System, Method and Computer Program Product for Protecting Derived Metadata When Updating Records within a Search Engine

ABSTRACT

A search engine may maintain a list of derived metadata. When an event occurs that requires updating a search index, the search engine can determine which metadata is derived metadata and take appropriate actions with respect to the derived metadata. For example, if a request is received to update the index for a particular object, the search engine may protect the derived metadata from change while updating the other metadata in the index. As another example, if a request is received to update the text content for the object, the search engine may change the text content and the derived metadata. By identifying derived metadata, the search engine can protect the derived metadata from change when a request is received that otherwise causes metadata to change and can change the derived metadata when a request is received that would otherwise not change the metadata portion of the index.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of, and claims a benefit of priority under 35U.S.C. § 120 from, U.S. patent application Ser. No. 17/107,466, filedNov. 30, 2020, entitled “SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FORPROTECTING DERIVED METADATA WHEN UPDATING RECORDS WITHIN A SEARCHENGINE,” which is a continuation of, and claims a benefit of priorityunder 35 U.S.C. § 120 from, U.S. patent application Ser. No. 15/855,577,filed Dec. 27, 2017, issued as U.S. Pat. No. 10,860,662, entitled“SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROTECTING DERIVEDMETADATA WHEN UPDATING RECORDS WITHIN A SEARCH ENGINE,” which is acontinuation of, and claims a benefit of priority under 35 U.S.C. § 120from, U.S. patent application Ser. No. 14/709,084, filed May 11, 2015,issued as U.S. Pat. No. 9,875,305, entitled “SYSTEM, METHOD AND COMPUTERPROGRAM PRODUCT FOR PROTECTING DERIVED METADATA WHEN UPDATING RECORDSWITHIN A SEARCH ENGINE,” which is a continuation of, and claims abenefit of priority from, U.S. patent application Ser. No. 13/591,644,filed Aug. 22, 2012, issued as U.S. Pat. No. 9,058,335, entitled“SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROTECTING DERIVEDMETADATA WHEN UPDATING RECORDS WITHIN A SEARCH ENGINE,” which claims abenefit of priority from U.S. Provisional Application No. 61/528,990,filed Aug. 30, 2011, entitled “SYSTEM, METHOD AND COMPUTER PROGRAMPRODUCT FOR PROTECTING DERIVED METADATA WHEN UPDATING RECORDS WITHIN ASEARCH ENGINE.” All applications referenced in this paragraph are fullyincorporated by reference herein for all purposes.

TECHNICAL FIELD

This disclosure relates generally to the field of computerized searchsystems, and more particularly to systems, methods and products forprotecting derived metadata when updating records in a computerizedsearch system.

BACKGROUND OF THE RELATED ART

Advances in information technology (IT) continue to bring challenges toIT management. A push for IT management comes from dynamic needs ofentities as they aim to manage large amounts of documents. Entitiesoften employ document management systems to keep track of a vast amountof documents in the form of records. One issue faced by these businessesis the updating of information in reference to these documents.

Complicating this matter is the fact that entities may only need tosearch for particular records and update certain aspects of thoserecords rather than the entirety of the record. For example, a recordmay contain both text content and metadata in addition to metadataderived from text. An entity may wish to perform a bulk replacement ofthe metadata for a record. However, current solutions will destroy anymetadata derived from text content when bulk metadata replacement isperformed. Additionally, solutions currently available to updatedocument records tend to be time consuming and costly. Consequently,there is always room for innovations and improvements.

SUMMARY OF THE DISCLOSURE

This disclosure relates generally to the field of computerized searchsystems. More particularly, embodiments disclosed herein provide for asystem, method and computer program product that can protect derivedmetadata when updating records in a computerized search system.

A computerized search system may comprise a search engine. This searchengine may maintain a search index for objects (e.g., documents or otherobjects in a repository). The search index can include a metadata indexand a text index. The metadata indexed in the metadata index may includederived metadata and other metadata. The search engine can maintain alist of derived metadata. When an event occurs that requires updatingthe index, the search engine can consult the list of derived metadata,determine which metadata is derived metadata, and take appropriateactions with respect to the derived metadata. By way of example, but ofnot limitation, if a request is received to update the metadata indexfor a particular object, the search engine may protect the derivedmetadata from change while updating the other metadata. As anotherexample, if a request is received to update the text content for theobject, the search engine may change the text content and the derivedmetadata. By identifying derived metadata, the search engine can protectthe derived metadata from change when a request is received thatotherwise causes metadata to change and can change the derived metadatawhen a request is received that would otherwise not change the metadataindex.

One embodiment provides a computer program product that comprises anon-transitory computer readable medium having a set of computerinstructions stored on it. The instructions are executable by a computerprocessor to perform a method essentially as described above.

Another embodiment provides a computerized search system comprising atleast one non-transitory computer readable medium storing instructionstranslatable by at least one processor to perform a method essentiallyas described above.

Embodiments disclosed herein can provide many advantages. For example,by protecting derived metadata, search engines are better able tooptimally and accurately update records. A user may be able to quicklyupdate records by replacing only the necessary portion of the records.Thus, a search index may be able to circumvent slow update of recordsthat may prove to be costly.

These, and other, aspects of the invention will be better appreciatedand understood when considered in conjunction with the followingdescription and the accompanying drawings. The following description,while indicating various embodiments of the invention and numerousspecific details thereof, is given by way of illustration and not oflimitation. Many substitutions, modifications, additions orrearrangements may be made within the scope of the invention, and theinvention includes all such substitutions, modifications, additions orrearrangements.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings accompanying and forming part of this specification areincluded to depict certain aspects of the invention. A clearerimpression of the invention, and of the components and operation ofsystems provided with the invention, will become more readily apparentby referring to the exemplary, and therefore non-limiting, embodimentsillustrated in the drawings, wherein identical reference numeralsdesignate the same components. Note that the features illustrated in thedrawings are not necessarily drawn to scale.

