stevens, "TCP/IP Illustrated, Vol. 1--The Protocols", Addison-Westlake, 1994, pages 1-20,229-262.
A user of a client system utilizing the web browser 116 will often access a conventional search engine server 130, 135 and databases 131, 136, respectively, specialize to locate Internet content by means of keyword searches. These secured search engine servers can be external 130, or internal 135 to the controlled network 107. While they perform the same basic function, internally attached search engine servers 135 can be independently controlled by the internal network operator and are preferred. The methods of this invention, would typically be implemented by internally attached and controlled search engines 135, or by external search engines 130 that provide, as a service to an organization, consistency with the organizations content blocking policy. As a result of a keyword search directed at a search engine server 130 or 135, end users will see displayed in the web browser 116 a list of matching URLs and text excerpts displayed as hyperlink anchors to the ultimate content. The user can then select and follow the link to one or more content matches using the web browser 116.
In Figure 2, a content sample filtering/blocking configuration table 200 is generated by the client or by a network/service administrator and installed at the proxy server 126 to filter or otherwise limit the availability of content that is deemed inappropriate or undesirable. These content access control policies typically block undesirable content from reaching all or a subset of end users in a given online service or network. The table is installed in the cache and filtering engine 126, and is typically stored in a database 127. In one form, the table comprises a row 201 including for each user or group of users one or more of the following: an Id 203; a list of keywords to block 205;
Platform For Interconnect Content Selection (PICS) rules 207, a black list of URLs not to be contacted 209, a white list of the only URLs that can be contacted 211. A
description of URLs maybe found in Bemers-Lee et al. "Uniform Resource Locators (URL)", RFC 1738, December 1994. PICS
ratings are obtained from PICS Rules that allow or block access to URLs based on PICs labels incorporated into documents which describe the URLs. PICS rules are described in the Internet at http://www.w3.org/TR/REC-PICSRules-971229, published by W3C, Massachusetts Institute of Technology, 77 Massachusetts Ave. Cambridge Mass, 02139. More specifically, PICS Rules is a language for expressing filtering rules (profiles) that allow or block access to URLs based on PICS
labels that describe those URLs. The labels are created using a software tool in accordance with a PICS Technical specification -1.1 available in the Internet at http://www.w#.org/PICS/. The software tool is used to create labels in a document that describe particular URLs.
Alternatively, in lieu of pasting the labels into documents, an independent reader distributes the labels through a separate server called a Label Bureau. Filtering software will know to check at that Label Bureau to find the labels much as a consumer knows to read particular magazines for review of appliances or automobiles. Once the label has been created, the label is inserted as an extra header in the HTTP
header stream that precedes the content of the documents that are sent to the web browser.
Alternatively, the labels can be imbedded in HTML documents using a META tag. With this method, labels are sent only with HTML documents, not with images, video or anything else. A PICS-compliant content server is available from International Business Machines Corporation, Armonk, NY.
With the blocking table installed in the cache and blocking engine 122, several process alternatives are available to couple content search and content blocking engine, such that only content ultimately allowed by the blocking policy is returned to the client as the result of the content search. While it is possible to have different rules for each individual user, it is more manageable to have a single set of rules that apply to all users, or to divide users into a small number of user groups, each with its own rule. Individual users or groups, if defined, can be identified by using several means, including: client system IP address to user/group ID mappings, use of HTTP basic authentication at the start of a browsing session, us of HTTP web "cookies" to track user identity.
Turning to Figure 3, a process 300 implements the blocking policy during the content indexing phase. In step 302 the search engine's 135 content scanning and indexing automaton process is modified. In step 304, the content filtering rules from the content and filtering engine 126 are imported into the search engine server 135 via Application Program Interfaces (APIs) or transfer of rule defmition files, at regular intervals, or whenever a change is detected.
In step 306, multiple indexing database trees are created as needed and each tree is associated with a user group as defmed in the content filtering rules. For example, one indexing database tree for children with a strict PICs filtering rule; one tree for adults with more liberal filtering rules.
In step 308 the search engine's automaton process starts scanning and indexing content from the list of target servers while the content blocking rules are consulted.
In step 310, if a white list is present, the search engine searches only web sites or root content sources that match the explicit allowable site/URL list or white list.
In step 312, if a black list of URLs to exclude is configured in the rules, any web site URL
that matches a the black list pattern is exclude.
In step 314, the PICS rules that apply to the user set being serviced by the indexing database tree is applied to the site/content/document being processed, resulting in the document being excluded or included.
In step 316, if an exclusionary keyword list is specified, the document text is scanned and the document is excluded if it contains one or more keywords in the list.
In step 318, a document is added to the appropriate indexing database tree only if it is allowed by the filtering rules for that group.
The advantage of the process of Figure 3 is that all additional (exclusion) processing is performed in the database indexing phase. There is little additional processing needed on the users search processing and presentation phases. Presumably, search operations are much more frequent than indexing operations in the life cycle of a search engine, even with re-scanning of content for possible changes.
In Figure 4, another process 400 implements a blocking policy during the end users search result presentation phase. In step 402, the scanning and indexing automaton process of the search engine is unchanged and a single indexing database tree is preserved. In step 404, the search and presentation process of the search engine is modified to apply blocking policies.
In step 406, the content filtering rules from the caching engines (via APIs or transfers of rule definitions are imported into the search engine at regular intervals or whenever a change is detected.
In step 407, processing of a user-initiated search request is started against the index database.
In step 408 a list of all matching documents satisfying the user's request is built and prepared for application of the blocking rules.
In step 410, if a white list of explicitly allowable URLs is specified in the rules, all matching documents not contained in the white list are excluded.
In step 412, any web site, URL or document that matches an exclusion pattern list (blacklist) is excluded.
In step 414, if PICS rules are specified, any URL that fails to conform with the PICS rules is excluded.
In step 416, if an keyword list is specified in the rules, any URL that contains in its text one or more words in the list is excluded.
In step 418, the remaining subset of URL pointers that match the users request and satisfy the blocking rules is returned for presentation to the client.
The primary advantage of the process of Fig.4 is that the latest policy can be applied to each search without impact of rebuilding the indexing databases. A single indexing database can be used for all users. The process allows the definition of altering filtering groups down to individual controls with little impact.
In Figure 5 a process 500 modifies the search engine to build its indexing database by searching the content caching engine's content. In step 501 the search engine scanning and indexing automaton process is modified. Instead of searching and indexing the ultimate content source sites and content servers, the process is configured to search the local repository of the content of the caching and blocking engine. In step 503, the search engine's scanning target is modified to be an appropriate content caching storage rather than a site/URL list. In step 505, the URL/content/document tree in the caching and blocking engine is traversed via APIs, database operations or shared filed system operations. In step 507, any document found in the cache is added to the indexing database as complying with the blocking filtering policy to one or more user groups in local installation.
The primary advantage of the process of Fig. 5 is the application of the filtering and blocking rules is done only once by the engine designed to do so, i.e., the caching and blocking engine. The scanning and indexing operation is performed on a local (high performance) copy of the target content, rather than the more variable Internet content sites.
In Figure 6, a process 600 modifies the search engine to go through the caching and filtering engine as the search engine builds its indexing database. In step 601, the search engine scanning and indexing automaton is modified to be configured in the same way as an end user browser, i.e., use HTTP proxy to go thorough the caching and filtering engine to reach the target content. In step 603 the search engine automaton is configured to use HTTP proxy configured to the appropriate caching and filtering engine. In step 605, while scanning and indexing content, the search engine automaton is configured to simulate an end user belonging to one of the user groups such that the user will receive only a subset of site/contents/documents that are allowed by the policy for that user group.
The primary advantage of the process of Fig. 6 is that there is virtually no modification of the search engine. The content blocking and filtering is performed by the caching and blocking engine which was designed and optimized to do so. Only content allowed by the blocking policy will reach the search engine for indexing. The efficiency and performance of the search engine is increased since some of the site/contents to be scanned and indexed will be found in a local cache store.
Summarizing, content searching and content blocking engines are coupled such that only pointers to content ultimately allowed by a blocking policy is returned to the end user as the result of a content search. Multiple processes are described for coupling the content search and content blocking engines. As such, the invention provides consistency between the results of an end user contents search and an individual organization's content filtering and blocking policy. The invention is immediately available to existing Internet and other networks; data protocols and standards without the need for modification.
While the invention has been described in the Internet (HTTP/web) environment, the same concepts apply to most data and network environments where data is searched; a list of possible matches is presented to end users who in turn consume/view that data if allowed by access or content control policy. Various changes can be made therein without departing from the spirit and scope of the invention as defmed in the appended claims, in which:
I claim:
SEARCH RESULTS CONSISTENT WITH CONTENT FILTERING AND
BLOCKING POLICIES IMPLEMENTED IN A BLOCKING ENGINE
BACKGROUND OF THE INVENTION
Field of Invention:
This invention relates to information retrieval systems. More particularly, the invention relates to a content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine.
Description of Prior Art:
With the explosive growth of text and multimedia content that is available in the Internet and other data networks and systems, end users are increasingly relying on text and key word based search tools to locate information of potential interest. End users typically enter as input to a search tool or engine, key words describing the information and documents they are seeking. The search tool or engine will then search in an existing indexing database, and return a list of pointers to documents of potential interest, with document titles and often with a few descriptive lines of text extracted from the document body. End users will then proceed to navigate to some or all of the returned pointers to retrieve and view the actual document or online content.
The search engine indexing database is typically built automatically or semi-automatically by launching an automaton program against a content source (such as Internet Web Sites), and having the automaton search the root content source as well as links to the content tree (often going to other sites), and indexing the information in the database for future searches. For large content sources, such as Web Sites on the Internet, automated searching and indexing is the only practical way to create an index search database.
With the increased diversity of information available on online systems and networks, corporations, individuals, groups, and Network Service Providers (NSPs) are increasingly implementing policies and controls to filter or otherwise limit the availability of content that is deemed inappropriate or undesirable for end users. Such content access control policies typically block undesirable content from reaching all or a subset of end users in a given online service and network. The blocking of content is typically performed in a content proxy gateway, data-network firewall, or other device inserted between the end user and the ultimate content source. Often the content filtering is implemented as part of a content caching engine, where only desirable content are kept in the cache for the user population, and undesirable content is prevented from being cached.
All users can only access network content through the cache. Content is typically blocked for being offensive or inappropriate for a user group or business use or viewing at a particular time of day and other similar reasons. Often NSPs and corporations will rely on a rating system or service such as Platform For Internet Content Selection (PICS) to determine the suitability of a content site or document for a particular population. End users may also select their own self-imposed set of blocking policies in some systems.
A significant problem is presented to NSPs and data delivery providers between the need for automated search engines that automatically index vast amounts of content and the need for blocking engines to block some of the content to ultimately reach end users.
Specifically, the problem is the lack of integration and coordination of the search engines with the filter and blocking policy engines.
