METHOD AND SYSTEM FOR RESTORING WEBSITES
First Claim
1. A method for restoring a website in the event of a hack or a defacement, the website comprising at least one webpage having at least one functional element, the method comprising the steps of:
- copying the at least one webpage of the website with the at least one functional element to create a replicated website on a restorer server, the at least one functional element of the replicated website capable of accepting user input to trigger an event;
creating at the restorer server, a secure website replica from the replicated website by deactivating the at least one functional element such that the secure website replica is incapable of accepting user input to trigger the event; and
presenting the secure website replica in place of the website once the hack or the defacement of the website has been detected.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for restoring a website in the event of a hack or defacement is disclosed. The method comprises the step of copying the at least one webpage of the website with at least one functional element to create a replicated website on a restorer server, the at least one functional element of the replicated website capable of accepting user input to trigger an event. The method further comprises the steps of creating at the restorer server, a secure website replica from the replicated website by deactivating the at least one functional element such that the secure website replica is incapable of accepting user input to trigger the event, and presenting the secure website replica in place of the website once the hack or the defacement of the website has been detected.
-
Citations
29 Claims
-
1. A method for restoring a website in the event of a hack or a defacement, the website comprising at least one webpage having at least one functional element, the method comprising the steps of:
-
copying the at least one webpage of the website with the at least one functional element to create a replicated website on a restorer server, the at least one functional element of the replicated website capable of accepting user input to trigger an event; creating at the restorer server, a secure website replica from the replicated website by deactivating the at least one functional element such that the secure website replica is incapable of accepting user input to trigger the event; and presenting the secure website replica in place of the website once the hack or the defacement of the website has been detected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for restoring a website in the event of a hack or a defacement, the website comprising at least one webpage having at least one functional element, the system comprising a restorer server, the restorer server configured to:
-
copy the at least one webpage of the website with the at least one functional element to create a replicated website on the restorer server, the at least one functional element of the replicated website capable of accepting user input to trigger an event; create a secure website replica from the replicated website by deactivating the at least one functional element such that the secure website replica is incapable of accepting user input to trigger the event; and present the secure website replica in place of the website once the hack or the defacement of the website has been detected. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program product for restoring a website in the event of a hack or a defacement, the website comprising at least one webpage having at least one functional element, the computer program product having a computer readable storage medium having computer readable program code configured to:
-
copy the at least one webpage of the website with the at least one functional element to create a replicated website, the at least one functional element of the replicated website capable of accepting user input to trigger an event; create a secure website replica from the replicated website by deactivating the at least one functional element such that the secure website replica is incapable of accepting user input to trigger the event; and present the secure website replica in place of the website once the hack or the defacement of the website has been detected.
-
Specification