VeriSign, Inc. Patent applications |
Patent application number | Title | Published |
20150295882 | COMPUTER-IMPLEMENTED METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR PROCESSING NAMED ENTITY QUERIES USING A CACHED FUNCTIONALITY IN A DOMAIN NAME SYSTEM - The present disclosure relates to a computer-implemented method for responding to a query request from a requestor using information supplied by an authoritative name server. The computer-implemented method can include obtaining, by a DNS resolution server, a query for a named resource from a requestor, wherein the query comprises information comprising contextual information related to the requestor. The method can obtain at least a portion of a zone file of a domain name space using the domain name system (DNS), one or more rules, and information on how to access information that is not local to the DNS resolution server from the authoritative name server based on the query obtained from the requestor. An answer can then be provided to the query from requester based on the at least a portion of the zone file, the one or more rules, and the contextual information. | 10-15-2015 |
20150278188 | INPUT STRING MATCHING FOR DOMAIN NAMES - A plurality of input string n-grams may be generated by accessing an input string and generating a Universal character set transformation format (UTF) encoded input string from the input string. The UTF encoded input string may be parsed via an n-gram parser to generate a plurality of input string n-grams, where a length of each of the input string n-grams is larger than a lower bound and smaller than an upper bound. The generated plurality of input string n-grams may be provided to determine matches between the input string and a domain. | 10-01-2015 |
20150269646 | N-GRAM COMBINATION DETERMINATION BASED ON PRONOUNCEABILITY - Alternative keyword inputs may be generated based on an input keyword input. Multiple n-grams may be determined from the input keyword input. Combinations of n-grams may be generated. Pronounceability of the combinations may be determined. Combinations of n-grams with pronounceability that exceed a predetermined threshold may be provided. | 09-24-2015 |
20150249640 | DOMAIN NAME VARIANT GENERATION - Domain name variants may be generated and/or displayed by accessing historical domain name information and identifying, based on the accessed historical domain name information a set of swap options. The swap options may include one or more graphemes. Variants of a domain names may be determined based on the identified set of swap options. | 09-03-2015 |
20150227581 | SYSTEMS AND METHODS FOR ANALYZING REGISTRAR AND HOSTING PROVIDER RELATIONSHIPS - Implementations of the present teachings relate to processes and systems for analyzing registrar and hosting provider relationships. In embodiments, the processes include compiling a list of domain names and matching each domain name with a registrar name and a hosting provider name. The processes also include generating a graph based on relationships between registrars and hosting providers. For example, the graph can represent the registrars and hosting providers as nodes and edges connecting the nodes can correspond to domain names that are registered by the registrar and hosted by the hosting provider. Further, the processes include applying graph metrics to the graph to identify key characteristics of a domain market. | 08-13-2015 |
20150100680 | SYSTEMS AND METHODS FOR CONFIGURING A PROBE SERVER NETWORK USING A RELIABILITY MODEL - Implementations relate to systems and methods for configuring a probe server network using a reliability model. A company, customer, or organization may wish to outsource the management of a set of name servers used to operate a domain name, such as a domain name associated with a Web site. In aspects, that deployment of name servers can be monitored by a separate set of failover or probe servers which are configured to track the uptime, operability, and performance of the underlying name servers, which can number in the thousands. An administrator or other user may wish to determine a minimum number of probe servers to apply to the name server topology, to achieve desired service levels. According to aspects, automated tools and logic are provided which model and simulate the overall network including the number and arrangement of necessary probe servers to ensure performance, failover reliability, and other factors. | 04-09-2015 |
20150058139 | EXISTENT DOMAIN NAME DNS TRAFFIC CAPTURE AND ANALYSIS - Systems and methods for scoring a domain web traffic based on DNS traffic requests received at an authoritative name server to resolve the domain name. A request to resolve the domain name is received at an authoritative name server. A counter, such as a server counter or a hit counter, for the domain name is incremented based on the received request. A score, such as a domain traffic score or a domain rank, is calculated based upon a count of the counter. Calculating the score may also include applying a weighting factor to the counters based on information about a requesting set of resolvers and other domains/websites that may be linking and driving traffic to the domain whose traffic score is being calculated. Examples of relevant set of resolvers information may include location, traffic levels, traffic type and architecture of the set of resolvers. | 02-26-2015 |
20140337460 | SYSTEMS, DEVICES, AND METHODS FOR PROTECTING ACCESS PRIVACY OF CACHED CONTENT - Embodiments relate to systems, devices, and computer-implemented methods for preventing determination of previous access of sensitive content by receiving, from a user, a request for content at a device in an information centric network, where a cached version of the content is locally stored at the device; initiating a time delay based on a determination that the user has not previously requested the content; and transmitting the cached version of the content to the user after the time delay. | 11-13-2014 |
20140282847 | SYSTEMS AND METHODS FOR PRE-SIGNING OF DNSSEC ENABLED ZONES INTO RECORD SETS - Implementations relate to systems and methods for pre-signing of DNSSEC enabled zones into record sets. A domain name system (DNS) can receive and/or impose a set of DNS policies desired by an administrator, or the DNS operator itself to govern domain name resolution with security extensions (DNSSEC) for a Web domain. The DNS can generate a set of answers to user questions directed to the domain based on the set of policies. Those answers which differ or vary based on policy rules can be stored as variant answers, and can be labeled with a variant ID. The variant answers can be pre-signed and stored in the DNS. Because key data and other information is generated and stored before a DNS request is received, the requested variant answer can be returned with greater responsiveness and security. | 09-18-2014 |