The lack of integration is caused by several reasons, including:
(a) Many organizations deploy and implement content filtering blocking policies on their sites or service which rely on search engines, such as those available on the Internet, over which they have no control.
(b) Search engines by design must find and index as much content as possible and are biased toward seeking all content aggressively. On the other hand, filtering and blocking engines by design attempt to be selective in the documents that are stored on caches and presented to end users.
The intrinsically different missions between search engines and blocking engines combined with the need for high performance and efficiency of implementation, impedes integration and coordination of these two information retrieval functions.
The problem is manifested in the fact that end users while utilizing the services of a search engine will be presented with search results containing content/document titles and descriptions to content documents that will be ultimately inaccessible based on the filtering/blocking policies. In addition to the end user inconvenience and frustration from the inconsistency, the titles and short description of the content/documents returned by the search engine may, in themselves, be highly offensive or otherwise undesirable.
Accordingly, the need exists in information retrieval systems to have search results conformed to and be consistent with blocking policies with as little protocol and performance impact as feasible.
Prior art related to content-indexing search and blocking systems includes the following:
USP 5,701,469 issued December 23, 1997 (Brandli et al.) discloses a contact index search system which invokes search result correction routines to remove from the results stored search results incorrectly included and to add stored search results that were incorrectly excluded. In this manner, the search results generated in response to a user query is made accurate even though the content-index used to generate the initial search result was not up to date.
USP 5,835,722 issued November 10, 1998, filed June 27, 1996, (Bradshaw et al.) discloses a terminal for blocking the use and transmission of inappropriate material by comprehensively monitoring computer operations for creation or transmission of search inappropriate material, upon which the terminal is blocked and may only be unblocked by supervisory intervention.
USP 5,706,507 issued January 6, 1998, filed July 5, 1995, (Schloss) discloses an advisory server operated by a third party which rates the content of data downloaded from a content server to a client in order to block or sensor unwanted material.
USP 5,619,648 issued April 8, 1997 (Canale et al.) discloses an e-mail filter which determines whether an e-mail message should be provided to a user in accordance with models of the users correspondence.
None of the prior art discloses a content-indexing search system which provides search results consistent with blocking policies implemented in a blocking engine whereby only content allowed by the blocking policies is returned to the end user as the result of the content search, making the search results consistent with the blocking policies.
SUMMARY OF THE INVENTION
An object of the invention is an improved information retrieval system and method of operation providing consistency between search engine results and content blocking policies.
Another object is an improved content-index search system and method of operation providing search results consistent with blocking policies.
Another object is an improved content indexing search system which implements blocking policies in a caching and filtering engine.
Another object is an improved content-indexing search system and method of operation implementing blocking policies during a content-indexing phase.
Another object is an improved content-indexing search system and method of operation implementing blocking policies during an end user's search result presentation phase.
Another object is an improved content-indexing search system and method of operation by searching a local repository of a caching and blocking engine in lieu of searching and indexing ultimate content site sources and content servers.
Another object is an improved content-indexing searching system and method of operation configured to go through a caching and filtering engine to reach a target content.
These and other objects, features and advantages are achieved in an information retrieval network including a content-indexing search engine having a database and a caching engine coupled between the search engine and the end user, for implementing control policies typically blocking undesirable content such that search results are consistent with an end users organization's filtering and blocking policies implemented in alternative embodiments.
In one embodiment, only content that is allowable by the blocking policy is added to the search engine indexing database. In a second embodiment, the search and presentation process of the search engine is modified to implement the blocking policies. In a third embodiment, the target of the search engine's scanning and indexing automaton process is modified to build an indexing database by searching the caching engine's content. In a fourth embodiment, the search engine's scanning and indexing automaton is configured in the same way as an end user browser, i.e., going through a caching and filtering engine to reach a target content.
DESCRIPTION OF DRAWING
The invention will be further understood from the following detailed description taken in conjunction with the appended drawing, in which:
Figure 1 is a block diagram of an information retrieval system including a content server having a database; a caching engine implementing blocking policies, an external search engine, the search engine coupled to an end user and the content server and incorporating the principles of the present invention.
Figure 2 is a representative content blocking rules table implemented in Figure 1.
Figure 3 is a flow diagram illustrating the operation in a first embodiment implementing a blocking policy during a content search and indexing phase.
Figure 4 is a flow diagram of Figure 1 in a second embodiment implementing a blocking policy during an end user's search result presentation phase.
Figure 5 is a flow diagram of the search engine of Figure 1 in a third embodiment in which the search engine is modified to building an indexing database by searching the caching engine content.
Figure 6 is a flow diagram of the search engine of Figure 1 in a fourth embodiment modifying a search engine to go through a caching and filtering engine as it builds an indexing database.
DESCRIPTION PREFERRED EMBODIMENT
In Figure 1 an information retrieval system 100 includes a plurality of client devices 102,104 connected through an internal or controlled network 107 to an external information system 106 such as the Internet or other distributed data network. A typical client is a PC
having a display 110, a keyboard 111, a CPU 112, a memory 113 and a network connectivity I/O device 115. Examples of these clients and networks include business users of PCs connected to an internal company network and home users of PCs connected to a service provider network, both ultimately connected to the larger Internet. A browser 116, such as those sold under the trademark Netscape Communicator, IBM Web Explorer, and the like, is installed in the memory 113 along with a standard operating system 117 and application programs 118. The browser 116 runs or executes in the client device 102, 104 for loading or downloading content from a content server 120 coupled to the Internet 106. Each content server includes a database 122 for storing data responsive to content requests from the clients 102, 104, etc. In one form, data is stored as a collection of HTML documents containing text and other multi-media content.
A gateway 124 is usually used to interface more than one client or internal network segments 107 to the Internet 106 as shown. Typically a proxy server that includes a cache and content filtering engine 126 is inserted in the connection path from the internal network 107 to the Internet 106, to increase performance and control by implementing a content blocking policy.
The caching and blocking proxy server can be connected to the gateway or have parallel direct connections to the internal 107 and external 106 networks.
A client system 102, 104 running the web browser 116 requests content from the content server 120 using a Hypertext Transfer Protocol (HTTP) request and receiving the content in a HTTP
response. HTTP requests and responses occur over TCP/IP sockets that are communicated over the communication link between the client and the content server. A user may generate a content request by explicitly asking for content stored in the content server or by taking on a hyperlink anchor which points to contents stored on content servers. Upon receipt, the browser loads that content using an HTTP session. A more detailed description of HTTP may be found in Berners-Lee et al., "Hypertext Transfer Protocol - HTTP/1.0" Draft IEFT-HTTP-V 10 - Spec -0.0 Text." 1995 (March 8) Internet Draft. A more detailed description of HTML may be found in Berners-Lee "Hypertext Markup Language (HTML)" Draft IEFT.IIIR-HTML-0l, June 1993 (expired working draft). A
detailed description of TCP/IP Sockets and Communication on the Internet may be found in W. Richard Stevens, "TCP/IP Illustrated, Vol. 1--The Protocols", Addison-Westlake, 1994, pages 1-20,229-262.
A user of a client system utilizing the web browser 116 will often access a conventional search engine server 130, 135 and databases 131, 136, respectively, specialize to locate Internet content by means of keyword searches. These secured search engine servers can be external 130, or internal 135 to the controlled network 107. While they perform the same basic function, internally attached search engine servers 135 can be independently controlled by the internal network operator and are preferred. The methods of this invention, would typically be implemented by internally attached and controlled search engines 135, or by external search engines 130 that provide, as a service to an organization, consistency with the organizations content blocking policy. As a result of a keyword search directed at a search engine server 130 or 135, end users will see displayed in the web browser 116 a list of matching URLs and text excerpts displayed as hyperlink anchors to the ultimate content. The user can then select and follow the link to one or more content matches using the web browser 116.
In Figure 2, a content sample filtering/blocking configuration table 200 is generated by the client or by a network/service administrator and installed at the proxy server 126 to filter or otherwise limit the availability of content that is deemed inappropriate or undesirable. These content access control policies typically block undesirable content from reaching all or a subset of end users in a given online service or network. The table is installed in the cache and filtering engine 126, and is typically stored in a database 127. In one form, the table comprises a row 201 including for each user or group of users one or more of the following: an Id 203; a list of keywords to block 205;
Platform For Interconnect Content Selection (PICS) rules 207, a black list of URLs not to be contacted 209, a white list of the only URLs that can be contacted 211. A
description of URLs maybe found in Bemers-Lee et al. "Uniform Resource Locators (URL)", RFC 1738, December 1994. PICS
ratings are obtained from PICS Rules that allow or block access to URLs based on PICs labels incorporated into documents which describe the URLs. PICS rules are described in the Internet at http://www.w3.org/TR/REC-PICSRules-971229, published by W3C, Massachusetts Institute of Technology, 77 Massachusetts Ave. Cambridge Mass, 02139. More specifically, PICS Rules is a language for expressing filtering rules (profiles) that allow or block access to URLs based on PICS
labels that describe those URLs. The labels are created using a software tool in accordance with a PICS Technical specification -1.1 available in the Internet at http://www.w#.org/PICS/. The software tool is used to create labels in a document that describe particular URLs.
Alternatively, in lieu of pasting the labels into documents, an independent reader distributes the labels through a separate server called a Label Bureau. Filtering software will know to check at that Label Bureau to find the labels much as a consumer knows to read particular magazines for review of appliances or automobiles. Once the label has been created, the label is inserted as an extra header in the HTTP
header stream that precedes the content of the documents that are sent to the web browser.
Alternatively, the labels can be imbedded in HTML documents using a META tag. With this method, labels are sent only with HTML documents, not with images, video or anything else. A PICS-compliant content server is available from International Business Machines Corporation, Armonk, NY.
With the blocking table installed in the cache and blocking engine 122, several process alternatives are available to couple content search and content blocking engine, such that only content ultimately allowed by the blocking policy is returned to the client as the result of the content search. While it is possible to have different rules for each individual user, it is more manageable to have a single set of rules that apply to all users, or to divide users into a small number of user groups, each with its own rule. Individual users or groups, if defined, can be identified by using several means, including: client system IP address to user/group ID mappings, use of HTTP basic authentication at the start of a browsing session, us of HTTP web "cookies" to track user identity.
Turning to Figure 3, a process 300 implements the blocking policy during the content indexing phase. In step 302 the search engine's 135 content scanning and indexing automaton process is modified. In step 304, the content filtering rules from the content and filtering engine 126 are imported into the search engine server 135 via Application Program Interfaces (APIs) or transfer of rule defmition files, at regular intervals, or whenever a change is detected.
In step 306, multiple indexing database trees are created as needed and each tree is associated with a user group as defmed in the content filtering rules. For example, one indexing database tree for children with a strict PICs filtering rule; one tree for adults with more liberal filtering rules.
In step 308 the search engine's automaton process starts scanning and indexing content from the list of target servers while the content blocking rules are consulted.
In step 310, if a white list is present, the search engine searches only web sites or root content sources that match the explicit allowable site/URL list or white list.