FIG. 1 depicts one embodiment of a computing environment in which oneembodiment of a search system can be implemented.

FIG. 2 depicts a functional block diagram illustrating one embodiment ofan object analyzer.

FIG. 3 depicts a functional block diagram illustrating one embodiment ofa search engine.

FIG. 4 depicts a diagrammatic representation of one embodiment ofregions or fields for a portion of an index.

FIG. 5 depicts a functional block diagram illustrating one embodiment ofan indexing engine.

FIG. 6 depicts a flow diagram illustrating one embodiment of a methodfor processing an indexing request and protecting derived metadata ofinterest from being affected thereby.

DETAILED DESCRIPTION

The disclosure and various features and advantageous details thereof areexplained more fully with reference to the exemplary, and thereforenon-limiting, embodiments illustrated in the accompanying drawings anddetailed in the following description. Descriptions of known startingmaterials and processes may be omitted so as not to unnecessarilyobscure the disclosure in detail. It should be understood, however, thatthe detailed description and the specific examples, while indicating thepreferred embodiments, are given by way of illustration only and not byway of limitation. Various substitutions, modifications, additionsand/or rearrangements within the spirit and/or scope of the underlyinginventive concept will become apparent to those skilled in the art fromthis disclosure.

Document management systems often employ a search engine to allow forfast retrieval of information. A search engine can search the metadataand text of documents in a search index to determine which documentsmatch search criteria without having to parse the document itself.

When an object is added to a search system, two types of information maybe indexed, one or both of full text and metadata. There are often manymetadata fields for an associated object. The metadata may describe theobjects being indexed. There can be various types of metadata, variousways metadata can be obtained and/or generated, as well as various waysto associate such metadata with certain objects which, in turn, can beof various types. Document records can be an example type of objects. Ifan object has or references text content, some metadata may be derivedfrom the text content. This type of metadata can be referred to asderived metadata.

Derived metadata can be fragile in a search system. For example, supposewhen an object that has or references text content is added to a searchsystem, a software component in the search system analyzes the textcontent of the object and determines that the text content is generallypositive, say, at 60%. This sentiment value of 60% is a type of derivedmetadata and is associated with the object in the search system. Thisderived metadata is indexed in a search index and is searchable by usersof the search system to provide further insight about the object.However, this piece of valuable information may be lost when the indexor the object is updated. This commonly happens if the metadataassociated with the object is replaced, inadvertently also removing thederived metadata.

At this point, it may be helpful to discuss an example search system.

FIG. 1 depicts a block diagram illustrating one embodiment of acomputing environment 100 with object search system 101. Computingenvironment 100 includes an object repository 105 storing objects 107 ofinterest (documents, images, emails or other objects that may besearched). Object repository 105 may comprise a file server or databasesystem or other storage mechanism remotely or locally accessible bysearch system 101.

In the embodiment of FIG. 1 , search system 101 comprises a serverhaving a central processing unit 112 connected to a memory 114 andstorage unit 118 via a bus.

Central processing unit 112 may represent a single processor, multipleprocessors, a processor(s) with multiple processing cores and the like.Storage unit 118 may include a non-transitory storage medium such ashard-disk drives, flash memory devices, optical media and the like.Search system 101 may be connected to a data communications network (notshown).

Storage unit 118 stores computer executable instructions 119 and index124. Computer executable instructions 119 can represent multipleprograms and operating system code. In one embodiment, instructions 119are executable to provide an object analyzer 120 and search engine 122.Object analyzer 120 and search engine 122 may be portions of the sameprogram or may be separate programs. According to one embodiment, forexample, object analyzer 120 is a component of a document managementsystem while search engine 122 is a separate program that interfaceswith the document management system. Furthermore, object analyzer 120and search engine 122 can be implemented on different computing systemsand can, themselves, be distributed.

Index 124 includes metadata used to identify objects in response to asearch query and may also include text used to identify objects. Index124 can include a single index containing metadata and text, separatemetadata and text indices or other arrangements of information. Whileshown as a single index, index 124 may include multiple indices.

Client computer system 130 may include components similar to those ofthe server of search system 101, such as CPU 138, memory 136, andstorage 140. Additionally, client computer system 130 may includeexecutable instructions 132 to provide a user interface 134 that allowsa user to enter a search query. The user interface may be providedthrough a web browser, file system interface or other program.

The search system 101 of FIG. 1 is merely an example of a computingsystem and embodiments of a search system that may be implemented usingother computing systems (e.g., desktop computers, laptops, mobilecomputing devices or other computing devices with adequate processingand memory) including multiple computers acting together to provide asearch system (e.g., a cluster of servers or other computing devicesconnected by a network acting together to provide the search system).Similarly, client computer 130 may include any suitable desktopcomputer, laptop, mobile device, server or other computing system.

In operation, object analyzer 120 analyzes objects in object repository105 to determine information to be indexed in index 124. Object analyzer120 can send indexing instructions to search engine 122 to direct searchengine 122 to add/modify/or delete metadata or text in index 124, asdiscussed below. When a search query is received, search engine 122 cansearch the information in index 124 to identify objects responsive tothe search query and return a list or other representation of thoseobjects to client computer 130.