20140280916 | RECONCILING INTERNET DNS ZONE FILE CHANGES WITH ORIGIN CHANGE REQUESTS - Techniques for monitoring zone file changes are presented. The techniques may include obtaining at least one zone change request and parsing the at least one zone change request to obtain at least one change request unit. The techniques may include obtaining a last published zone file, obtaining a new zone file, and comparing the last published zone file to the new zone file to obtain at least one difference object. The techniques may include matching the at least one difference object to the at least one change request unit to identify at least one unmatched difference object. The techniques may include providing a human readable report comprising an indication of the at least one unmatched difference object. | 09-18-2014 |
20140280849 | SYSTEMS AND METHODS FOR MULTI-TENANT GENERIC TOP LEVEL DOMAIN DEPLOYMENT - A computer implemented method of providing registry services is disclosed. The method includes identifying one or more top level domains to be serviced; creating, by a processor, a TLD group for the one or more top level domains, wherein top level domains in the TLD group share at least one characteristic; provisioning the one or more top level domains; and registering the one or more top level domains with the TLD group. | 09-18-2014 |
20140280305 | HIGH PERFORMANCE DNS TRAFFIC MANAGEMENT - The present disclosure provides systems, methods, and products for high performance implementation of traffic management rules. In various embodiments, traffic management rules, such as DNS traffic management rules, are functionally expressed as rows in one or more lookup tables that are deployed to DNS resolution servers. The DNS resolution server uses the domain name, resource record type, traffic management rule types, and/or traffic management variable values to search for or look up an answer, from among multiple answers corresponding to the domain name and resource record type that meets the traffic management criteria. This look up is done without executing conventional traffic management code or scripts. | 09-18-2014 |
20140250506 | CONTROL AND MANAGEMENT OF ELECTRONIC MESSAGING - A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine its desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee. | 09-04-2014 |
20140156702 | SMART NAVIGATION SERVICES - Techniques for smart navigation are presented. The techniques can include receiving, at a navigation service and via the internet, a request for a network resource, where the request includes command data provided by a navigation client, and where the command data includes an entity name and a keyword. The techniques can include obtaining, from at least one database of the navigation service, a network locator corresponding to the entity name and the keyword. The techniques can further include providing, in response to the receiving and via the internet, the network locator. | 06-05-2014 |
20140143381 | RECOVERY OF A FAILED REGISTRY - A system, method, and computer-readable medium, is described that enables a registry recovery service to retrieve zone files from a target registry, archive the zone files, publish the zone files to a managed DNS server, reconcile ownership of the zone files, and publish the zone files to a provisioning DNS server. The registry recovery service may also implement a WHOIS server for the zone and ownership information and may also implement zone specific features particular to the target registry's TLD. The registry recovery service may also enable DNSSEC extensions on the recovered registry DNS services. | 05-22-2014 |
20140140491 | SYSTEM AND METHOD FOR PROVIDING HIGH RELIABILITY NETWORK - A system and method for providing a high reliability network. Context servers store information about calls in a telecommunications system. Network control elements can obtain call information from the context servers to help make call control and reporting decisions. | 05-22-2014 |
20140122476 | PRIVACY PRESERVING DATA QUERYING - A method, system, and computer-readable memory containing instructions include employing a tokenizing authority to obtain a tokenized query term that represents a query term, using the tokenized query term to perform a lookup against a tokenized term database, determining whether the tokenized query term exists in the database. The method, system, and computer-readable memory may further include returning an encryption or decryption key corresponding to an encrypted record of information associated with the query term and corresponding to the tokenized query term. | 05-01-2014 |
20140115669 | INTEGRATED USER CHALLENGE PRESENTATION FOR DDOS MITIGATION SERVICE - Systems and methods are disclosed for providing distributed denial-of-service (DDoS) mitigation service. The systems and methods may receive a request to access a web server from a user host, generate an integrated user challenge page including a user challenge test and a web page image of the web server, and transmits the integrated user challenge page to the user host. The systems and methods may further receive an answer to the user challenge test from the user host, determine whether the answer to the user challenge test is correct or not. When the answer to the user challenge test is correct, the systems and methods may establish a connection between the user host and the web server. | 04-24-2014 |
20140108452 | SYSTEM AND METHOD FOR PROCESSING DNS QUERIES - Embodiments of the present invention provide a method and system for high-speed database searching with concurrent updating, without the use of database locks or access controls, for large database systems. Specifically, a plurality of search queries may be received over a network, the database may be searched, and a plurality of search replies may be sent over the network. While searching the database, new information received over the network may be incorporated into the database by creating a new element based on the new information and writing a pointer to the new element to the database using a single uninterruptible operation. | 04-17-2014 |
20140100845 | AUTOMATED LANGUAGE DETECTION FOR DOMAIN NAMES - Methods and systems for automated language detection for domain names are disclosed. In some embodiments, a method for detecting a language of an Internationalized Domain Name (IDN) comprises receiving, by an I/O interface, a string of characters for the IDN; receiving training data, including a plurality of multi-gram analyses for a set of languages; analyzing, by a processor, the string of characters based on the training data, wherein the analyzing includes extracting a set of multi-grams from the string of characters and comparing the extracted set of multi-grams with the training data; detecting the language of the IDN based on results of the analyzing. In some embodiments, the method further comprises comparing the detected language of the IDN with a user selected language and using the IDN to generate a domain name, if the comparing indicates that the detected language of the IDN is consistent with the user selected language. | 04-10-2014 |