In step 312, if a black list of URLs to exclude is configured in the rules, any web site URL
that matches a the black list pattern is exclude.
In step 314, the PICS rules that apply to the user set being serviced by the indexing database tree is applied to the site/content/document being processed, resulting in the document being excluded or included.
In step 316, if an exclusionary keyword list is specified, the document text is scanned and the document is excluded if it contains one or more keywords in the list.
In step 318, a document is added to the appropriate indexing database tree only if it is allowed by the filtering rules for that group.
The advantage of the process of Figure 3 is that all additional (exclusion) processing is performed in the database indexing phase. There is little additional processing needed on the users search processing and presentation phases. Presumably, search operations are much more frequent than indexing operations in the life cycle of a search engine, even with re-scanning of content for possible changes.
In Figure 4, another process 400 implements a blocking policy during the end users search result presentation phase. In step 402, the scanning and indexing automaton process of the search engine is unchanged and a single indexing database tree is preserved. In step 404, the search and presentation process of the search engine is modified to apply blocking policies.
In step 406, the content filtering rules from the caching engines (via APIs or transfers of rule definitions are imported into the search engine at regular intervals or whenever a change is detected.
In step 407, processing of a user-initiated search request is started against the index database.
In step 408 a list of all matching documents satisfying the user's request is built and prepared for application of the blocking rules.
In step 410, if a white list of explicitly allowable URLs is specified in the rules, all matching documents not contained in the white list are excluded.
In step 412, any web site, URL or document that matches an exclusion pattern list (blacklist) is excluded.
In step 414, if PICS rules are specified, any URL that fails to conform with the PICS rules is excluded.
In step 416, if an keyword list is specified in the rules, any URL that contains in its text one or more words in the list is excluded.
In step 418, the remaining subset of URL pointers that match the users request and satisfy the blocking rules is returned for presentation to the client.
The primary advantage of the process of Fig.4 is that the latest policy can be applied to each search without impact of rebuilding the indexing databases. A single indexing database can be used for all users. The process allows the definition of altering filtering groups down to individual controls with little impact.
In Figure 5 a process 500 modifies the search engine to build its indexing database by searching the content caching engine's content. In step 501 the search engine scanning and indexing automaton process is modified. Instead of searching and indexing the ultimate content source sites and content servers, the process is configured to search the local repository of the content of the caching and blocking engine. In step 503, the search engine's scanning target is modified to be an appropriate content caching storage rather than a site/URL list. In step 505, the URL/content/document tree in the caching and blocking engine is traversed via APIs, database operations or shared filed system operations. In step 507, any document found in the cache is added to the indexing database as complying with the blocking filtering policy to one or more user groups in local installation.
The primary advantage of the process of Fig. 5 is the application of the filtering and blocking rules is done only once by the engine designed to do so, i.e., the caching and blocking engine. The scanning and indexing operation is performed on a local (high performance) copy of the target content, rather than the more variable Internet content sites.
In Figure 6, a process 600 modifies the search engine to go through the caching and filtering engine as the search engine builds its indexing database. In step 601, the search engine scanning and indexing automaton is modified to be configured in the same way as an end user browser, i.e., use HTTP proxy to go thorough the caching and filtering engine to reach the target content. In step 603 the search engine automaton is configured to use HTTP proxy configured to the appropriate caching and filtering engine. In step 605, while scanning and indexing content, the search engine automaton is configured to simulate an end user belonging to one of the user groups such that the user will receive only a subset of site/contents/documents that are allowed by the policy for that user group.
The primary advantage of the process of Fig. 6 is that there is virtually no modification of the search engine. The content blocking and filtering is performed by the caching and blocking engine which was designed and optimized to do so. Only content allowed by the blocking policy will reach the search engine for indexing. The efficiency and performance of the search engine is increased since some of the site/contents to be scanned and indexed will be found in a local cache store.
Summarizing, content searching and content blocking engines are coupled such that only pointers to content ultimately allowed by a blocking policy is returned to the end user as the result of a content search. Multiple processes are described for coupling the content search and content blocking engines. As such, the invention provides consistency between the results of an end user contents search and an individual organization's content filtering and blocking policy. The invention is immediately available to existing Internet and other networks; data protocols and standards without the need for modification.
While the invention has been described in the Internet (HTTP/web) environment, the same concepts apply to most data and network environments where data is searched; a list of possible matches is presented to end users who in turn consume/view that data if allowed by access or content control policy. Various changes can be made therein without departing from the spirit and scope of the invention as defmed in the appended claims, in which:
I claim:
Claims (15)
1. A content-indexing search system providing search results consistent with content-filtering and blocking restrictions, comprising a content-indexing search engine including a database;
a content caching and blocking proxy server including a cache, an information network coupled to the content-indexing search engine;
means for providing search queries to the content-indexing search engine and receiving search results from the cache;
a blocking engine coupled to the content-indexing search engine including a blocking rules table, comprising at least one of the following a URL White List; a URL Black List; for implementing content-filtering and blocking policies, and means for modifying the content indexing search engine to implement the same content-blocking policies as the blocking engine.
a content caching and blocking proxy server including a cache, an information network coupled to the content-indexing search engine;
means for providing search queries to the content-indexing search engine and receiving search results from the cache;
a blocking engine coupled to the content-indexing search engine including a blocking rules table, comprising at least one of the following a URL White List; a URL Black List; for implementing content-filtering and blocking policies, and means for modifying the content indexing search engine to implement the same content-blocking policies as the blocking engine.
2. The system of claim 1 further comprising means for implementing the blocking policies in the search content-indexing search engine during a content-indexing phase.
3 The system of claim 1 further comprising means for implementing the blocking policies during an end user search results presentation phase
4. The system of claim 1 further comprising means for modifying the content indexing search engine to build an indexing database by searching the cache content.
5. The system of claim 1 further comprising means for modifying the content-indexing search engine to incorporate the cache and blocking engine results as the content-indexing search engine builds an indexing database.
6. In a content-indexing search system including a content-indexing search engine coupled to a database and a cache; an information network coupled to the contact-indexing search engine, and a blocking engine implementing content-filtering and blocking restrictions on search results provided to an end user through the cache, a method of providing the search results which are consistent with the content-filtering and blocking practices, comprising the steps of (a) altering a content-indexing search engine process to skip any information site URL that matches an exclusion pattern;
(b) altering a search content-indexing search engine process to search only sites or route content sources that match an explicit allowable information site URL list, (c) implementing filtering policies in the content-indexing search engine that are defined in a cache and the blocking engine by (i) importing the content-filtering rules from a caching and filtering engine at regular intervals or whenever a change is detected;
(ii) creating multiple indexing database trees and associating each tree with a user group as defined in the content filtering rules, (iii) avoiding presentation to a user of any information site, URL or document that matches an exclusion pattern, (iv) presenting only document/content pointers from sources that match an expressed allowable information site URL list; and (v) presenting to the user only information network/content/documents that comply with filtering processes defined in the cache and the blocking engine by:
(aa) importing the content filtering rules from the caching and filtering engine at regular intervals or whenever a change is detected; and (bb) presenting to the user only search results that are allowed by the filtering rules for that individual or group
(b) altering a search content-indexing search engine process to search only sites or route content sources that match an explicit allowable information site URL list, (c) implementing filtering policies in the content-indexing search engine that are defined in a cache and the blocking engine by (i) importing the content-filtering rules from a caching and filtering engine at regular intervals or whenever a change is detected;
(ii) creating multiple indexing database trees and associating each tree with a user group as defined in the content filtering rules, (iii) avoiding presentation to a user of any information site, URL or document that matches an exclusion pattern, (iv) presenting only document/content pointers from sources that match an expressed allowable information site URL list; and (v) presenting to the user only information network/content/documents that comply with filtering processes defined in the cache and the blocking engine by:
(aa) importing the content filtering rules from the caching and filtering engine at regular intervals or whenever a change is detected; and (bb) presenting to the user only search results that are allowed by the filtering rules for that individual or group
7 The method of claim 6 further comprising the steps of:
(d) modifying a content engine scanning target to be a content caching storage rather than an information site/URL list; and (e) traversing by APIs, database operations, and shared file operations a URL/content/document tree in the caching and blocking engine.
(d) modifying a content engine scanning target to be a content caching storage rather than an information site/URL list; and (e) traversing by APIs, database operations, and shared file operations a URL/content/document tree in the caching and blocking engine.
8 The method of claim 6 further comprising the step of:
(f) modifying a search engine content scanning and indexing process to be configured the same way as an end user browser.
(f) modifying a search engine content scanning and indexing process to be configured the same way as an end user browser.
9 The method of claim 6 further comprising the step of.
(g) modifying the content-indexing search engine to go through the cache as it builds an indexing database
(g) modifying the content-indexing search engine to go through the cache as it builds an indexing database
10. The method of claim 6 further comprising the step of:
(h) modifying the content search engine to build an indexing database by searching the cache.
(h) modifying the content search engine to build an indexing database by searching the cache.
11. The method of claim 6 further comprising the steps of:
(i) connecting the content-indexing search engine to an internal network, and (j) connecting the content-indexing search engine by an internal network operation.
(i) connecting the content-indexing search engine to an internal network, and (j) connecting the content-indexing search engine by an internal network operation.
12. The method of claim 6 further comprising the step of connecting the content-indexing search engine to an external network for providing consistency to an organizations content blocking policy.
13. The content-indexing search system of claim 1 further comprising means for blocking keywords in the blocking table
14 The content-indexing search system of claim 1 further comprising:
means for providing PICs rules in the blocking table.
means for providing PICs rules in the blocking table.
15. A program medium, having computer readable instructions executable on a computer system, for blocking undesirable content received from a content-indexing search system comprising:
(a) program instructions for altering a content-indexing search engine process to skip any information site URL that matches an exclusion pattern;
(b) program instructions altering the search content-indexing search engine process to search only sites or route content sources that match an explicit allowable information site URL list;
(c) program instructions presenting to a user only information network/content/documents that comply with filtering processes defined in a cache and blocking engine by (d) program instructions importing content filtering rules from the caching and blocking engine at regular intervals or whenever a change is detected, and (e) program instructions presenting to the user only search results that are allowed by filtering rules for that individual or group.