FIG. 2 depicts a diagrammatic representation of one embodiment of anobject analyzer 120 for analyzing an object 107. Object analyzer 120 cancomprise various modules to process an object 107. Reading source datamodule 154 can open the object 107. Format identification module 156examines the object to determine what type of file or data the object107 comprises. Archive expansion module 158 unzips files or otherwisedecompresses files if the object 107 is a compressed file. Decryptionmodule 160 decrypts all or part of the data in the object 107. Textextraction module 162 applies rules to text in the object 107 to extracttext for index 124. Language detection module 164 examines the text todetermine the language in which the text is written. Classificationmodule 166 applies rules based upon text and metadata to classifycontent. Encoding module 168 can convert text to a supported encoding.Randomness detection module 170 can analyze data to be indexed to rejectrandom information.

Object analyzer 120 may include modules that can derive metadata forobject 107. For example, a document management system may provide alimited amount of metadata with the object 107. Object analyzer 120 canderive other metadata from the metadata provided, text or otherproperties of the object 107. As a specific example, a filter or pieceor code that extracts the text from a PowerPoint presentation might alsocreate metadata about the presentation. In this example, the metadatawhich is not provided by the document management system and which isderived by object analyzer 120 may include the number of slides in thepresentation, the title of the file, the name of the presentationauthor, or the size of paper the presentation was designed to print on.More complex examples of derived metadata might include statisticalanalysis to generate a list of keyword or key concepts in the document;determining the subject person or company of the text; sentimentanalysis—is the tone of the text positive or negative; or languageidentification—in what language is the text written. Further examples ofmetadata that may either be provided by the document management system(or other application) or derived by the analyzer may be the date theobject was created, the size of the object in bytes, the name of theobject, a description of the object or the like. Further clarificationof derived metadata is provided below with reference to FIG. 5 .

The embodiment of FIG. 2 is provided by way of example. Object analyzer120 may include any number of other modules to analyze an object andextract text 174 and metadata 172 to be indexed. Object analyzer 120 maybe a portion of a larger program, such as a document management program,may be a separate program or may be implemented according any suitableprogramming architecture. In one embodiment, the process of determiningmetadata 172 and text 174 to be indexed may be carried out by any numberof different programs on a computer system or distributed acrosscomputer systems.

Metadata 172 and text 174 thus processed by object analyzer 120 may beprovided to a search engine. An example search engine will now bedescribed with reference to FIG. 3 .

FIG. 3 depicts a diagrammatic representation of logical blocks for oneembodiment of a search engine 122. Search engine 122 may provide anindexing interface 200 that receives indexing requests (e.g., fromobject analyzer 120) or other source. A distributor module 210 maydistribute the indexing requests to indexing engine 220 that act on anindexing request to update index 124. Search engine 122 may also includea search interface 230 to receive queries (e.g., from a documentmanagement system or other source). Search interface 230 may sendqueries to search modules 240. Federator 245 gathers the results fromall search modules together, and generates a response to the queryreceived through search interface 230. Search modules 240 areresponsible for performing searches on an index partition, andperforming tasks such as computing relevance score, sorting results, andretrieving metadata regions to return in a query.

Search interface 230 may be configured to receive a search query from auser, and search index 124 for objects that meet the criteria set forthin the search query. Query language may also be configured to permitsorting results of a search. Various rules may be used to determine thesort order. In this example, a user constructed the search query. Itshould be noted, however, that the user could be any system that issuesqueries to the search system, and may include other computer programssearching on behalf of other users, creating reports or runningautomatic processes. Additionally, as described above, there can be manydifferent types of metadata in the search index. Thus, the searchqueries are not restricted to “text” based search terms.

In the context of this disclosure, the phrase “search term” represents atechnical concept or interpretation. For example, a search term in thecontext of this disclosure can be a word, a string, or any combinationof the following:

-   -   phrases    -   numbers    -   strings    -   logical operations (e.g., AND, OR, NOT, etc.)    -   ordering or operations (e.g., using parenthesis)    -   relationships (e.g., greater than, less than, not equal to,        etc.)    -   similarities based on thesaurus, stemming, sounds-like, etc.    -   wildcards and pattern matching

To this end, a search term can also refer to any term that is used in aquery and that has been modified or generated by any commonly usedtechniques.

For context, a search term could be a word “john” or a more complexexpression like: (>“bob” or !=(“123” or a*)) and (sounds-like “smith” orthesaurus “doctor” or “medical doctor” or stem “medical”).

The embodiment of FIG. 3 is provided by way of example. Search engine122 may include any number of other modules or configurations to updateand search an index. For example, search modules 240 and indexingengines 220 may be a single module. Search engine 122 may be a portionof a larger program, such as a document management program, may be aseparate program or may be implemented according to any suitableprogramming architecture. In one embodiment, the processes of searchengine 122 may be distributed across multiple computer systems.Furthermore, while in FIG. 3 , index 124 is illustrated as a singleindex, index 124 may comprise a set of smaller indexes. For example, aseparate index can be used by each indexing engine.

FIG. 4 depicts a diagrammatic representation of one embodiment ofregions or fields for a portion of index 124. Index 124 includes a listof some or all objects 107 in repository 105 (FIG. 1 ), each identifiedby a unique identifier 301 (also referred to as object ID). Index 124further includes a set of metadata regions 300 (also referred to asmetadata fields). A metadata field 300 may include more than one entryfor an object. The metadata fields can each have associated values invalue storage locations within storage unit 118. In other embodiments,the values may be discarded. The index may include a list of dictionaryterms contained in the metadata values of the object and pointers towhere the metadata values corresponding to the field are stored. Index124 may also include other regions for an object, such as a text region302. Text region 302 may, example, include a list of terms in the textof an object.

While shown as a single index, index 124 may be partitioned. In indexpartitioning, in one embodiment, the index of objects in repository 105may be split into multiple indexes such that some objects are listed inone index partition, while other objects are listed in the other indexpartitions. Index partitioning may also reduce resource usage and searchtime. Furthermore, separate indexes may be maintained for metadata andtext and/or different metadata regions or fields. Index 124 can bestored according to any suitable storage scheme.

FIG. 5 depicts a diagrammatic representation of one embodiment of anindexing engine 220 to maintain index 124. In this embodiment, indexingengine 220 can include an indexing controller 305, a metadata updatecomponent 310, a text update component 315, and a derived metadata list520. In this embodiment, index 124 is maintained as a separate metadataindex 312, which contains metadata for objects in repository 105, andtext index 314, which contains content text from objects in repository105.

Indexing controller 305 receives indexing requests (e.g., from adistributor, another application or other source). An indexing requestreceived at the indexing controller 305 may include an instruction toadd an object, delete an object, modify an object or replace an objectin index 124. Such an indexing request may also include the informationto be added or changed, such as the full text content to be indexed andthe associated metadata for the object. An indexing request may alsocontain derived metadata.

The text (derived text or full text content) of an indexing request maybe a text file. It could be data exported from a database or otherinformation system. Commonly, the text is the human-readable informationwithin a document composed on a computer. In this scenario, a file suchas a Microsoft Word document would be analyzed by a filtering step toextract the text, which can be stripped of unnecessary information suchas fonts, styles, or page layout information.

The metadata portion of an indexing request may specifically be providedby an application providing the indexing request. This might be datasuch as an identifier for the object, the date or time it was firstadded to the system, or the identity of the user who manages the object.

Derived metadata can include metadata inferred from the text content.For example, the filter or code that extracts the text from a PowerPointpresentation might also create metadata about the presentation. In thisexample, the generated metadata may include the number of slides in thepresentation, the title of the file, the name of the presentation authorstored in the PowerPoint file, or the size of paper the presentation wasdesigned to print on. More complex examples of derived metadata mightinclude statistical analysis to generate a list of keyword or keyconcepts in the document, determining the subject person or company ofthe text, sentiment analysis (the positive or negative tone of thetext), or identification of the language in which the text is written.Derived metadata may also include data inferred from processing anobject. For example, in processing a PowerPoint presentation, derivedmetadata may include a timestamp of the time the PowerPoint wasprocessed or the location where the PowerPoint presentation wasprocessed.

In one embodiment, a derived metadata list 520 may be a record of anyknown metadata fields that have been derived from the text which isindexed. In one embodiment, this list may be consumed by metadata updatecomponent 310 of indexing engine 220 to provide guidance on whether agiven metadata field must be replaced or deleted as if it were part ofthe text data.

An indexing engine can receive an indexing request 510 from anapplication, distributor or other source. Indexing request 510 specifiesan operation to be taken on index 124 for an object and any metadata ortext for that action. For context, an application that generates anindexing request may be a corporate document management system, a website with a search capability such as an online store, or a desktopsearch program for email.

According to one embodiment, for example, an indexing request can takethe form of an indexing object that includes a unique identification foran object, an operation, the metadata or text regions affected and themetadata and/or text for the index. By way of example, but notlimitation, indexing operations may include adding, replacing, modifyingand deleting information in the index, or combinations thereof. Thefollowing provides some exemplary operations that may be included inindexing requests.

AddOrReplace: this operation can be used to create new objects in theindex. According to one embodiment, if the object does not exist, itwill be created, but if an entry with the same object identificationexists, then it will be completely replaced with the new data,equivalent to a delete and add.

AddOrReplace: this function may distinguish between content andmetadata. If an object already exists, and metadata only is provided,the existing full text content is retained.

AddOrModify: this operation will update an existing object, or create anew object if it does not already exist. When modifying an existingobject, only the provided content and metadata is updated. Any metadataregions that already exist which are not specified in the AddOrModifycommand will be left intact.

Delete: this operation will remove an object from the index, includingboth the metadata and the content.

Indexing controller 305, according to one embodiment, is a componentwhich interprets the indexing request to determine how it should beprocessed. Indexing controller 305 can identify whether a text indexingcommand exists, and, if so, send the command with the necessaryparameters to the text update component 315. Indexing controller 305 canlikewise determine if any metadata indexing operations are required, andif so, send the command with necessary parameters to the metadata updatecomponent 310.

Text update component 315 is responsible for processing requests toindex full text content. This may include tasks such as maintaining adictionary of search terms, maintaining the internal search datastructures, and updating the storage representation of the text portionof the search index in memory or on disk as appropriate. Text updatecomponent 315 may support instructions such as Add an Object, Replace anObject, or Delete an Object. Non-limiting examples of instructionssupported by text update component 315 are further described below.

Metadata update component 310 is responsible for processing requests toindex metadata 312 associated with an object in index 124. This mayinclude building and maintaining dictionaries of search terms,maintaining internal search data structures, and updating therepresentation of the metadata portion of the search index in memory oron disk as appropriate. Metadata update component 310 may supportinstructions such as Add an Object, Replace an Object, or Delete anObject. Non-limiting examples of instructions supported by metadataupdate component 310 are further described below.

As an example, in one embodiment, indexing request 510 sent bydistributor 210 to indexing engine 220 may contain an instruction to addan object of a text type. Indexing request 510 may be received byindexing controller 305 of indexing engine 220. Referring to FIG. 6 ,indexing controller 305 may operate to parse and analyze indexingrequest 510 (step 605) and determine what, if any, type of command is inindexing request 510 (step 610). Indexing request 510 may contain a textindexing command, a metadata indexing command, or both. Indexing engine220 may further comprise text update component 315 and metadata updatecomponent 310 coupled to indexing controller 305. In one embodiment,when indexing controller 305 detects that indexing request 510 containsa metadata indexing command, indexing controller 305 may access derivedmetadata list 520 and determine whether the metadata indexing commandapplies to or otherwise affects any derived metadata in index 124 thatshould be protected from change (step 615). As will be explained below,this may involve using a pattern matching technique to identify anymetadata field name in index 124 that is affected by the metadataindexing command and that matches a derived metadata field from derivedmetadata list 520. Indexing controller 305 may then forward the metadataindexing command (step 620) along with any metadata field name thusidentified to metadata update component 310. In one embodiment, step 615may be performed by metadata update component 310 after receiving ametadata indexing command from indexing controller 305 (step 620). Inthis embodiment, indexing controller 305 may determine what, if any,type of command is in indexing request 510 (step 610) and forward theindexing command(s) to metadata update component 310, to text updatecomponent 315, or both. Metadata update component 310, in turn, mayaccess derived metadata list 520 and determine whether the metadataindexing command applies to or otherwise affects any derived metadata inindex 124 that should be protected from change (step 615).

In one embodiment, index 124 comprises a set of indices includingmetadata index 312 and text index 314. Metadata update component 310 mayretain derived metadata, identified as being protected using derivedmetadata list 520, in metadata index 312 and execute the metadataindexing command to update metadata index 312 without changing theprotected derived metadata (step 630). Likewise, metadata updatecomponent 310 can execute metadata indexing commands to update thederived metadata fields in metadata index 312 even though the indexingrequest 510 only contains a request to update text index 314.

Non-limiting examples of instructions supported by metadata updatecomponent 310 and text update component 315 will now be described below.

To replace a text object, indexing request 510 may contain aninstruction to replace only the text of an object. In one embodiment, apre-processing step, such as processing shown in FIG. 2 , may analyzethe text to obtain derived metadata associated with the object, andinclude this derived metadata in indexing request 510. Indexingcontroller 305 may then send the instruction to both text updatecomponent 315 and metadata update component 310. Text update component315 can update text index 314 with the new data. Metadata updatecomponent 310 determines that this is a text update request. Metadataupdate component 310 may examine derived metadata list 520 and mayfilter the available metadata in metadata index 312 against derivedmetadata list 520, and replace only the metadata that may be derivedfrom the text of the object.

As an example, indexing request 510 may contain an instruction to deleteonly the text of an object. In one embodiment, indexing controller 305may send a command to text update component 315 to delete the text ofthe object from text index 314. Indexing controller 305 may also send acommand to metadata update component 310 to delete the text of theobject. Metadata update component 310 reads derived metadata list 520and deletes the values for each of the derived metadata fieldsassociated with the object if they exist in metadata index 312.

As another example, indexing request 510 may contain an instruction toreplace all the metadata for an object. In one embodiment, indexingcontroller 305 may send a command to metadata update component 310,along with necessary parameters, to replace only the metadata for theobject. Metadata update component 310 may compare the existing metadatain metadata index 312 against derived metadata list 520. According toone embodiment, metadata fields specified in derived metadata list 520are considered protected. Consequently, metadata update component 310will not erase or modify values in metadata index 312 that have beenidentified per derived metadata list 520 as being associated with theprotected metadata fields.

As another example, indexing request 510 may contain an instruction todelete only the metadata of an object. Indexing controller 305 may senda command to metadata update component 310 to delete only the metadataof the object. According to one embodiment, metadata update component310 reads derived metadata list 520 and deletes values for all metadatafields in metadata index 312 for the particular object except for themetadata fields identified per derived metadata list 520 as beingprotected.

In one embodiment, pattern matching may be used to identify derivedmetadata fields. For example, a value of ‘OTDoc*’ in derived metadatalist 520 may ensure that any metadata field name that starts with thecharacters ‘OTDoc’ may be considered to be derived metadata. A derivedmetadata field name of ‘OTDoc*!OTDocCAR’ indicates that any metadatafield name that begins with OTDoc is a derived field name except for thefield named OTDocCAR. The rules and patterns for identifying field nameswhich meet the criteria for derived metadata may be made arbitrarilycomplex. For example, suppose an entity must protect a large amount ofdocuments related to an ongoing legal proceeding for the next 60 days.Derived data fields containing “CourtCaseDoc” may be searched for andprevented from being changed for the duration of the identified 60 days.

One advantage of pattern matching is that a user can define many derivedmetadata field names with a few patterns, which may be especially usefulwhen the metadata field names are not explicitly known (e.g., when thesystem is first configured).

Further, derived metadata list 520 may be provided by a number ofdifferent mechanisms. In one embodiment, derived metadata list 520 maybe generated from values stored in a configuration file. In anotherembodiment, each metadata item for each object might be marked in a waythat identifies it as derived metadata. Essentially, the way that thederived metadata list is stored can be distributed in various ways, andit does not need to be the same list for each partition or for eachobject in the index.

Derived metadata list 520 may be defined and maintained in various ways.Non-limiting examples may include:

-   -   Use a programming interface (API) to define and manage the list.    -   Identify derived metadata values in an indexing request.    -   Define a known list of derived metadata values within the        software (e.g., ‘hard coded’).    -   Manage a list of derived metadata in an external database or        application, with which the search index components can interact        to obtain the derived metadata values.

The above list is shown by way of example and is not exhaustive.

Derived metadata list 520 may be retained by the search components inpersistent storage. In one embodiment, the list may be recreated eachtime the search components are started. Examples of locations in whichthe derived metadata list 520 can be retained include a configurationfile, a distributed cache system, an external system, or within thesearch index itself.

In one embodiment, the analysis of the text to derive metadata occurs ina step prior to the generation of an indexing request. In anotherembodiment, deriving metadata from the text occurs at other locations inthe indexing process. For example, the Indexing controller may containor control functional components that perform the analysis of text toderive metadata.