20140096194 | CLIENT-SIDE ACTIVE VALIDATION FOR MITIGATING DDOS ATTACKS - Methods and systems for mitigating denial-of-service attacks include a proxy server that monitors a set of application servers configured to receive and service requests from clients. The proxy server intercepts the requests, and in response, provides the clients with customized client-side scripts embedded in markup language. The client-side scripts may include random strings to generate follow-through random uniform resource identifier redirection requests expected by the proxy server. The client-side scripts, upon execution, may challenge the clients by demanding user interaction within a specified period of time, requesting a delay before responding, and/or attempting to set a challenge cookie multiple times. If a client provides the demanded user interaction within the specified time, honors the delay, and/or sets the challenge cookie with the correct value, then the client-side scripts may generate a redirection request expected by the proxy server for that client and the proxy servers may whitelist that client for a configurable duration and forward that client's subsequent requests to the application servers without challenge. | 04-03-2014 |
20140074772 | METHOD AND SYSTEM FOR AUDITING TRANSACTION DATA FROM DATABASE OPERATIONS - A method for validating SRS registry transaction data includes receiving OLTP transaction data from a first database, parsing the OLTP transaction data, and comparing the parsed OLTP transaction data to one or more of a set of profiles. Each of the one or more of the set of profiles includes metadata in XML files. The method also includes caching the parsed OLTP transaction data in a first data cache, receiving log data associated with the OLTP transaction data; and caching the log data in a second data cache. The method further includes correlating the parsed transaction data cached in the first data cache with the log data cached in the second data cache. | 03-13-2014 |
20140052747 | TEST AUTOMATION TOOL FOR DOMAIN REGISTRATION SYSTEMS - The present subject matter is directed to systems and methods for automating the testing of multi-function systems, such as naming registration systems and the like. A method of testing a registry, and the like, may include providing a command phrase including an add command and at least one function that includes an artificial attribute for a domain added by the add command. The command phrase may specify an operation, a protocol, and an object. The operation may include at least one of add, delete, or update domain. The protocol may include at least one of RRP and EPP. One or more parameters associated with the command phrase may be provided and may include an expected response code and/or a variable. One or more additional parameters that are associated with the command phrase may be determined and a database may be accessed to provide the one or more additional parameters. The command phrase, the one or more additional parameters, and/or the one or more additional parameters may be translated into an XML command and the XML command transmitted to the registry, or the like. A response from the registry may be evaluated to determine potential problems with database. | 02-20-2014 |
20140047104 | Systems and Methods for Load Balancing Using Predictive Routing - Systems and methods are disclosed for routing requests for information based on predictive data. The systems and methods may receive measurement data indicative of states of each of a plurality of destination servers, and generate predicted measurement data values for each of the plurality of destination servers based on the retrieved measurement data. The predicted measurement data values may represent predicted states of each of the destination servers at a time later than a time corresponding to the received measurement data. The systems and methods may also receive requests for information from a client computer, and route the received requests for information to one of the plurality of destination servers based on the predicted measurement data value. | 02-13-2014 |
20140026186 | WHITE LISTING DNS TOP-TALKERS - Systems and methods for creating a list of trustworthy resolvers in a domain name system. A computer receives a resolver profile for a resolver sending queries to a domain name server. The resolver profile is based on any, or a combination, of a top-talker status of the resolver, a normalcy of distribution of domain names queried, a continuity of distribution of query type, and a RD bit status, and information related to query traffic based on the topology of the domain name server. Resolver profiles can be compared to a trust policy to determine whether the resolver is trustworthy. Resolvers deemed trustworthy can be added to a list of trustworthy resolvers. Embodiments can detect the occurrence of a network-based attack. Embodiments can mitigate the effect of a network-based attack by responding only to queries from resolvers on the list of trustworthy resolvers. | 01-23-2014 |
20140019601 | SYSTEM AND METHOD FOR ADDING A WHITELIST ENTRY VIA DNS - A method for adding a blacklisted site to a whitelist includes requesting a blacklisted site via a network, the blacklisted site having a domain name of the format . The method includes generating queries for an encoded domain, the encoded domain being of the format ..., sending the queries to a recursive DNS server, and sending responses based on the queries to a cache of a web browser. The method includes requesting by the web browser the blacklisted site, adding the blacklisted site to the whitelist, sending an IP address corresponding to the blacklisted site to the web browsers, and accessing the blacklisted site. | 01-16-2014 |
20140006642 | SYSTEMS AND METHODS FOR AUTOMATICALLY PROVIDING WHOIS SERVICE TO TOP LEVEL DOMAINS | 01-02-2014 |
20140006641 | SECONDARY SERVICE UPDATES INTO DNS SYSTEM | 01-02-2014 |
20130346746 | SYSTEMS AND METHODS FOR GENERATING AND USING MULTIPLE PRE-SIGNED CRYPTOGRAPHIC RESPONSES - Systems and methods are disclosed for generating and using multiple pre-signed cryptographic responses. In one implementation, the method includes generating multiple cryptographic datasets. Each cryptographic dataset has a different validity period. The method further includes upon a user request, identifying one or more cryptographic datasets that are still valid among the multiple cryptographic datasets. The method further includes identifying a cryptographic dataset having the shortest validity period among the one or more cryptographic datasets that are still valid. The method also includes providing the identified cryptographic dataset to the user. | 12-26-2013 |