(a) program instructions for altering a content-indexing search engine process to skip any information site URL that matches an exclusion pattern;
(b) program instructions altering the search content-indexing search engine process to search only sites or route content sources that match an explicit allowable information site URL list;
(c) program instructions presenting to a user only information network/content/documents that comply with filtering processes defined in a cache and blocking engine by (d) program instructions importing content filtering rules from the caching and blocking engine at regular intervals or whenever a change is detected, and (e) program instructions presenting to the user only search results that are allowed by filtering rules for that individual or group.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/302,851 US6336117B1 (en) | 1999-04-30 | 1999-04-30 | Content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine |
US09/302,851 | 1999-04-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2300239A1 CA2300239A1 (en) | 2000-10-30 |
CA2300239C true CA2300239C (en) | 2007-09-11 |
Family
ID=23169481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002300239A Expired - Fee Related CA2300239C (en) | 1999-04-30 | 2000-03-08 | A content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine |
Country Status (5)
Country | Link |
---|---|
US (1) | US6336117B1 (en) |
JP (1) | JP2000357176A (en) |
CN (1) | CN1253813C (en) |
CA (1) | CA2300239C (en) |
SG (1) | SG96549A1 (en) |
Families Citing this family (345)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7028049B1 (en) | 1996-02-17 | 2006-04-11 | Allcare Health Management System, Inc. | Standing order database search system and method for internet and internet application |
US6604143B1 (en) * | 1998-06-19 | 2003-08-05 | Sun Microsystems, Inc. | Scalable proxy servers with plug-in filters |
US6976070B1 (en) * | 1999-02-16 | 2005-12-13 | Kdd Corporation | Method and apparatus for automatic information filtering using URL hierarchical structure and automatic word weight learning |
US20070094268A1 (en) * | 2005-10-21 | 2007-04-26 | Tabe Joseph A | Broadband centralized transportation communication vehicle for extracting transportation topics of information and monitoring terrorist data |
US6510458B1 (en) * | 1999-07-15 | 2003-01-21 | International Business Machines Corporation | Blocking saves to web browser cache based on content rating |
US7353246B1 (en) * | 1999-07-30 | 2008-04-01 | Miva Direct, Inc. | System and method for enabling information associations |
US6675205B2 (en) | 1999-10-14 | 2004-01-06 | Arcessa, Inc. | Peer-to-peer automated anonymous asynchronous file sharing |
US6516337B1 (en) | 1999-10-14 | 2003-02-04 | Arcessa, Inc. | Sending to a central indexing site meta data or signatures from objects on a computer network |
US6701310B1 (en) * | 1999-11-22 | 2004-03-02 | Nec Corporation | Information search device and information search method using topic-centric query routing |
US6651091B1 (en) * | 1999-12-02 | 2003-11-18 | International Business Machines Corporation | System for precluding repetitive accessing of Web pages in a sequence of linked Web pages accessed from the World Wide Web through searching |
US6487553B1 (en) * | 2000-01-05 | 2002-11-26 | International Business Machines Corporation | Method for reducing search results by manually or automatically excluding previously presented search results |
US6823492B1 (en) * | 2000-01-06 | 2004-11-23 | Sun Microsystems, Inc. | Method and apparatus for creating an index for a structured document based on a stylesheet |
US7315891B2 (en) * | 2000-01-12 | 2008-01-01 | Vericept Corporation | Employee internet management device |
JP3605343B2 (en) * | 2000-03-31 | 2004-12-22 | デジタルア−ツ株式会社 | Internet browsing control method, medium recording program for implementing the method, and internet browsing control device |
US6591265B1 (en) * | 2000-04-03 | 2003-07-08 | International Business Machines Corporation | Dynamic behavior-based access control system and method |
US6820082B1 (en) * | 2000-04-03 | 2004-11-16 | Allegis Corporation | Rule based database security system and method |
US7139743B2 (en) | 2000-04-07 | 2006-11-21 | Washington University | Associative database scanning and information retrieval using FPGA devices |
US8095508B2 (en) | 2000-04-07 | 2012-01-10 | Washington University | Intelligent data storage and processing using FPGA devices |
US7016898B1 (en) * | 2000-04-14 | 2006-03-21 | International Business Machines Corporation | Extension of browser web page content labels and password checking to communications protocols |
AU5868801A (en) * | 2000-05-29 | 2001-12-11 | Kaisha Saora Kabushiki | System and method for saving browsed data |
US20030204536A1 (en) * | 2000-06-30 | 2003-10-30 | Keskar Dhananjay V. | Technique for automatically associating desktop data items |
US7028020B1 (en) * | 2000-06-30 | 2006-04-11 | Intel Corporation | Interactive technique to automatically find and organize items similar to example items |
US7047229B2 (en) | 2000-08-08 | 2006-05-16 | America Online, Inc. | Searching content on web pages |
US7359951B2 (en) * | 2000-08-08 | 2008-04-15 | Aol Llc, A Delaware Limited Liability Company | Displaying search results |
WO2002013064A2 (en) * | 2000-08-08 | 2002-02-14 | America Online, Inc. | Searching systems and processes |
US7225180B2 (en) | 2000-08-08 | 2007-05-29 | Aol Llc | Filtering search results |
US7007008B2 (en) * | 2000-08-08 | 2006-02-28 | America Online, Inc. | Category searching |
US7093287B1 (en) * | 2000-10-12 | 2006-08-15 | International Business Machines Corporation | Method and system for building dynamic firewall rules, based on content of downloaded documents |
GB2368224B (en) * | 2000-10-17 | 2004-08-25 | Hewlett Packard Co | Content provider entity for communication session |
JP4634600B2 (en) * | 2000-12-18 | 2011-02-16 | 株式会社東芝 | Proxy server |
US6898592B2 (en) * | 2000-12-27 | 2005-05-24 | Microsoft Corporation | Scoping queries in a search engine |
US7174453B2 (en) | 2000-12-29 | 2007-02-06 | America Online, Inc. | Message screening system |
US20020161680A1 (en) * | 2001-01-22 | 2002-10-31 | Tarnoff Harry L. | Methods for managing and promoting network content |
US7162526B2 (en) * | 2001-01-31 | 2007-01-09 | International Business Machines Corporation | Apparatus and methods for filtering content based on accessibility to a user |
US20020120774A1 (en) * | 2001-02-05 | 2002-08-29 | Athanassios Diacakis | Method of sending a communication from a first terminal to a second terminal via a host |
EP1423804A4 (en) * | 2001-08-10 | 2006-11-08 | Datavine Res Services | Method and apparatus for access, integration and analysis of heterogeneous data sources via the manipulation of metadata objects |
US7761594B1 (en) * | 2001-10-15 | 2010-07-20 | Netapp, Inc. | Method and apparatus for forwarding requests in a cache hierarchy based on user-defined forwarding rules |
US7716330B2 (en) | 2001-10-19 | 2010-05-11 | Global Velocity, Inc. | System and method for controlling transmission of data packets over an information network |
ATE509326T1 (en) | 2001-12-18 | 2011-05-15 | L 1 Secure Credentialing Inc | MULTIPLE IMAGE SECURITY FEATURES FOR IDENTIFYING DOCUMENTS AND METHOD FOR PRODUCING THEM |
JP4386732B2 (en) * | 2002-01-08 | 2009-12-16 | セブン ネットワークス, インコーポレイテッド | Mobile network connection architecture |
US7426515B2 (en) * | 2002-01-15 | 2008-09-16 | International Business Machines Corporation | Edge deployed database proxy driver |
US7260570B2 (en) * | 2002-02-01 | 2007-08-21 | International Business Machines Corporation | Retrieving matching documents by queries in any national language |
CA2476895A1 (en) * | 2002-02-19 | 2003-08-28 | Digimarc Corporation | Security methods employing drivers licenses and other documents |
US8590013B2 (en) | 2002-02-25 | 2013-11-19 | C. S. Lee Crawford | Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry |
WO2003081387A2 (en) * | 2002-03-18 | 2003-10-02 | Merck & Co., Inc. | Computer assisted and/or implemented process and system for managing and/or providing a medical information portal for healthcare providers |
US7043521B2 (en) * | 2002-03-21 | 2006-05-09 | Rockwell Electronic Commerce Technologies, Llc | Search agent for searching the internet |
JP3706350B2 (en) * | 2002-03-22 | 2005-10-12 | 日本電信電話株式会社 | Content filtering apparatus and method |
US7152060B2 (en) * | 2002-04-11 | 2006-12-19 | Choicemaker Technologies, Inc. | Automated database blocking and record matching |
US7824029B2 (en) | 2002-05-10 | 2010-11-02 | L-1 Secure Credentialing, Inc. | Identification card printer-assembler for over the counter card issuing |
JP2005525655A (en) * | 2002-05-14 | 2005-08-25 | ベリティ・インコーポレイテッド | Document relevance ranking apparatus and method capable of dynamically setting according to area |
CN100399338C (en) * | 2002-06-26 | 2008-07-02 | 联想(北京)有限公司 | A sorting method of data record |
US20040006621A1 (en) * | 2002-06-27 | 2004-01-08 | Bellinson Craig Adam | Content filtering for web browsing |
US7809813B2 (en) * | 2002-06-28 | 2010-10-05 | Microsoft Corporation | System and method for providing content-oriented services to content providers and content consumers |
US7711844B2 (en) | 2002-08-15 | 2010-05-04 | Washington University Of St. Louis | TCP-splitter: reliable packet monitoring methods and apparatus for high speed networks |
US7461147B1 (en) * | 2002-08-26 | 2008-12-02 | Netapp. Inc. | Node selection within a network based on policy |
JP4700887B2 (en) * | 2002-10-30 | 2011-06-15 | 富士フイルム株式会社 | Server computer and control method thereof |
KR20050085566A (en) * | 2002-12-11 | 2005-08-29 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Method of and system for presenting a document, media player, information carrier and computer program product |
US7640336B1 (en) | 2002-12-30 | 2009-12-29 | Aol Llc | Supervising user interaction with online services |
US8468126B2 (en) | 2005-08-01 | 2013-06-18 | Seven Networks, Inc. | Publishing data in an information community |
US7917468B2 (en) * | 2005-08-01 | 2011-03-29 | Seven Networks, Inc. | Linking of personal information management data |
US7853563B2 (en) * | 2005-08-01 | 2010-12-14 | Seven Networks, Inc. | Universal data aggregation |
US8640234B2 (en) * | 2003-05-07 | 2014-01-28 | Trustwave Holdings, Inc. | Method and apparatus for predictive and actual intrusion detection on a network |
US7590695B2 (en) | 2003-05-09 | 2009-09-15 | Aol Llc | Managing electronic messages |