For illustration purposes, Table 1 below contains examples of searchindex preparation steps that may generate derived metadata. This isinformation that may be derived primarily from text content, and may notbe replaced when a “Replace Metadata” indexing command is received. Inone example, when using Language Detection, a derived metadata field maybe called “OTLanguage” with a value being “English.”

TABLE 1 Types of Derived Sample Values for Derived Metadata FieldsPurpose Metadata Fields Format Analyze the file format, mime types, fileMicrosoft Word Identification name extensions and other cues to AdobeAcrobat PDF accurately determine the type of a file. Metadata Apply afilter that can parse a known Word: Author, date saved Extraction filetype to extract metadata that is JPEG: Camera, image included in thefile. pixels, date photographed Language Analyze the text to guess whichEnglish Detection language was used to write the content German 60% witha confidence score. Sentiment Apply language rules to determine Positive30% Analysis whether text is positive, negative or neutral. Keywords/Use semantic or statistical methods to Financial services Conceptsidentify keywords or concepts that the Mortgage defaults text relatesto. Entity Extraction Apply language rules and known lists to GeorgeBush identify significant people, places or Christmas events in thecontent. Chicago, IL Geotagging Create a list of the geospatial+27.5916 + 086.5640 + coordinates that represent the most 8850/+ 40.6894− likely locales in the content or 074.0447/ metadata. ClassificationApply business rules and patterns to Contract identify the most likelyclassification of Customer complaint the record. Census form SimilarityGenerate codes that can be used to 817728fe34 help match documents thatare 8992783476 identical or have similar sections. File InformationAttributes of the file, such as the file Size: 899458 name and size.Name: test.doc

The embodiments disclosed herein are advantageous over previoussolutions. For optimization reasons, requests to replace only themetadata or replace only the text content for an object may be given tothe search Index. One previous solution involves incorporating derivedmetadata into the text portion of the search Index. For example, derivedclassification values may be appended to the text. The problem thatarises in this previous solution is that a user may not be able tosearch specifically in the metadata field and this reduces the accuracyand capabilities of the search index.

Another previous solution is to replace both the text and metadataassociated with an object at once. Replacing text and metadata at onceloses the performance capability of the search index. Replacement isslower since both text and metadata must be replaced for the object. Asa result, performance optimization is not possible.

By allowing for the replacement of the metadata portion associated withan object, without the replacement of the text portion associated withthe object, without corrupting the derived metadata, embodiments canprovide a reduction of the load on the computer which performs theindexing tasks, a reduction of load on the computer which analyzes thetext to derive metadata, and a reduction in the amount of information anattached application must provide to the indexing process forreplacement operations.

The embodiment of FIG. 5 is provided by way of example. Indexing engine220 may include any number of other modules to update and search anindex. Indexing engine 220 may be a portion of a larger program, such asa document management program, may be a separate program or may beimplemented according any suitable programming architecture. In oneembodiment, the processes of indexing engine 220 may be distributedacross multiple computer systems. Other alternative embodiments are alsopossible.

Although the invention has been described with respect to specificembodiments thereof, these embodiments are merely illustrative, and notrestrictive of the invention. The description herein of illustratedembodiments of the invention, including the description in the Abstractand Summary, is not intended to be exhaustive or to limit the inventionto the precise forms disclosed herein (and in particular, the inclusionof any particular embodiment, feature or function within the Abstract orSummary is not intended to limit the scope of the invention to suchembodiment, feature or function). Rather, the description is intended todescribe illustrative embodiments, features and functions in order toprovide a person of ordinary skill in the art context to understand theinvention without limiting the invention to any particularly describedembodiment, feature or function, including any such embodiment featureor function described in the Abstract or Summary. While specificembodiments of, and examples for, the invention are described herein forillustrative purposes only, various equivalent modifications arepossible within the spirit and scope of the invention, as those skilledin the relevant art will recognize and appreciate. As indicated, thesemodifications may be made to the invention in light of the foregoingdescription of illustrated embodiments of the invention and are to beincluded within the spirit and scope of the invention. Thus, while theinvention has been described herein with reference to particularembodiments thereof, a latitude of modification, various changes andsubstitutions are intended in the foregoing disclosures, and it will beappreciated that in some instances some features of embodiments of theinvention will be employed without a corresponding use of other featureswithout departing from the scope and spirit of the invention as setforth. Therefore, many modifications may be made to adapt a particularsituation or material to the essential scope and spirit of theinvention.

Reference throughout this specification to “one embodiment”, “anembodiment”, or “a specific embodiment” or similar terminology meansthat a particular feature, structure, or characteristic described inconnection with the embodiment is included in at least one embodimentand may not necessarily be present in all embodiments. Thus, respectiveappearances of the phrases “in one embodiment”, “in an embodiment”, or“in a specific embodiment” or similar terminology in various placesthroughout this specification are not necessarily referring to the sameembodiment. Furthermore, the particular features, structures, orcharacteristics of any particular embodiment may be combined in anysuitable manner with one or more other embodiments. It is to beunderstood that other variations and modifications of the embodimentsdescribed and illustrated herein are possible in light of the teachingsherein and are to be considered as part of the spirit and scope of theinvention.

In the description herein, numerous specific details are provided, suchas examples of components and/or methods, to provide a thoroughunderstanding of embodiments of the invention. One skilled in therelevant art will recognize, however, that an embodiment may be able tobe practiced without one or more of the specific details, or with otherapparatus, systems, assemblies, methods, components, materials, parts,and/or the like. In other instances, well-known structures, components,systems, materials, or operations are not specifically shown ordescribed in detail to avoid obscuring aspects of embodiments of theinvention. While the invention may be illustrated by using a particularembodiment, this is not and does not limit the invention to anyparticular embodiment and a person of ordinary skill in the art willrecognize that additional embodiments are readily understandable and area part of this invention.

