Selectively protecting valid links to pages of a web site
First Claim
1. A method comprising:
- intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link;
determining that the first link references a first target page;
determining that the first target page is protected;
in response to determining the first target page is protected, generating a first decoy link that corresponds to the first link;
wherein the first decoy link includes data that references a first decoy page and not the first target page, wherein the first decoy page includes false information;
rendering a second set of instructions define the first decoy link, wherein the second set of instructions are configured to cause a first client computer to hide the first decoy link from the user interface;
sending the second set of instructions to the first client computer;
wherein the method is performed by one or more computing devices.
2 Assignments
0 Petitions
Accused Products
Abstract
In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first decoy link that corresponds to the first link, wherein the first decoy link includes data that references a first decoy page which includes false information; rendering a second set of instructions that defines the first decoy link, wherein the second set of instructions is configured to cause a first client computer to hide the first decoy link from the user interface; sending the second set of instructions to the first client computer.
-
Citations
18 Claims
-
1. A method comprising:
-
intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link references a first target page; determining that the first target page is protected; in response to determining the first target page is protected, generating a first decoy link that corresponds to the first link; wherein the first decoy link includes data that references a first decoy page and not the first target page, wherein the first decoy page includes false information; rendering a second set of instructions define the first decoy link, wherein the second set of instructions are configured to cause a first client computer to hide the first decoy link from the user interface; sending the second set of instructions to the first client computer; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system comprising:
-
a processor; a memory; a processing module configured to; intercept, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determine that the first link references a first target page; determine that the first target page is protected; in response to determining the first target page is protected, generate a first decoy link that corresponds to the first link; wherein the first decoy link includes data that references a first decoy page and not the first target page, wherein the first decoy page includes false information; render a second set of instructions define the first decoy link, wherein the second set of instructions are configured to cause a first client computer to hide the first decoy link from the user interface; send the second set of instructions to the first client computer. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification