SYSTEMS AND METHODS FOR TESTING ONLINE SYSTEMS AND CONTENT
First Claim
1. A computer-implemented method, comprising:
- instructing, with at least one processor, the execution of an operation on content associated with at least one web page, the operation comprising at least one of (i) a scanning operation that generates forensic data corresponding to the web page or (ii) an analytical operation that analyzes at least a portion of the forensic data corresponding to the web page;
obtaining output data associated with the executed operation; and
generating, with the at least one processor, information indicating whether there is a compliance of the at least one web page with at least one of a privacy regulation or a security regulation, the information being generated based on the obtained output data.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for automatically monitoring a compliance of web pages and graphical user interfaces with governmental and self-regulatory privacy and security policies. In accordance with one implementation, a method is provided that comprises instructing the execution of an operation on content associated with at least one web page is generated. The operation may include at least one of (i) a scanning operation that generates forensic data corresponding to the web page or (ii) an analytical operation that analyzes at least a portion of the forensic data corresponding to the web page. The method further comprises obtaining output data associated with the executed operation, and generating information indicative of a compliance of the web page with at least one of a privacy regulation or a security regulation, the information being generated based on the output data.
-
Citations
26 Claims
-
1. A computer-implemented method, comprising:
-
instructing, with at least one processor, the execution of an operation on content associated with at least one web page, the operation comprising at least one of (i) a scanning operation that generates forensic data corresponding to the web page or (ii) an analytical operation that analyzes at least a portion of the forensic data corresponding to the web page; obtaining output data associated with the executed operation; and generating, with the at least one processor, information indicating whether there is a compliance of the at least one web page with at least one of a privacy regulation or a security regulation, the information being generated based on the obtained output data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method, comprising:
-
obtaining forensic data associated with at least one web page; performing, with at least one processor, an analytical operation on the forensic data, the analytical operation comprising at least one of an operation performed on a hyperlink within the forensic data, an operation performed on an image call within the forensic data, an operation applied to a locally-stored object within the forensic data, or an operation applied to an image of the web page, a page object, or a request within the forensic data; and generating, with the at least one processor, output data associated with the analytical operation, the output data being indicative of a compliance of the web page with at least one of a privacy regulation or a security regulation.
-
-
18. A computer-implemented method, comprising:
-
performing, with at least one processor, a scanning operation on at least one web page; obtaining, in response to the performing the scanning operation, forensic data indicative of a compliance of the web page with at least one of a privacy regulation or a security regulation; and generating, with at least one processor, an instruction to store at least a portion of the forensic data in a repository. - View Dependent Claims (19)
-
-
20. An apparatus, comprising:
-
a storage device; and at least one processor coupled to the storage device, wherein the storage device stores a program for controlling the at least one processor, and wherein the at least one processor, being operative with the program, is configured to; instruct the execution of an operation on content associated with at least one web page, the operation comprising at least one of (i) a scanning operation that generates forensic data corresponding to the web page or (ii) an analytical operation that analyzes at least a portion of the forensic data corresponding to the web page; obtain output data associated with the executed operation; and generate information indicative of a compliance of the web page with at least one of a privacy regulation or a security regulation, the information being generated based on the output data. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A tangible, non-transitory computer-readable medium storing instructions that, when executed by at least one processor, perform a method comprising the steps of:
-
instructing the execution of an operation on content associated with at least one web page, the operation comprising at least one of (i) a scanning operation that generates forensic data corresponding to the web page or (ii) an analytical operation that analyzes at least a portion of the forensic data corresponding to the web page; obtaining output data associated with the executed operation; and generating information indicative of a compliance of the web page with at least one of a privacy regulation or a security regulation, the information being generated based on the output data.
-
Specification