Embodiments discussed herein can be implemented in a computercommunicatively coupled to a network (for example, the Internet),another computer, or in a standalone computer. As is known to thoseskilled in the art, a suitable computer can include a central processingunit (“CPU”), at least one read-only memory (“ROM”), at least one randomaccess memory (“RAM”), at least one hard drive (“HD”), and one or moreinput/output (“I/O”) device(s). The I/O devices can include a keyboard,monitor, printer, electronic pointing device (for example, mouse,trackball, stylus, touch pad, etc.), or the like.

ROM, RAM, and HD are computer memories for storing computer-executableinstructions executable by the CPU or capable of being compiled orinterpreted to be executable by the CPU. Suitable computer-executableinstructions may reside on a computer readable medium (e.g., ROM, RAM,and/or HD), hardware circuitry or the like, or any combination thereof.Within this disclosure, the term “computer readable medium” is notlimited to ROM, RAM, and HD and can include any type of data storagemedium that can be read by a processor. For example, a computer-readablemedium may refer to a data cartridge, a data backup magnetic tape, afloppy diskette, a flash memory drive, an optical data storage drive, aCD-ROM, ROM, RAM, HD, or the like. The processes described herein may beimplemented in suitable computer-executable instructions that may resideon a computer readable medium (for example, a disk, CD-ROM, a memory,etc.). Alternatively, the computer-executable instructions may be storedas software code components on a direct access storage device array,magnetic tape, floppy diskette, optical storage device, or otherappropriate computer-readable medium or storage device.

Any suitable programming language can be used to implement the routines,methods or programs of embodiments of the invention described herein,including C, C++, Java, JavaScript, HTML, or any other programming orscripting code, etc. Other software/hardware/network architectures maybe used. For example, the functions of the disclosed embodiments may beimplemented on one computer or shared/distributed among two or morecomputers in or across a network. Communications between computersimplementing embodiments can be accomplished using any electronic,optical, radio frequency signals, or other suitable methods and tools ofcommunication in compliance with known network protocols.

Different programming techniques can be employed such as procedural orobject oriented. Any particular routine can execute on a single computerprocessing device or multiple computer processing devices, a singlecomputer processor or multiple computer processors. Data may be storedin a single storage medium or distributed through multiple storagemediums, and may reside in a single database or multiple databases (orother data storage techniques). Although the steps, operations, orcomputations may be presented in a specific order, this order may bechanged in different embodiments. In some embodiments, to the extentmultiple steps are shown as sequential in this specification, somecombination of such steps in alternative embodiments may be performed atthe same time. The sequence of operations described herein can beinterrupted, suspended, or otherwise controlled by another process, suchas an operating system, kernel, etc. The routines can operate in anoperating system environment or as stand-alone routines. Functions,routines, methods, steps and operations described herein can beperformed in hardware, software, firmware or any combination thereof.

Embodiments described herein can be implemented in the form of controllogic in software or hardware or a combination of both. The controllogic may be stored in an information storage medium, such as acomputer-readable medium, as a plurality of instructions adapted todirect an information processing device to perform a set of stepsdisclosed in the various embodiments. Based on the disclosure andteachings provided herein, a person of ordinary skill in the art willappreciate other ways and/or methods to implement the invention.

It is also within the spirit and scope of the invention to implement insoftware programming or code an of the steps, operations, methods,routines or portions thereof described herein, where such softwareprogramming or code can be stored in a computer-readable medium and canbe operated on by a processor to permit a computer to perform any of thesteps, operations, methods, routines or portions thereof describedherein. The invention may be implemented by using software programmingor code in one or more digital computers, by using application specificintegrated circuits, programmable logic devices, field programmable gatearrays, optical, chemical, biological, quantum or nanoengineeredsystems, components and mechanisms may be used. In general, thefunctions of the invention can be achieved by any means as is known inthe art. For example, distributed, or networked systems, components andcircuits can be used. In another example, communication or transfer (orotherwise moving from one place to another) of data may be wired,wireless, or by any other means.

A “computer-readable medium” may be any medium that can contain, store,communicate, propagate, or transport the program for use by or inconnection with the instruction execution system, apparatus, system ordevice. The computer readable medium can be, by way of example only butnot by limitation, an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system, apparatus, system, device,propagation medium, or computer memory. Such computer-readable mediumshall generally be machine readable and include software programming orcode that can be human readable (e.g., source code) or machine readable(e.g., object code). Examples of non-transitory computer-readable mediacan include random access memories, read-only memories, hard drives,data cartridges, magnetic tapes, floppy diskettes, flash memory drives,optical data storage devices, compact-disc read-only memories, and otherappropriate computer memories and data storage devices. In anillustrative embodiment, some or all of the software components mayreside on a single server computer or on any combination of separateserver computers. As one skilled in the art can appreciate, a computerprogram product implementing an embodiment disclosed herein may compriseone or more non-transitory computer readable media storing computerinstructions translatable by one or more processors in a computingenvironment.

A “processor” includes any, hardware system, mechanism or component thatprocesses data, signals or other information. A processor can include asystem with a central processing unit, multiple processing units,dedicated circuitry for achieving functionality, or other systems.Processing need not be limited to a geographic location, or havetemporal limitations. For example, a processor can perform its functionsin “real-time,” “offline,” in a “batch mode,” etc. Portions ofprocessing can be performed at different times and at differentlocations, by different (or the same) processing systems.