20130332109 | METHODS AND SYSTEMS FOR STATISTICAL ABERRANT BEHAVIOR DETECTION OF TIME-SERIES DATA - Methods and systems for detecting aberrant behavior in time-series observation data, such as non-existent domain data, are disclosed. The methods and systems analyze the time-series observation data to determine time-series prediction data. The time-series observation data and time-series prediction data are used to determine a threshold that is based on the standard deviation of deviation values between the time-series observation data and time-series prediction data. The threshold may be used to detect aberrant behavior in subsequently obtained time-series observation data. | 12-12-2013 |
20130311655 | SYSTEMS AND METHODS FOR COLLECTING AND STORING NETWORK TRAFFIC DATA - Systems and methods are disclosed for collecting network traffic logs at a plurality of network sites, such as DNS name servers and network routers, and transmitting data extracted from the network traffic logs to a central repository. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to retrieve PCAP files from a plurality of servers and extract data from the PCAP files. The data comprises header data and digest data. The processor stores the header data and the digest data in a header/digest pair. In another aspect, the processor retrieves a sample of the PCAP files from each of the plurality of servers rather than retrieving all PCAP files. | 11-21-2013 |
20130290269 | BULK MANAGEMENT OF REGISTRY OBJECTS - A system and method for modifying a bulk set of domain names through bulk operations. A request to modify a bulk set of data associated with domain names is received by a registry. A bulk processing engine associated with the registry can analyze the requested update job, and enforce compliance with a set of policies governing the operation of registry. A priority level can also be assigned to the requested job, so that it will be executed before or after other pending jobs. The user can likewise provide user-supplied policies, which can also be validated against the set of registry policies. Data faults can be reduced or eliminated, and update operations can be performed by comparatively inexperienced personnel. | 10-31-2013 |
20130275613 | EFFICIENT MULTIPLE FILTER PACKET STATISTICS GENERATION - Incoming data streams are managed by receiving a data stream on at least one network interface card (NIC) and performing operations on the data stream using a first process running several first threads for each network interface card and at least one group of second multiple processes each with an optional group o second threads. The first process and the one or more groups of second multiple processes are independent and communicate via the shared memory. The first threads for each network interface card are different than the group of second threads. The system includes at least one network interface card that receives a data stream, a first processor that runs a first process that uses a plurality of first threads for each network interface card and a second processor that runs at least one group of second multiple processes each with art optional group of second threads. | 10-17-2013 |
20130268649 | PROCESS FOR SELECTING AN AUTHORITATIVE NAME SERVER - Methods and systems for intelligently choosing an authoritative name server from among a group of name servers for resolving Domain Name System requests. Systems and methods are provided that enable choosing of a first server associated with and/or operated by a first service provider based on a first measurement associated with that first server. The systems and methods further comprise requesting first data from that first server, determining that the first server is unresponsive, and choosing a second server. The second server is chosen based on a second measurement, and chosen contingent on it being associated with and/or operated by to a different service provider than that associated with the first server. The systems and methods then comprise requesting second data from the second server. | 10-10-2013 |
20130226899 | METHOD AND SYSTEM FOR TRIGGERING WEB CRAWLING BASED ON REGISTRY DATA - A method of triggering crawling of a domain includes receiving information related to a domain from a registrar and processing the information related to the domain. The method also includes storing the processed information in a registry zone file and forming a list of registry data based on the processed information. The list of registry data comprises a subset of the registry zone file. The method farther includes crawling one or more of the domains in the list of registry data. | 08-29-2013 |
20130219477 | TRANSPARENT CLIENT AUTHENTICATION - A system and method for authenticating an application (client) to a server or service. During a registration phase, an application that requests access to a service can receive a service identifier, which it can authenticate. The application can generate and send to the server or service an application-service key that is based upon the authenticated service identifier and a secret application key; a service-application identifier that can be based upon the authenticated service identifier and an application identifier; and a registration nonce, all of which can be stored at the server. During the authentication phase, the client can send to the server the application-service identifier, which the server can use to lookup the stored registration data. The server can send the registration nonce to the client, which can compute a proof of possession of the service-application key and send to the server. The server can compute its own version of this key and compare it to the received key. If they correspond, then the client is authenticated. | 08-22-2013 |
20130204415 | SYSTEMS AND METHODS FOR USING SIGNAL-DERIVED SEGMENTED IDENTIFIERS TO MANAGE RESOURCE CONTENTION AND CONTROL ACCESS TO DATA AND FUNCTIONS - Systems and methods are provided for using a hidden audio signal. In one exemplary embodiment, the method includes receiving, by a user device, media associated with at least one identifier. The identifier includes at least one identifier segment associated with at least one channel identifier. The method further includes causing the at least one identifier to be decoded, and sending a request including the at least one identifier to a resolution provider. In addition, the method include receiving information from the resolution provider, where the information is associated with the at least one identifier. Additionally, the method includes identifying, by the user device, at least one application operating on the user device that is authorized to receive the information associated with the at least one identifier, based on at least one of the content of the identifier or the channel identifier, and delivering the information to the at least one application that is identified. | 08-08-2013 |