EP1627331B1 (en) | 2003-05-23 | 2017-09-20 | IP Reservoir, LLC | Intelligent data storage and processing using fpga devices |
US10572824B2 (en) | 2003-05-23 | 2020-02-25 | Ip Reservoir, Llc | System and method for low latency multi-functional pipeline with correlation logic and selectively activated/deactivated pipelined data processing engines |
US7660784B1 (en) | 2003-05-30 | 2010-02-09 | Aol Llc | Geographically resolving a keyword query |
US7403939B1 (en) | 2003-05-30 | 2008-07-22 | Aol Llc | Resolving queries based on automatic determination of requestor geographic location |
US7437409B2 (en) * | 2003-06-13 | 2008-10-14 | Microsoft Corporation | Limiting interaction between parties in a networked session |
US7739602B2 (en) | 2003-06-24 | 2010-06-15 | Aol Inc. | System and method for community centric resource sharing based on a publishing subscription model |
US7117218B2 (en) * | 2003-06-26 | 2006-10-03 | Microsoft Corporation | System and method for expressing and calculating a relationship between measures |
DE10332667A1 (en) * | 2003-07-18 | 2005-03-17 | Jdm Gmbh | Method for downloading information |
US20050043548A1 (en) * | 2003-08-22 | 2005-02-24 | Joseph Cates | Automated monitoring and control system for networked communications |
US20050065935A1 (en) * | 2003-09-16 | 2005-03-24 | Chebolu Anil Kumar | Client comparison of network content with server-based categorization |
US20050066290A1 (en) * | 2003-09-16 | 2005-03-24 | Chebolu Anil Kumar | Pop-up capture |
US7222158B2 (en) * | 2003-12-31 | 2007-05-22 | Aol Llc | Third party provided transactional white-listing for filtering electronic communications |
US7424467B2 (en) * | 2004-01-26 | 2008-09-09 | International Business Machines Corporation | Architecture for an indexer with fixed width sort and variable width sort |
US8296304B2 (en) * | 2004-01-26 | 2012-10-23 | International Business Machines Corporation | Method, system, and program for handling redirects in a search engine |
US7499913B2 (en) | 2004-01-26 | 2009-03-03 | International Business Machines Corporation | Method for handling anchor text |
US7293005B2 (en) * | 2004-01-26 | 2007-11-06 | International Business Machines Corporation | Pipelined architecture for global analysis and index building |
US7523130B1 (en) | 2004-01-28 | 2009-04-21 | Mike Meadway | Storing and retrieving objects on a computer network in a distributed database |
US7197365B2 (en) * | 2004-02-13 | 2007-03-27 | Sanyo Electric Co., Ltd. | Controller, program product, and storage medium |
US8595146B1 (en) | 2004-03-15 | 2013-11-26 | Aol Inc. | Social networking permissions |
JP4634736B2 (en) * | 2004-04-22 | 2011-02-16 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | Vocabulary conversion methods, programs, and systems between professional and non-professional descriptions |
JP4144882B2 (en) | 2004-05-14 | 2008-09-03 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Information processing apparatus, information system, proxy processing method, program, and recording medium |
JP4537117B2 (en) * | 2004-05-17 | 2010-09-01 | 株式会社リコー | Data management system, program and storage medium |
US8150875B1 (en) * | 2004-05-24 | 2012-04-03 | Sonicwall, Inc. | Method and an apparatus to store information regarding web pages |
US7293017B2 (en) | 2004-07-01 | 2007-11-06 | Microsoft Corporation | Presentation-level content filtering for a search result |
US8788528B2 (en) * | 2004-07-13 | 2014-07-22 | Blue Coat Systems, Inc. | Filtering cached content based on embedded URLs |
US8302164B2 (en) * | 2004-07-22 | 2012-10-30 | Facebook, Inc. | Authorization and authentication based on an individual's social network |
JP2006048193A (en) * | 2004-08-02 | 2006-02-16 | Meta Protocol Kk | Network system and its document management method |
US7461064B2 (en) | 2004-09-24 | 2008-12-02 | International Buiness Machines Corporation | Method for searching documents for ranges of numeric values |
US7606793B2 (en) * | 2004-09-27 | 2009-10-20 | Microsoft Corporation | System and method for scoping searches using index keys |
WO2006045102A2 (en) | 2004-10-20 | 2006-04-27 | Seven Networks, Inc. | Method and apparatus for intercepting events in a communication system |
US8010082B2 (en) | 2004-10-20 | 2011-08-30 | Seven Networks, Inc. | Flexible billing architecture |
US7600263B1 (en) * | 2004-11-05 | 2009-10-06 | Google Inc. | Access controlled search results |
CN100350778C (en) * | 2004-11-18 | 2007-11-21 | 北京锐安科技有限公司 | Dynamic control method and apparatus for data filtering condition |
US7706781B2 (en) * | 2004-11-22 | 2010-04-27 | Seven Networks International Oy | Data security in a mobile e-mail service |
US7643818B2 (en) * | 2004-11-22 | 2010-01-05 | Seven Networks, Inc. | E-mail messaging to/from a mobile terminal |
US7899796B1 (en) | 2004-11-23 | 2011-03-01 | Andrew Borthwick | Batch automated blocking and record matching |
US8135731B2 (en) * | 2004-12-02 | 2012-03-13 | International Business Machines Corporation | Administration of search results |
FI117152B (en) | 2004-12-03 | 2006-06-30 | Seven Networks Internat Oy | E-mail service provisioning method for mobile terminal, involves using domain part and further parameters to generate new parameter set in list of setting parameter sets, if provisioning of e-mail service is successful |
US20100195538A1 (en) * | 2009-02-04 | 2010-08-05 | Merkey Jeffrey V | Method and apparatus for network packet capture distributed storage system |
CN100458776C (en) * | 2005-01-13 | 2009-02-04 | 龙搜(北京)科技有限公司 | Network cache management system and method |
US7475074B2 (en) * | 2005-02-22 | 2009-01-06 | Taiwan Semiconductor Manufacturing Co., Ltd. | Web search system and method thereof |
EP1859378A2 (en) | 2005-03-03 | 2007-11-28 | Washington University | Method and apparatus for performing biosequence similarity searching |
US7877703B1 (en) | 2005-03-14 | 2011-01-25 | Seven Networks, Inc. | Intelligent rendering of information in a limited display environment |
US7796742B1 (en) | 2005-04-21 | 2010-09-14 | Seven Networks, Inc. | Systems and methods for simplified provisioning |
US8438633B1 (en) | 2005-04-21 | 2013-05-07 | Seven Networks, Inc. | Flexible real-time inbox access |
WO2006136660A1 (en) | 2005-06-21 | 2006-12-28 | Seven Networks International Oy | Maintaining an ip connection in a mobile network |
US20070011739A1 (en) * | 2005-06-28 | 2007-01-11 | Shay Zamir | Method for increasing the security level of a user machine browsing web pages |
JP4842572B2 (en) * | 2005-06-30 | 2011-12-21 | マイクロソフト コーポレーション | Contact information management apparatus, contact information providing method, computer program, and computer-readable storage medium |
US8417693B2 (en) | 2005-07-14 | 2013-04-09 | International Business Machines Corporation | Enforcing native access control to indexed documents |
US8069166B2 (en) | 2005-08-01 | 2011-11-29 | Seven Networks, Inc. | Managing user-to-user contact with inferred presence information |
US7565358B2 (en) * | 2005-08-08 | 2009-07-21 | Google Inc. | Agent rank |
AU2005100653A4 (en) | 2005-08-12 | 2005-09-15 | Agent Mobile Pty Ltd | Mobile Device-Based End-User Filter |
US20070073722A1 (en) * | 2005-09-14 | 2007-03-29 | Jorey Ramer | Calculation and presentation of mobile content expected value |
US8229914B2 (en) | 2005-09-14 | 2012-07-24 | Jumptap, Inc. | Mobile content spidering and compatibility determination |
US20070060114A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Predictive text completion for a mobile communication facility |
US8615719B2 (en) * | 2005-09-14 | 2013-12-24 | Jumptap, Inc. | Managing sponsored content for delivery to mobile communication facilities |
US9471925B2 (en) * | 2005-09-14 | 2016-10-18 | Millennial Media Llc | Increasing mobile interactivity |
US7769764B2 (en) * | 2005-09-14 | 2010-08-03 | Jumptap, Inc. | Mobile advertisement syndication |
US9058406B2 (en) | 2005-09-14 | 2015-06-16 | Millennial Media, Inc. | Management of multiple advertising inventories using a monetization platform |
US8666376B2 (en) * | 2005-09-14 | 2014-03-04 | Millennial Media | Location based mobile shopping affinity program |
US8812526B2 (en) | 2005-09-14 | 2014-08-19 | Millennial Media, Inc. | Mobile content cross-inventory yield optimization |
US20090029687A1 (en) * | 2005-09-14 | 2009-01-29 | Jorey Ramer | Combining mobile and transcoded content in a mobile search result |
US20070061247A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Expected value and prioritization of mobile content |
US8027879B2 (en) * | 2005-11-05 | 2011-09-27 | Jumptap, Inc. | Exclusivity bidding for mobile sponsored content |
US8688671B2 (en) * | 2005-09-14 | 2014-04-01 | Millennial Media | Managing sponsored content based on geographic region |
US20070100651A1 (en) * | 2005-11-01 | 2007-05-03 | Jorey Ramer | Mobile payment facilitation |
US7676394B2 (en) * | 2005-09-14 | 2010-03-09 | Jumptap, Inc. | Dynamic bidding and expected value |
US8209344B2 (en) | 2005-09-14 | 2012-06-26 | Jumptap, Inc. | Embedding sponsored content in mobile applications |
US20090234745A1 (en) * | 2005-11-05 | 2009-09-17 | Jorey Ramer | Methods and systems for mobile coupon tracking |
US20080270220A1 (en) * | 2005-11-05 | 2008-10-30 | Jorey Ramer | Embedding a nonsponsored mobile content within a sponsored mobile content |
US8290810B2 (en) * | 2005-09-14 | 2012-10-16 | Jumptap, Inc. | Realtime surveying within mobile sponsored content |
US20080242279A1 (en) * | 2005-09-14 | 2008-10-02 | Jorey Ramer | Behavior-based mobile content placement on a mobile communication facility |
US7860871B2 (en) | 2005-09-14 | 2010-12-28 | Jumptap, Inc. | User history influenced search results |
US8503995B2 (en) | 2005-09-14 | 2013-08-06 | Jumptap, Inc. | Mobile dynamic advertisement creation and placement |
US7660581B2 (en) * | 2005-09-14 | 2010-02-09 | Jumptap, Inc. | Managing sponsored content based on usage history |
US20090234711A1 (en) * | 2005-09-14 | 2009-09-17 | Jorey Ramer | Aggregation of behavioral profile data using a monetization platform |
US20070061211A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Preventing mobile communication facility click fraud |
US20070288427A1 (en) * | 2005-09-14 | 2007-12-13 | Jorey Ramer | Mobile pay-per-call campaign creation |
US8103545B2 (en) | 2005-09-14 | 2012-01-24 | Jumptap, Inc. | Managing payment for sponsored content presented to mobile communication facilities |
US8302030B2 (en) | 2005-09-14 | 2012-10-30 | Jumptap, Inc. | Management of multiple advertising inventories using a monetization platform |