It will also be appreciated that one or more of the elements depicted inthe drawings/figures can also be implemented in a more separated orintegrated manner, or even removed or rendered as inoperable in certaincases, as is useful in accordance with a particular application.Additionally, any signal arrows in the drawings/figures should beconsidered only as exemplary, and not limiting, unless otherwisespecifically noted.

As used herein, the terms “comprises,” “comprising,” “includes,”“including,” “has,” “having,” or any other variation thereof, areintended to cover a non-exclusive inclusion. For example, a process,product, article, or apparatus that comprises a list of elements is notnecessarily limited only those elements but may include other elementsnot expressly listed or inherent to such process, product, article, orapparatus.

Furthermore, the term “or” as used herein is generally intended to mean“and/or” unless otherwise indicated. For example, a condition A or B issatisfied by any one of the following: A is true (or present) and B isfalse (or not present), A is false (or not present) and B is true (orpresent), and both A and B are true (or present). As used herein,including the claims that follow, a term preceded by “a” or “an” (and“the” when antecedent basis is “a” or “an”) includes both singular andplural of such term, unless clearly indicated within the claim otherwise(i.e., that the reference “a” or “an” clearly indicates only thesingular or only the plural). Also, as used in the description hereinand throughout the claims that follow, the meaning of “in” includes “in”and “on” unless the context clearly dictates otherwise. The scope of thepresent disclosure should be determined by the following claims andtheir legal equivalents.

What is claimed is:
 1. A method, comprising: receiving, by a computerhaving an index, an indexing request; determining, by the computer, whattype of command is in the indexing request; responsive to detecting thatthe indexing request contains a metadata indexing command, accessing, bythe computer, a list of metadata that need to be protected from change;determining, by the computer utilizing the list of metadata, whether themetadata indexing command applies to or affects any derived metadata inthe index that need to be protected from change; identifying, by thecomputer, any metadata field in the index corresponding to the derivedmetadata in the index that need to be protected from change; andapplying, by the computer, the metadata indexing command to the indexexcept the metadata field in the index corresponding to the derivedmetadata in the index so that the metadata field is not modified inresponse to the indexing request.
 2. The method according to claim 1,wherein determining whether the metadata indexing command applies to oraffects any derived metadata in the index that need to be protected fromchange comprises pattern matching metadata field names contained in thelist and in the index.
 3. The method according to claim 2, wherein thepattern matching is performed based on rules, including a rule thatspecifies a duration for preventing derived metadata in the index frombeing replaced, erased, or modified.
 4. The method according to claim 1,further comprising: generating the list of metadata from values storedin a configuration file.
 5. The method according to claim 1, wherein theindexing request contains a text indexing command, the metadata indexingcommand, or both.
 6. The method according to claim 1, wherein theindexing request contains an instruction to replace all metadata for anobject.
 7. The method according to claim 1, wherein the indexing requestcontain an instruction to add an object of a text type.
 8. A system,comprising: a processor; a non-transitory computer-readable medium; andinstructions stored on the non-transitory computer-readable medium andtranslatable by the processor for: receiving an indexing request;determining what type of command is in the indexing request; responsiveto detecting that the indexing request contains a metadata indexingcommand, accessing a list of metadata that need to be protected fromchange; determining, utilizing the list of metadata, whether themetadata indexing command applies to or affects any derived metadata inan index that need to be protected from change; identifying any metadatafield in the index corresponding to the derived metadata in the indexthat need to be protected from change; and applying the metadataindexing command to the index except the metadata field in the indexcorresponding to the derived metadata in the index so that the metadatafield is not modified in response to the indexing request.
 9. The systemof claim 8, wherein determining whether the metadata indexing commandapplies to or affects any derived metadata in the index that need to beprotected from change comprises pattern matching metadata field namescontained in the list and in the index.
 10. The system of claim 9,wherein the pattern matching is performed based on rules, including arule that specifies a duration for preventing derived metadata in theindex from being replaced, erased, or modified.
 11. The system of claim8, wherein the instructions are further translatable by the processorfor: generating the list of metadata from values stored in aconfiguration file.
 12. The system of claim 8, wherein the indexingrequest contains a text indexing command, the metadata indexing command,or both.
 13. The system of claim 8, wherein the indexing requestcontains an instruction to replace all metadata for an object.
 14. Thesystem of claim 8, wherein the indexing request contain an instructionto add an object of a text type.
 15. A computer program productcomprising a non-transitory computer-readable medium storinginstructions translatable by a processor for: receiving an indexingrequest; determining what type of command is in the indexing request;responsive to detecting that the indexing request contains a metadataindexing command, accessing a list of metadata that need to be protectedfrom change; determining, utilizing the list of metadata, whether themetadata indexing command applies to or affects any derived metadata inan index that need to be protected from change; identifying any metadatafield in the index corresponding to the derived metadata in the indexthat need to be protected from change; and applying the metadataindexing command to the index except the metadata field in the indexcorresponding to the derived metadata in the index so that the metadatafield is not modified in response to the indexing request.
 16. Thecomputer program product of claim 15, wherein determining whether themetadata indexing command applies to or affects any derived metadata inthe index that need to be protected from change comprises patternmatching metadata field names contained in the list and in the index.17. The computer program product of claim 16, wherein the patternmatching is performed based on rules, including a rule that specifies aduration for preventing derived metadata in the index from beingreplaced, erased, or modified.
 18. The computer program product of claim15, wherein the instructions are further translatable by the processorfor: generating the list of metadata from values stored in aconfiguration file.
 19. The computer program product of claim 15,wherein the indexing request contains a text indexing command, themetadata indexing command, or both.
 20. The computer program product ofclaim 15, wherein the indexing request contains an instruction toreplace all metadata for an object or an instruction to add an object ofa text type.