20130198803 | WHITE LISTING DNS TOP-TALKERS - Systems and methods for creating a list of trustworthy resolvers in a domain name system. A computer receives a resolver profile for a resolver sending queries to a domain name server. The resolver profile is based on any, or a combination, of a top-talker status of the resolver, a normalcy of distribution of domain names queried, a continuity of distribution of query type, and a RD bit status, and information related to query traffic based on the topology of the domain name server. Resolver profiles can be compared to a trust policy to determine whether the resolver is trustworthy. Resolvers deemed trustworthy can be added to a list of trustworthy resolvers. Embodiments can detect the occurrence of a network-based attack. Embodiments can mitigate the effect of a network-based attack by responding only to queries from resolvers on the list of trustworthy resolvers. | 08-01-2013 |
20130198410 | METHOD AND SYSTEM FOR INTELLIGENT ROUTING OF REQUESTS OVER EPP - Method and system for routing EPP requests over a network are provided. The EPP request can include XML namespace information and optionally XML sub-product information. A gateway can receive the request and analyze the namespace and in some instances, sub-product information to determine the service to which the request is directed. Thereupon, the gateway can route the request to the appropriate service by consulting a routing table that can have status and connectivity information for all the available services. | 08-01-2013 |
20130198065 | ADAPTIVE NAME RESOLUTION - A method, system, and computer-readable memory containing instructions include receiving a DNS request containing information related to user-specific information, device-specific information, and/or authentication information, analyzing the information, determining an appropriate action to take based on analyzing the status, and taking the appropriate action. Actions may include responding with an individualized network layer address or service location address, delaying sending a response message, sending a network layer address or service location address corresponding to a site containing authentication information, and sending a response with a network layer address or service location address with a web address configured to mimic the website related to the requested resource. | 08-01-2013 |
20130174254 | METHOD FOR ADMINISTERING A TOP-LEVEL DOMAIN - A method for administering a top-level domain by analyzing domain name registrations for requests for suspicious or malicious domain names. A request to register a domain name is received. The requested domain name's information may be stored in a registry database. The requested domain name may also be conditionally stored in the domain name system (DNS) zone. The requested domain name is compared to a list of botnet domain names stored in a watch list database. If the requested domain name corresponds to one of the botnet domain names, the requested domain name is prevented from being added to the DNS zone or is removed from the DNS zone, if it has already been stored there. The information regarding the requested domain name is stored in the registry database, even if the domain name does not ultimately stay in the DNS zone. | 07-04-2013 |
20130174253 | SYSTEMS AND METHODS FOR DETECTING SIMILARITIES IN NETWORK TRAFFIC - A system, computer-readable medium, and method for identifying similarities in network traffic are provided. Hash values are calculated from Internet Protocol (IP) addresses in a group of IP addresses that request a domain name, a hash signature is generated from the hash values and paired with the domain name, and the domain name is then clustered with another domain name having a paired hash of the same value. The clustered domain names are then extracted and used in a similarity calculation. | 07-04-2013 |
20130174125 | TEST AUTOMATION ENVIRONMENT - Systems and methods are disclosed for integrating JAVA objects, such as handlers, into a scripting language to be used as part of a test automation environment including a test automation tool. The environment can access and execute one or more script files coded using diverse scripting languages designed to exercise and test DNS servers, registries, and/or other network entities. The test automation tool can invoke a set of generalized handlers that may comprise compiled JAVA objects configured to perform specific testing functions. The test automation tool may load a script for a test case and a scripting language, establish a controller, and interface the script to the intermediate JAVA handlers to abstract individual script files for use in a more universal fashion, avoiding incompatibilities that can arise between various script languages. | 07-04-2013 |
20130173825 | PROVIDING PRIVACY ENHANCED RESOLUTION SYSTEM IN THE DOMAIN NAME SYSTEM - An apparatus and a non-transitory computer-readable medium may perform a method of minimizing the disclosure of a domain name contained in a DNS query. The method may include: determining a first label and a second label associated with a domain name included in a DNS query; querying a first nameserver for the first label without revealing the second label to the first nameserver; receiving a response from the first nameserver directing a resolver to a second nameserver; and querying the second nameserver for the first label and the second label. | 07-04-2013 |
20130173795 | DNS Package in a Partitioned Network - A Domain Name System (“DNS”) package and a method for providing domain name resolution services in a partitioned network are disclosed. The system may include one or more built-in root name servers; one or more built-in top level domain (“TLD”) name servers; and a recursive name server. The recursive name server may be configured to query the one or more built-in root name servers during domain name resolution. Moreover, the one or more built-in root name servers may be configured to provide a network address corresponding to one of the built-in TLD name servers in response to a domain name resolution query sent by the recursive name server. | 07-04-2013 |
20130173701 | IMAGE, AUDIO, AND METADATA INPUTS FOR NAME SUGGESTION - A system, method, and computer-readable medium, is described that implements a domain name registration suggestion tool that receives one or more inputs, extracts information from the inputs into a submission string, submits the submission string to a domain name suggestion tool, and receives domain name suggestions based on the submission string. Inputs types may include images, audio clips, and metadata. The inputs sources may be processed to extract information related to the image source to build the submission string. | 07-04-2013 |