US8238888B2 (en) * | 2006-09-13 | 2012-08-07 | Jumptap, Inc. | Methods and systems for mobile coupon placement |
US8463249B2 (en) | 2005-09-14 | 2013-06-11 | Jumptap, Inc. | System for targeting advertising content to a plurality of mobile communication facilities |
US20070061242A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Implicit searching for mobile content |
US20070239724A1 (en) * | 2005-09-14 | 2007-10-11 | Jorey Ramer | Mobile search services related to direct identifiers |
US8156128B2 (en) * | 2005-09-14 | 2012-04-10 | Jumptap, Inc. | Contextual mobile content placement on a mobile communication facility |
US20070100805A1 (en) * | 2005-09-14 | 2007-05-03 | Jorey Ramer | Mobile content cross-inventory yield optimization |
US8195133B2 (en) * | 2005-09-14 | 2012-06-05 | Jumptap, Inc. | Mobile dynamic advertisement creation and placement |
US20070073717A1 (en) * | 2005-09-14 | 2007-03-29 | Jorey Ramer | Mobile comparison shopping |
US20080215623A1 (en) * | 2005-09-14 | 2008-09-04 | Jorey Ramer | Mobile communication facility usage and social network creation |
US8832100B2 (en) * | 2005-09-14 | 2014-09-09 | Millennial Media, Inc. | User transaction history influenced search results |
US20110313853A1 (en) | 2005-09-14 | 2011-12-22 | Jorey Ramer | System for targeting advertising content to a plurality of mobile communication facilities |
US20090234861A1 (en) * | 2005-09-14 | 2009-09-17 | Jorey Ramer | Using mobile application data within a monetization platform |
US20070061246A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Mobile campaign creation |
US8805339B2 (en) | 2005-09-14 | 2014-08-12 | Millennial Media, Inc. | Categorization of a mobile user profile based on browse and viewing behavior |
US20080214153A1 (en) * | 2005-09-14 | 2008-09-04 | Jorey Ramer | Mobile User Profile Creation based on User Browse Behaviors |
US20070100650A1 (en) * | 2005-09-14 | 2007-05-03 | Jorey Ramer | Action functionality for mobile content search results |
US20080214149A1 (en) * | 2005-09-14 | 2008-09-04 | Jorey Ramer | Using wireless carrier data to influence mobile search results |
US8364521B2 (en) * | 2005-09-14 | 2013-01-29 | Jumptap, Inc. | Rendering targeted advertisement on mobile communication facilities |
US8660891B2 (en) * | 2005-11-01 | 2014-02-25 | Millennial Media | Interactive mobile advertisement banners |
US20070100652A1 (en) * | 2005-11-01 | 2007-05-03 | Jorey Ramer | Mobile pay per call |
US8131271B2 (en) * | 2005-11-05 | 2012-03-06 | Jumptap, Inc. | Categorization of a mobile user profile based on browse behavior |
US8989718B2 (en) * | 2005-09-14 | 2015-03-24 | Millennial Media, Inc. | Idle screen advertising |
US20080214152A1 (en) * | 2005-09-14 | 2008-09-04 | Jorey Ramer | Methods and systems of mobile dynamic content presentation |
US10592930B2 (en) * | 2005-09-14 | 2020-03-17 | Millenial Media, LLC | Syndication of a behavioral profile using a monetization platform |
US7752209B2 (en) | 2005-09-14 | 2010-07-06 | Jumptap, Inc. | Presenting sponsored content on a mobile communication facility |
US20080215429A1 (en) * | 2005-11-01 | 2008-09-04 | Jorey Ramer | Using a mobile communication facility for offline ad searching |
US20070073719A1 (en) * | 2005-09-14 | 2007-03-29 | Jorey Ramer | Physical navigation of a mobile search application |
US20070100653A1 (en) * | 2005-11-01 | 2007-05-03 | Jorey Ramer | Mobile website analyzer |
US20110143733A1 (en) * | 2005-09-14 | 2011-06-16 | Jorey Ramer | Use Of Dynamic Content Generation Parameters Based On Previous Performance Of Those Parameters |
US20070100806A1 (en) * | 2005-11-01 | 2007-05-03 | Jorey Ramer | Client libraries for mobile content |
US10038756B2 (en) * | 2005-09-14 | 2018-07-31 | Millenial Media LLC | Managing sponsored content based on device characteristics |
US20080214154A1 (en) * | 2005-11-01 | 2008-09-04 | Jorey Ramer | Associating mobile and non mobile web content |
US20070060173A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Managing sponsored content based on transaction history |
US20080214204A1 (en) * | 2005-11-01 | 2008-09-04 | Jorey Ramer | Similarity based location mapping of mobile comm facility users |
US20070168354A1 (en) * | 2005-11-01 | 2007-07-19 | Jorey Ramer | Combined algorithmic and editorial-reviewed mobile content search results |
US9076175B2 (en) * | 2005-09-14 | 2015-07-07 | Millennial Media, Inc. | Mobile comparison shopping |
US8311888B2 (en) | 2005-09-14 | 2012-11-13 | Jumptap, Inc. | Revenue models associated with syndication of a behavioral profile using a monetization platform |
US7548915B2 (en) * | 2005-09-14 | 2009-06-16 | Jorey Ramer | Contextual mobile content placement on a mobile communication facility |
US20080214151A1 (en) * | 2005-09-14 | 2008-09-04 | Jorey Ramer | Methods and systems for mobile coupon placement |
US20070061245A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Location based presentation of mobile content |
US7577665B2 (en) * | 2005-09-14 | 2009-08-18 | Jumptap, Inc. | User characteristic influenced search results |
US7603360B2 (en) * | 2005-09-14 | 2009-10-13 | Jumptap, Inc. | Location influenced search results |
US8819659B2 (en) | 2005-09-14 | 2014-08-26 | Millennial Media, Inc. | Mobile search service instant activation |
US20070192318A1 (en) * | 2005-09-14 | 2007-08-16 | Jorey Ramer | Creation of a mobile search suggestion dictionary |
US7912458B2 (en) | 2005-09-14 | 2011-03-22 | Jumptap, Inc. | Interaction analysis and prioritization of mobile content |
US20110143731A1 (en) * | 2005-09-14 | 2011-06-16 | Jorey Ramer | Mobile Communication Facility Usage Pattern Geographic Based Advertising |
US9703892B2 (en) | 2005-09-14 | 2017-07-11 | Millennial Media Llc | Predictive text completion for a mobile communication facility |
US10911894B2 (en) | 2005-09-14 | 2021-02-02 | Verizon Media Inc. | Use of dynamic content generation parameters based on previous performance of those parameters |
US20070060109A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Managing sponsored content based on user characteristics |
US8364540B2 (en) * | 2005-09-14 | 2013-01-29 | Jumptap, Inc. | Contextual targeting of content using a monetization platform |
US9201979B2 (en) | 2005-09-14 | 2015-12-01 | Millennial Media, Inc. | Syndication of a behavioral profile associated with an availability condition using a monetization platform |
US20100312572A1 (en) * | 2005-09-14 | 2010-12-09 | Jump Tap, Inc. | Presentation of Interactive Mobile Sponsor Content |
US20070073718A1 (en) * | 2005-09-14 | 2007-03-29 | Jorey Ramer | Mobile search service instant activation |
US7702318B2 (en) | 2005-09-14 | 2010-04-20 | Jumptap, Inc. | Presentation of sponsored content based on mobile transaction event |
US20080214155A1 (en) * | 2005-11-01 | 2008-09-04 | Jorey Ramer | Integrating subscription content into mobile search results |
US7805416B1 (en) * | 2005-09-30 | 2010-09-28 | Emc Corporation | File system query and method of use |
JP2007108958A (en) * | 2005-10-12 | 2007-04-26 | Canon Inc | Document retrieval device, document retrieval system and document retrieval method |
US8175585B2 (en) | 2005-11-05 | 2012-05-08 | Jumptap, Inc. | System for targeting advertising content to a plurality of mobile communication facilities |
US20100285818A1 (en) * | 2009-05-08 | 2010-11-11 | Crawford C S Lee | Location based service for directing ads to subscribers |
US20100121705A1 (en) * | 2005-11-14 | 2010-05-13 | Jumptap, Inc. | Presentation of Sponsored Content Based on Device Characteristics |
US8571999B2 (en) | 2005-11-14 | 2013-10-29 | C. S. Lee Crawford | Method of conducting operations for a social network application including activity list generation |
KR100825726B1 (en) * | 2005-12-08 | 2008-04-29 | 한국전자통신연구원 | Apparatus and method for user's privacy ? intellectual property protection of enterprise against denial of information |
US7690036B2 (en) * | 2005-12-12 | 2010-03-30 | Microsoft Corporation | Special group logon tracking |
US20070168465A1 (en) * | 2005-12-22 | 2007-07-19 | Toppenberg Larry W | Web Page Optimization Systems |
WO2007120360A2 (en) * | 2005-12-29 | 2007-10-25 | Blue Jungle | Information management system |
US20070192490A1 (en) * | 2006-02-13 | 2007-08-16 | Minhas Sandip S | Content-based filtering of electronic messages |
US7769395B2 (en) | 2006-06-20 | 2010-08-03 | Seven Networks, Inc. | Location-based operations and messaging |
CN101395559A (en) * | 2006-03-01 | 2009-03-25 | Tivo有限公司 | Recommended recording and downloading guides |
US9772981B2 (en) * | 2006-03-29 | 2017-09-26 | EMC IP Holding Company LLC | Combined content indexing and data reduction |
US7603350B1 (en) | 2006-05-09 | 2009-10-13 | Google Inc. | Search result ranking based on trust |
US20070290787A1 (en) * | 2006-06-20 | 2007-12-20 | Trevor Fiatal | Systems and methods for group messaging |
US8874592B2 (en) * | 2006-06-28 | 2014-10-28 | Microsoft Corporation | Search guided by location and context |
US7575163B2 (en) | 2006-07-18 | 2009-08-18 | At&T Intellectual Property I, L.P. | Interactive management of storefront purchases |
US7783636B2 (en) * | 2006-09-28 | 2010-08-24 | Microsoft Corporation | Personalized information retrieval search with backoff |
US7895185B2 (en) * | 2006-09-28 | 2011-02-22 | International Business Machines Corporation | Row-identifier list processing management |
WO2008052205A2 (en) * | 2006-10-27 | 2008-05-02 | Jumptap, Inc. | Combined algorithmic and editorial-reviewed mobile content search results |
US8280871B2 (en) * | 2006-12-29 | 2012-10-02 | Yahoo! Inc. | Identifying offensive content using user click data |
JP4542122B2 (en) * | 2007-01-26 | 2010-09-08 | ヤフー株式会社 | An apparatus for performing URL filtering by acquiring an original URL of content stored in a cache server or the like |
JP4865581B2 (en) * | 2007-02-08 | 2012-02-01 | 株式会社エヌ・ティ・ティ・ドコモ | Content distribution management device and content distribution system |
EP1972994A1 (en) * | 2007-03-20 | 2008-09-24 | Seiko Epson Corporation | Projector |
US20080276177A1 (en) * | 2007-05-03 | 2008-11-06 | Microsoft Corporation | Tag-sharing and tag-sharing application program interface |
GB0709574D0 (en) * | 2007-05-18 | 2007-06-27 | Aurix Ltd | Speech Screening |
US8805425B2 (en) | 2007-06-01 | 2014-08-12 | Seven Networks, Inc. | Integrated messaging |
US8693494B2 (en) * | 2007-06-01 | 2014-04-08 | Seven Networks, Inc. | Polling |
CN101364979B (en) * | 2007-08-10 | 2011-12-21 | 鸿富锦精密工业(深圳)有限公司 | Downloaded material parsing and processing system and method |
US20090106221A1 (en) * | 2007-10-18 | 2009-04-23 | Microsoft Corporation | Ranking and Providing Search Results Based In Part On A Number Of Click-Through Features |
US9348912B2 (en) * | 2007-10-18 | 2016-05-24 | Microsoft Technology Licensing, Llc | Document length as a static relevance feature for ranking search results |
US8364181B2 (en) * | 2007-12-10 | 2013-01-29 | Seven Networks, Inc. | Electronic-mail filtering for mobile devices |
US20090157747A1 (en) * | 2007-12-13 | 2009-06-18 | International Business Machines Corporation | Administering A Digital Media File Having One Or More Potentially Offensive Portions |
US9002828B2 (en) | 2007-12-13 | 2015-04-07 | Seven Networks, Inc. | Predictive content delivery |
US8793305B2 (en) * | 2007-12-13 | 2014-07-29 | Seven Networks, Inc. | Content delivery to a mobile device from a content service |
US8346953B1 (en) | 2007-12-18 | 2013-01-01 | AOL, Inc. | Methods and systems for restricting electronic content access based on guardian control decisions |
US8107921B2 (en) | 2008-01-11 | 2012-01-31 | Seven Networks, Inc. | Mobile virtual network operator |
US10229453B2 (en) | 2008-01-11 | 2019-03-12 | Ip Reservoir, Llc | Method and system for low latency basket calculation |
US8862657B2 (en) * | 2008-01-25 | 2014-10-14 | Seven Networks, Inc. | Policy based content service |
US20090193338A1 (en) * | 2008-01-28 | 2009-07-30 | Trevor Fiatal | Reducing network and battery consumption during content delivery and playback |
US20090204580A1 (en) * | 2008-02-12 | 2009-08-13 | Joseph Socrates Seamon | Selectively obscuring the presentation of restricted data items |
US9466080B2 (en) * | 2008-02-19 | 2016-10-11 | Oracle International Corporation | Bulk order management |
US8612467B2 (en) * | 2008-02-28 | 2013-12-17 | Red Hat, Inc. | Caching name-based filters in a full-text search engine |
US20090248670A1 (en) * | 2008-03-31 | 2009-10-01 | Trevor Fiatal | Content search engine |
US8812493B2 (en) * | 2008-04-11 | 2014-08-19 | Microsoft Corporation | Search results ranking using editing distance and document information |
US8004998B2 (en) * | 2008-05-23 | 2011-08-23 | Solera Networks, Inc. | Capture and regeneration of a network data using a virtual software switch |
US8521732B2 (en) * | 2008-05-23 | 2013-08-27 | Solera Networks, Inc. | Presentation of an extracted artifact based on an indexing technique |
US8625642B2 (en) | 2008-05-23 | 2014-01-07 | Solera Networks, Inc. | Method and apparatus of network artifact indentification and extraction |
US20090292736A1 (en) * | 2008-05-23 | 2009-11-26 | Matthew Scott Wood | On demand network activity reporting through a dynamic file system and method |
US8787947B2 (en) * | 2008-06-18 | 2014-07-22 | Seven Networks, Inc. | Application discovery on mobile devices |
US8078158B2 (en) | 2008-06-26 | 2011-12-13 | Seven Networks, Inc. | Provisioning applications for a mobile device |
JP5200762B2 (en) * | 2008-08-25 | 2013-06-05 | 富士通株式会社 | Search method and search program |
US8594627B2 (en) | 2008-10-06 | 2013-11-26 | Telecommunications Systems, Inc. | Remotely provisioned wirelessly proxy |
US8909759B2 (en) * | 2008-10-10 | 2014-12-09 | Seven Networks, Inc. | Bandwidth measurement |
CN101546342B (en) * | 2009-05-08 | 2012-07-04 | 阿里巴巴集团控股有限公司 | Method and system for implementing search service |
US8732137B2 (en) * | 2009-05-28 | 2014-05-20 | Red Hat, Inc. | Separating content from noisy context in template-based documents for search indexing |
EP2438540A1 (en) * | 2009-06-01 | 2012-04-11 | AOL Inc. | Providing suggested web search queries based on click data of stored search queries |
JP5310330B2 (en) * | 2009-07-09 | 2013-10-09 | トヨタ自動車株式会社 | Vehicle control device |
US10169599B2 (en) * | 2009-08-26 | 2019-01-01 | International Business Machines Corporation | Data access control with flexible data disclosure |
US9224007B2 (en) | 2009-09-15 | 2015-12-29 | International Business Machines Corporation | Search engine with privacy protection |
WO2011060377A1 (en) * | 2009-11-15 | 2011-05-19 | Solera Networks, Inc. | Method and apparatus for real time identification and recording of artifacts |
US20110125749A1 (en) * | 2009-11-15 | 2011-05-26 | Solera Networks, Inc. | Method and Apparatus for Storing and Indexing High-Speed Network Traffic Data |
CN101901237B (en) * | 2009-12-04 | 2012-05-23 | 四川川大智胜软件股份有限公司 | Type-Index-Value distributed database built based on SQIite |
US9600134B2 (en) | 2009-12-29 | 2017-03-21 | International Business Machines Corporation | Selecting portions of computer-accessible documents for post-selection processing |
TWI483129B (en) * | 2010-03-09 | 2015-05-01 | Alibaba Group Holding Ltd | Retrieval method and device |
US10263958B2 (en) | 2010-03-18 | 2019-04-16 | Nominum, Inc. | Internet mediation |
US9992234B2 (en) | 2010-03-18 | 2018-06-05 | Nominum, Inc. | System for providing DNS-based control of individual devices |
US9742811B2 (en) | 2010-03-18 | 2017-08-22 | Nominum, Inc. | System for providing DNS-based control of individual devices |
US9191393B2 (en) * | 2010-03-18 | 2015-11-17 | Nominum, Inc. | Internet mediation |
US9043731B2 (en) | 2010-03-30 | 2015-05-26 | Seven Networks, Inc. | 3D mobile user interface with configurable workspace management |
US8738635B2 (en) | 2010-06-01 | 2014-05-27 | Microsoft Corporation | Detection of junk in search result ranking |
US20110302170A1 (en) * | 2010-06-03 | 2011-12-08 | Microsoft Corporation | Utilizing search policies to determine search results |
EP2599003B1 (en) | 2010-07-26 | 2018-07-11 | Seven Networks, LLC | Mobile network traffic coordination across multiple applications |
US9077630B2 (en) | 2010-07-26 | 2015-07-07 | Seven Networks, Inc. | Distributed implementation of dynamic wireless traffic policy |
US8838783B2 (en) | 2010-07-26 | 2014-09-16 | Seven Networks, Inc. | Distributed caching for resource and mobile network traffic management |
WO2012018556A2 (en) | 2010-07-26 | 2012-02-09 | Ari Backholm | Mobile application traffic optimization |
US9330196B2 (en) | 2010-11-01 | 2016-05-03 | Seven Networks, Llc | Wireless traffic management system cache optimization using http headers |
US8843153B2 (en) | 2010-11-01 | 2014-09-23 | Seven Networks, Inc. | Mobile traffic categorization and policy for network use optimization while preserving user experience |
WO2012060995A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
WO2012061430A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed management of keep-alive message signaling for mobile network resource conservation and optimization |
US9060032B2 (en) | 2010-11-01 | 2015-06-16 | Seven Networks, Inc. | Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic |
GB2499534B (en) | 2010-11-01 | 2018-09-19 | Seven Networks Llc | Caching adapted for mobile application behavior and network conditions |
US8204953B2 (en) | 2010-11-01 | 2012-06-19 | Seven Networks, Inc. | Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache |
US8166164B1 (en) | 2010-11-01 | 2012-04-24 | Seven Networks, Inc. | Application and network-based long poll request detection and cacheability assessment therefor |
US8484314B2 (en) | 2010-11-01 | 2013-07-09 | Seven Networks, Inc. | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
EP3422775A1 (en) | 2010-11-22 | 2019-01-02 | Seven Networks, LLC | Optimization of resource polling intervals to satisfy mobile device requests |
CA2798523C (en) | 2010-11-22 | 2015-02-24 | Seven Networks, Inc. | Aligning data transfer to optimize connections established for transmission over a wireless network |
US8849991B2 (en) | 2010-12-15 | 2014-09-30 | Blue Coat Systems, Inc. | System and method for hypertext transfer protocol layered reconstruction |
US9325662B2 (en) | 2011-01-07 | 2016-04-26 | Seven Networks, Llc | System and method for reduction of mobile network traffic used for domain name system (DNS) queries |
US9529896B2 (en) * | 2011-01-18 | 2016-12-27 | Netspark Ltd | Hierarchical online-content filtering device and method |
US8666985B2 (en) | 2011-03-16 | 2014-03-04 | Solera Networks, Inc. | Hardware accelerated application-based pattern matching for real time classification and recording of network traffic |
JP5704324B2 (en) * | 2011-03-23 | 2015-04-22 | 日本電気株式会社 | Filtering system, filtering method, and program |
GB2505103B (en) | 2011-04-19 | 2014-10-22 | Seven Networks Inc | Social caching for device resource sharing and management cross-reference to related applications |
US8621075B2 (en) | 2011-04-27 | 2013-12-31 | Seven Metworks, Inc. | Detecting and preserving state for satisfying application requests in a distributed proxy and cache system |
US8832228B2 (en) | 2011-04-27 | 2014-09-09 | Seven Networks, Inc. | System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief |
US8645353B2 (en) * | 2011-06-23 | 2014-02-04 | Microsoft Corporation | Anchor image identification for vertical video search |
US8645354B2 (en) | 2011-06-23 | 2014-02-04 | Microsoft Corporation | Scalable metadata extraction for video search |
EP2737742A4 (en) | 2011-07-27 | 2015-01-28 | Seven Networks Inc | Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network |
JP5683428B2 (en) * | 2011-10-12 | 2015-03-11 | 株式会社野村総合研究所 | Document management device |
US9319381B1 (en) | 2011-10-17 | 2016-04-19 | Nominum, Inc. | Systems and methods for supplementing content policy |
US9569439B2 (en) | 2011-10-31 | 2017-02-14 | Elwha Llc | Context-sensitive query enrichment |
US8977755B2 (en) | 2011-12-06 | 2015-03-10 | Seven Networks, Inc. | Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation |
US8918503B2 (en) | 2011-12-06 | 2014-12-23 | Seven Networks, Inc. | Optimization of mobile traffic directed to private networks and operator configurability thereof |
US9277443B2 (en) | 2011-12-07 | 2016-03-01 | Seven Networks, Llc | Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol |
US9009250B2 (en) | 2011-12-07 | 2015-04-14 | Seven Networks, Inc. | Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation |
US9832095B2 (en) | 2011-12-14 | 2017-11-28 | Seven Networks, Llc | Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic |
US9021021B2 (en) | 2011-12-14 | 2015-04-28 | Seven Networks, Inc. | Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system |
US8861354B2 (en) | 2011-12-14 | 2014-10-14 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
US8954570B2 (en) * | 2011-12-30 | 2015-02-10 | Brightedge Technologies, Inc. | System and method for estimating organic web traffic from a secured source |
US8645399B2 (en) | 2012-01-03 | 2014-02-04 | Intelius Inc. | Dynamic record blocking |
WO2013103988A1 (en) | 2012-01-05 | 2013-07-11 | Seven Networks, Inc. | Detection and management of user interactions with foreground applications on a mobile device in distributed caching |
US9195853B2 (en) | 2012-01-15 | 2015-11-24 | International Business Machines Corporation | Automated document redaction |
US9495462B2 (en) | 2012-01-27 | 2016-11-15 | Microsoft Technology Licensing, Llc | Re-ranking search results |
US9203864B2 (en) | 2012-02-02 | 2015-12-01 | Seven Networks, Llc | Dynamic categorization of applications for network access in a mobile network |
US9326189B2 (en) | 2012-02-03 | 2016-04-26 | Seven Networks, Llc | User as an end point for profiling and optimizing the delivery of content and data in a wireless network |
US8812695B2 (en) | 2012-04-09 | 2014-08-19 | Seven Networks, Inc. | Method and system for management of a virtual network connection without heartbeat messages |
WO2013155208A1 (en) | 2012-04-10 | 2013-10-17 | Seven Networks, Inc. | Intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network |
US8775631B2 (en) | 2012-07-13 | 2014-07-08 | Seven Networks, Inc. | Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications |
US9270760B2 (en) * | 2012-10-15 | 2016-02-23 | Google Inc. | Cross-platform child mode for applications |
US9161258B2 (en) | 2012-10-24 | 2015-10-13 | Seven Networks, Llc | Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion |
US9892278B2 (en) | 2012-11-14 | 2018-02-13 | International Business Machines Corporation | Focused personal identifying information redaction |
US20140177497A1 (en) | 2012-12-20 | 2014-06-26 | Seven Networks, Inc. | Management of mobile device radio state promotion and demotion |
US9271238B2 (en) | 2013-01-23 | 2016-02-23 | Seven Networks, Llc | Application or context aware fast dormancy |
US8874761B2 (en) | 2013-01-25 | 2014-10-28 | Seven Networks, Inc. | Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
US20150066559A1 (en) * | 2013-03-08 | 2015-03-05 | James Robert Brouwer | College Planning System, Method and Article |
US9326185B2 (en) | 2013-03-11 | 2016-04-26 | Seven Networks, Llc | Mobile network congestion recognition for optimization of mobile traffic |
US9830377B1 (en) | 2013-04-26 | 2017-11-28 | Wal-Mart Stores, Inc. | Methods and systems for hierarchical blocking |
US9760654B2 (en) | 2013-04-26 | 2017-09-12 | Wal-Mart Stores, Inc. | Method and system for focused multi-blocking to increase link identification rates in record comparison |
US9065765B2 (en) | 2013-07-22 | 2015-06-23 | Seven Networks, Inc. | Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network |
CN103577558B (en) * | 2013-10-21 | 2017-04-26 | 北京奇虎科技有限公司 | Device and method for optimizing search ranking of frequently asked question and answer pairs |
US9372891B2 (en) * | 2013-12-13 | 2016-06-21 | Red Hat, Inc. | System and method for querying hybrid multi data sources |
US20150302064A1 (en) * | 2014-04-21 | 2015-10-22 | Adobe Systems Incorporated | Tag-based content exclusion |
US9436744B2 (en) | 2014-05-08 | 2016-09-06 | Accenture Global Services Limited | Combining internal and external search results |
US10701037B2 (en) | 2015-05-27 | 2020-06-30 | Ping Identity Corporation | Scalable proxy clusters |
US10681088B2 (en) | 2015-09-30 | 2020-06-09 | International Business Machines Corporation | Data security system |
DE202016008054U1 (en) * | 2015-11-13 | 2017-02-16 | Google Inc. | Performance monitoring in a distributed storage system |
US10681012B2 (en) | 2016-10-26 | 2020-06-09 | Ping Identity Corporation | Methods and systems for deep learning based API traffic security |
CN106599110A (en) * | 2016-11-29 | 2017-04-26 | 百度在线网络技术(北京)有限公司 | Artificial intelligence-based voice search method and device |
EP3560135A4 (en) | 2016-12-22 | 2020-08-05 | IP Reservoir, LLC | Pipelines for hardware-accelerated machine learning |
CN106970937B (en) * | 2017-02-08 | 2021-01-22 | 焦点科技股份有限公司 | Method and system for quickly establishing index based on local cache |
WO2019035903A1 (en) | 2017-08-16 | 2019-02-21 | Walmart Apollo, Llc | Systems and methods for distributed data validation |
EP3471007B1 (en) | 2017-10-13 | 2022-02-23 | Ping Identity Corporation | Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions |
WO2019089888A1 (en) | 2017-11-01 | 2019-05-09 | Walmart Apollo, Llc | Systems and methods for dynamic hierarchical metadata storage and retrieval |
EP3678348A1 (en) | 2019-01-04 | 2020-07-08 | Ping Identity Corporation | Methods and systems for data traffic based adpative security |
US11403300B2 (en) | 2019-02-15 | 2022-08-02 | Wipro Limited | Method and system for improving relevancy and ranking of search result |
CN112182148B (en) * | 2020-09-14 | 2023-08-25 | 山西和耀科技有限公司 | Standard aided writing method based on full text retrieval |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0828754B2 (en) | 1993-06-30 | 1996-03-21 | 日本電気株式会社 | Frame synchronization method |
WO1996000945A1 (en) | 1994-06-30 | 1996-01-11 | International Business Machines Corp. | Variable length data sequence matching method and apparatus |
US5619648A (en) | 1994-11-30 | 1997-04-08 | Lucent Technologies Inc. | Message filtering techniques |
CA2167790A1 (en) * | 1995-01-23 | 1996-07-24 | Donald S. Maier | Relational database system and method with high data availability during table data restructuring |
US5701469A (en) | 1995-06-07 | 1997-12-23 | Microsoft Corporation | Method and system for generating accurate search results using a content-index |
US5706507A (en) * | 1995-07-05 | 1998-01-06 | International Business Machines Corporation | System and method for controlling access to data located on a content server |
US5778361A (en) | 1995-09-29 | 1998-07-07 | Microsoft Corporation | Method and system for fast indexing and searching of text in compound-word languages |
US5802518A (en) | 1996-06-04 | 1998-09-01 | Multex Systems, Inc. | Information delivery system and method |
US5781906A (en) | 1996-06-06 | 1998-07-14 | International Business Machines Corporation | System and method for construction of a data structure for indexing multidimensional objects |
US5835722A (en) | 1996-06-27 | 1998-11-10 | Logon Data Corporation | System to control content and prohibit certain interactive attempts by a person using a personal computer |
US5802524A (en) | 1996-07-29 | 1998-09-01 | International Business Machines Corporation | Method and product for integrating an object-based search engine with a parametrically archived database |
EP0822502A1 (en) * | 1996-07-31 | 1998-02-04 | BRITISH TELECOMMUNICATIONS public limited company | Data access system |
US5852820A (en) | 1996-08-09 | 1998-12-22 | Digital Equipment Corporation | Method for optimizing entries for searching an index |
US5832500A (en) | 1996-08-09 | 1998-11-03 | Digital Equipment Corporation | Method for searching an index |
US5822747A (en) | 1996-08-23 | 1998-10-13 | Tandem Computers, Inc. | System and method for optimizing database queries |
US5890147A (en) * | 1997-03-07 | 1999-03-30 | Microsoft Corporation | Scope testing of documents in a search engine using document to folder mapping |
US5867665A (en) * | 1997-03-24 | 1999-02-02 | Pfn, Inc | Domain communications server |
US5845278A (en) | 1997-09-12 | 1998-12-01 | Inioseek Corporation | Method for automatically selecting collections to search in full text searches |
US6128627A (en) * | 1998-04-15 | 2000-10-03 | Inktomi Corporation | Consistent data storage in an object cache |
US6065055A (en) * | 1998-04-20 | 2000-05-16 | Hughes; Patrick Alan | Inappropriate site management software |
-
1999
- 1999-04-30 US US09/302,851 patent/US6336117B1/en not_active Expired - Lifetime
-
2000
- 2000-03-08 CA CA002300239A patent/CA2300239C/en not_active Expired - Fee Related
- 2000-04-13 CN CNB001067664A patent/CN1253813C/en not_active Expired - Lifetime
- 2000-04-17 SG SG200002183A patent/SG96549A1/en unknown
- 2000-04-21 JP JP2000121247A patent/JP2000357176A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN1253813C (en) | 2006-04-26 |
CA2300239A1 (en) | 2000-10-30 |
CN1272656A (en) | 2000-11-08 |
SG96549A1 (en) | 2003-06-16 |
JP2000357176A (en) | 2000-12-26 |
US6336117B1 (en) | 2002-01-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2300239C (en) | A content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine | |
US6480853B1 (en) | Systems, methods and computer program products for performing internet searches utilizing bookmarks | |
US6094657A (en) | Apparatus and method for dynamic meta-tagging of compound documents | |
US6625624B1 (en) | Information access system and method for archiving web pages | |
US6907423B2 (en) | Search engine interface and method of controlling client searches | |
US6334124B1 (en) | Techniques for improving index searches in a client-server environment | |
US7472120B2 (en) | Systems and methods for collaborative searching | |
US9703885B2 (en) | Systems and methods for managing content variations in content delivery cache | |
US9229940B2 (en) | Method and apparatus for improving the integration between a search engine and one or more file servers | |
US6145003A (en) | Method of web crawling utilizing address mapping | |
US5892908A (en) | Method of extracting network information | |
US6510458B1 (en) | Blocking saves to web browser cache based on content rating | |
US7383299B1 (en) | System and method for providing service for searching web site addresses | |
US8458163B2 (en) | System and method for enabling website owner to manage crawl rate in a website indexing system | |
CA2420382C (en) | A method for searching and analysing information in data networks | |
US6401118B1 (en) | Method and computer program product for an online monitoring search engine | |
US6701415B1 (en) | Selecting a cache for a request for information | |
US7293012B1 (en) | Friendly URLs | |
US6418453B1 (en) | Network repository service for efficient web crawling | |
US7827280B2 (en) | System and method for domain name filtering through the domain name system | |
EP1086433B1 (en) | Electronic file retrieval method and system | |
US20050086206A1 (en) | System, Method, and service for collaborative focused crawling of documents on a network | |
US20060212265A1 (en) | Method and system for assessing quality of search engines | |
AU2001290363A1 (en) | A method for searching and analysing information in data networks | |
CN101551813A (en) | Network connection apparatus, search equipment and method for collecting search engine data source |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed | ||
MKLA | Lapsed |
Effective date: 20120308 |