20130173497 | METHODS AND SYSTEMS FOR CREATING NEW DOMAINS - Systems and methods for creating a new domain, such as a top-level domain or a second-level domain, make use of a Domain Manager that enables a user to enter data that is necessary or optional to implement the creation of a new domain. Systems such as, for example, a Registry and one or more Registrars, may use the data defined by the Domain Manager to create a new domain. | 07-04-2013 |
20130170752 | IMAGE, AUDIO, AND METADATA INPUTS FOR KEYWORD RESOURCE NAVIGATION LINKS - A system, method, and computer-readable medium, is described that implements a resource navigation links tool that receives one or more inputs, extracts information from the inputs into a submission string, submits the submission string to a resource navigation links tool, and receives resource navigation links based on the submission string. Inputs types may include images, audio clips, and metadata. The inputs sources may be processed to extract information related to the image source to build the submission string. | 07-04-2013 |
20130166571 | EVALUATING TYPEABILITY OF DOMAIN NAMES - Methods and systems are disclosed for assessing an identifier. The method comprises receiving, via an interface, a string of characters making up the identifier and determining a keyboard type for a keyboard. The method further comprises calculating, by a calculator module, a typeability score for the identifier based on the string of characters and the keyboard type, wherein the typeability score signifies a difficulty of typing the identifier on the determined keyboard type. In certain embodiments, the method further comprises determining a finger positioning corresponding to a position of a typer's fingers on the keyboard, and the typeability score is further based on the finger positioning. In some embodiments, the finger positioning is based on the typer's typing habits. | 06-27-2013 |
20130151496 | SYSTEMS AND METHODS FOR CREATING AND USING KEYWORD NAVIGATION ON THE INTERNET - Systems and methods are disclosed for using keywords to navigate to web pages on the Internet. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to receive a search string from a website, the search string being entered by a website visitor using a browser. The processor uses a database to locate a keyword associated with the website that matches the search string. The processor determines a web page address associated with the keyword and causes the browser to be directed to the web page address. In another aspect, a method for managing keywords used for directing a browser to a web page hosted at a website, is disclosed. The method includes, among other things, storing a web page address, a keyword, and a domain name to associate the web page address, the keyword, and the domain name. | 06-13-2013 |
20130124742 | METHOD AND SYSTEM FOR PREDICTING DOMAIN NAME REGISTRATION RENEWAL PROBABILITY - A method for determining probability of a domain name registration renewal includes receiving a plurality of inputs associated with the domain name and assigning each of the plurality of inputs to at least one category from among a plurality of categories. The method also includes assigning a weighted value to each of the plurality of categories and calculating the probability of the domain name registration renewal based in part on the weighted value of each category. | 05-16-2013 |
20130117282 | SYSTEM AND METHOD FOR DETECTING DNS TRAFFIC ANOMALIES - Systems and methods for analyzing domain name system lookup data are disclosed. The method may include: calculating traffic scores for a network address based on a set of DNS lookup data associated with the network address, where the set of DNS lookup data includes a plurality of query records having one or more queried network addresses; calculating a first variance and a second variance for the network address based on the traffic scores for the network address; and determining a rank of the network address based on the first and second variances. | 05-09-2013 |
20130117013 | PRONOUNCEABLE DOMAIN NAMES - Embodiments of the present teachings relate to systems and methods for generating pronounceable domain names. The method includes proving a list of character strings; filtering the list of character strings through a first filter based on a phonetic model to produce a first filtered list of character strings; filtering the list of character strings through a second filter based on a character order mode to produce a second filtered list of character strings; and generating, by a processor, a list of pronounceable domain names based on the first filtered list of character strings and the second filtered list of character strings. | 05-09-2013 |
20130086081 | DYNAMIC CLIENT SIDE NAME SUGGESTION SERVICE - A method for providing Internet domain name suggestions includes parsing a web page; obtaining at least one keyword from the parsing, generating a first query from the at least one keyword; and determining, based at least on the first query, if at least one name suggestion is available. The method also includes, if at least one name suggestion is available, generating at least one domain name suggestion based at least on the first query and displaying the at least one domain name suggestion. | 04-04-2013 |
20130085932 | TRACING DOMAIN NAME HISTORY WITHIN A REGISTRATION VIA A WHOWAS SERVICE - A system, method, and computer-readable medium, is described that implements a repository object history (“WhoWas”) service that receives a WhoWas query to retrieve historical information about a repository object's change history, including a domain's registration activity. The WhoWas service searches repository object history information, formats it, and returns the results. The WhoWas service may be restricted to authorized users and may charge a fee for use. The service may also perform statistical data gathering based on historical WhoWas information, including on subsets of domains based on particular domain characteristics. In addition, historic IP address information and location information may be gathered and returned. | 04-04-2013 |
20130085914 | AUTHENTICATED NAME RESOLUTION - A method, system, and computer-readable memory containing instructions include receiving a DNS request containing authentication information, validating the authentication information, determining an appropriate action to take based on the validating status, and taking the appropriate action. Actions may include responding with an individualized network layer address or service location address, delaying sending a response message, sending a network layer address or service location address corresponding to a site containing authentication information, and sending a response with a network layer address or service location address with a web address configured to mimic the website related to the requested resource. | 04-04-2013 |
20130066633 | Providing Audio-Activated Resource Access for User Devices - Methods and computer systems for providing audio-activated resource access for user devices are provided. In at least one embodiment, a computer system may comprise a processor and a memory coupled to the processor. The memory may store instructions to cause the processor to perform operations comprising capturing audio at a user device. The operations may also comprise using a speech-to-text converter to convert speech transmitted over the audio into text and transmitting the text to a server system to determine a corresponding keyword or phrase. The operations may also comprise receiving a resource corresponding to the keyword or phrase. | 03-14-2013 |
20130046763 | SYSTEMS AND METHODS FOR IDENTIFYING ASSOCIATIONS BETWEEN MALWARE SAMPLES - Systems and methods are disclosed for identifying associations between binary samples, such as e-mail files and their attachments or a document and an executable program associated with the document. In one implementation, the method includes receiving a plurality of binary samples, and extracting metadata from the plurality of binary samples. The metadata for a binary sample from the plurality of binary samples includes a set of attributes of the binary sample. The method further includes identifying a set of associations between the plurality of binary samples based on the extracted metadata. Each association is characterized by at least one attribute the associated binary samples have in common, and each association has a confidence level indicative of a strength of the association. The method also includes identifying associations with a confidence level that exceeds a predefined threshold. | 02-21-2013 |
20130042299 | WHITE LISTING DNS TOP-TALKERS - Systems and methods for creating a list of trustworthy resolvers in a domain name system. A computer receives a resolver profile for a resolver sending queries to a domain name server. The resolver profile is based on one or more of a top-talker status of the resolver, a normalcy of distribution of domain names queried, a continuity of distribution of query type, and an IP time-to-live variance of queries from the resolver. Resolver profiles can be compared to a trust policy to determine whether the resolver is trustworthy. Resolvers deemed trustworthy can be added to a list of trustworthy resolvers. Embodiments can detect the occurrence of a network-based attack. Embodiments can mitigate the effect of a network-based attack by responding only to queries from resolvers on the list of trustworthy resolvers. | 02-14-2013 |
20130024529 | HIERARCHICAL PUBLISH/SUBSCRIBE SYSTEM - A method for transmitting messages in a publish/subscribe message system. The method also includes: receiving, at a first relay, a subscription request from a first client; recording, at the first relay, subscription information of the first client based on the subscription request; receiving, at the first relay, a publication request from a second client, wherein the publication request includes a message; and transmitting the message to the first client. | 01-24-2013 |
20130024528 | HIERARCHICAL PUBLISH/SUBSCRIBE SYSTEM - A method for publishing a message includes receiving, at a first relay, a subscription request from a first client, wherein the subscription request includes a target. The method also includes: recording, at the first relay, subscription information of the first client based on the subscription request; receiving, at the first relay, a publication request from a second client, wherein the publication request includes a message string characterized by a pattern; determining, by the first relay, that the target matches at least a portion of the pattern; determining, by the first relay, if the publication request is a local publication request based on a predetermined policy rule; and transmitting the message string to the first client if the publication request is determined to be a local publication request. | 01-24-2013 |
20130024527 | HIERARCHICAL PUBLISH/SUBSCRIBE SYSTEM - A method for publishing a publication message includes receiving, at one of a plurality of first relays, a subscription request from a first client and transmitting the subscription request from the one of the plurality of first relays to first and second central relays of a plurality of central relays. The method also includes receiving, at another of the plurality of first relays, a publication request from a second client. The publication request includes the publication message. The method further includes transmitting the publication message from the another of the plurality of first relays to all of the plurality of central relays, transmitting the publication message from at least one of the first and second central relays to the one of the plurality of first relays, and transmitting the publication message from the one of the plurality of first relays to the first client. | 01-24-2013 |
20130007880 | DATA PLANE PACKET PROCESSING TOOL CHAIN - This present disclosure relates to systems and methods for providing a data plane processing tool chain for processing packets that can use OSI layers | 01-03-2013 |
20130006710 | TARGETED CAMPAIGN MANAGEMENT SYSTEM AND METHOD - A system, method, and computer-readable medium, is described that provides a probability of deletion (or renewal rate) prediction for a domain name based on a historical model of expired and renewed domain names. Domain name attribute sets are defined using domain attribute/value combinations. These sets are used to classify past expired and renewed domain names into each of the applicable sets where the domain attribute and values match the expired or renewed domain names. The percentage of renewed domain names in a set is used to predict the likelihood that a user will renew a domain name set to expire in a defined window and that matches the attribute/value combinations that make up the domain attribute set. This predicted percentage is used to target domains and deliver marketing offers to the domain contacts. | 01-03-2013 |
20130003567 | PARALLEL PROCESSING FOR MULTIPLE INSTANCE REAL-TIME MONITORING - Systems and methods are disclosed for analyzing network traffic data to generate complex statistics associated with the network traffic in real-time through parallel processing and data pipelining. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to generate a plurality of program instances, wherein a first program instance observes the network traffic and uses a plurality of execution threads to distribute portions of the network traffic to additional program instances tasked with generating statistics associated with the network traffic. In other embodiments, a plurality of additional execution threads to the first program instance are tasked with generating the statistics. In either case, the generated statistics are placed into a data pipeline organized into time intervals of generated statistics, wherein the computation of higher-order statistics are computed as the lower-order time intervals are processed. | 01-03-2013 |
20130001291 | TRUSTED BARCODES - Methods and systems are disclosed for generating and authenticating barcodes and in particular generating trusted barcodes. In one embodiment, a method, performed by a certificate authority for creating a trusted content, comprises receiving, via a receiver, a target content and verifying the target content to determine whether the target content is safe or appropriate. Further, the method comprises, based on a result of the verifying, generating and storing, in a storage medium, response data; generating, via a processor, and storing in the storage medium an identifier corresponding to the response data; generating, via the processor, resolution data, the resolution data including the identifier and an address of the certificate authority; and transmitting, via a transmitter, the resolution data as the trusted content. | 01-03-2013 |
20120331121 | CHARACTERIZING UNREGISTERED DOMAIN NAMES - Methods and apparatus for characterizing unregistered domain names are provided. One embodiment includes obtaining a list of a plurality of resolution requests for the unregistered domain names, determining a number of occurrences of each of the unregistered domain names, computing a plurality of groupings based on the number of occurrences, and associating a score with each of the unregistered domain names. | 12-27-2012 |
20120330994 | Systems and Methods for Inter-Object Pattern Matching - Systems and methods are disclosed for identifying objects from a collection of objects of diverse types that match a pattern. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to receive a pattern input text identifying the pattern to be matched. The pattern input text comprises one or more conditions and a match statement. The processor also receives a collection of objects of diverse types, where each object comprises at least an attribute and a value associated with the attribute. The processor analyzes each object to determine whether the object satisfies the match statement based on an application of the one or more conditions to the attributes and attribute values for the object. If the processor determines that the object satisfies the match statement, the processor creates an output comprising an indication of the object and the conditions that caused the match statement to be satisfied. | 12-27-2012 |
20120325902 | Multi-Mode Barcode Resolution System - Methods and systems for generating and resolving multi-mode barcodes comprise: inputting graphical data representing a barcode pattern into memory; translating the graphical data into barcode information according to a standard for translating a particular type of barcode pattern into barcode information; detecting the presence of multiple, distinct data items of different types in the barcode information, wherein each data item specifies an action to be taken by the scanning device; identifying a data item in the barcode information for which the scanning device is capable of taking the action specified by the data item; and performing the action specified by the data item. | 12-27-2012 |
20120308003 | AUTHENTIC BARCODES USING DIGITAL SIGNATURES - Methods and systems for generating and authenticating barcodes using digital signatures comprise: inputting graphical data representing a barcode pattern into memory; translating the graphical data into barcode information according to a standard for translating a particular type of barcode pattern into barcode information; extracting a message and a digital signature from the barcode information; and determining whether the message is authentic by determining whether the digital signature matches the message. | 12-06-2012 |
20120304004 | RECOVERY OF A FAILED REGISTRY - A system, method, and computer-readable medium, is described that enables a registry recovery service to retrieve zone files from a target registry, archive the zone files, publish the zone files to a managed DNS server, reconcile ownership of the zone files, and publish the zone files to a provisioning DNS server. The registry recovery service may also implement a WHOIS server for the zone and ownership information and may also implement zone specific features particular to the target registry's TLD. The registry recovery service may also enable DNSSEC extensions on the recovered registry DNS services. | 11-29-2012 |
20120303147 | SYSTEMS AND METHODS FOR PROVIDING ACCESS TO RESOURCES THROUGH ENHANCED AUDIO SIGNALS - Systems and methods are provided for using a hidden audio signal. In one exemplary embodiment, the method includes registering, at a central database, one or more of an identifier and a destination resource associated with the identifier, and encoding the one or more of the identifier and the destination resource in a hidden audio signal. The method further includes transmitting the hidden audio signal, including the one or more of the identifier and the destination resource, in connection with an acoustic signal, and receiving the acoustic signal at a user device. In addition, the method includes decoding the encoded one or more of the identifier and the destination resource at the user device; and requesting, from the central database, information associated with the one or more of the identifier and the destination resource. Further, the method includes receiving, at the user device, the requested information. | 11-29-2012 |
20120284505 | DNSSEC SIGNING SERVER - Systems and methods for performing DNSSEC signing are described in which digital signature operations may be performed by a network accessible signing server that is configured to interact with a separate client application. Exemplary methods may include receiving a signing request at the signing server from the client application to sign first data. The signing server may determine an active KSK and/or an active ZSK for the first data. The first data may then be transmitted by the signing server to a digital signature modules, which may include, for example, a hardware support module, or software signing applications. The signing server may receive a digitally signed version of the first data from the digital signature module, and provide the signed first data to the client application. | 11-08-2012 |
20120278626 | DNSSEC Inline Signing - Systems and methods of performing incremental DNSSEC signing at a registry are described in which digital signature operations may be performed as part of a single transaction including DNS add, update, and/or delete operations and the like. Exemplary methods may include receiving a domain command from a requester, the domain command including an identifier of a domain. The received domain command may be executed with respect to data stored by the registry for the domain. As part of an individual transaction including the execution of the domain command, the registry may also sign DNSSEC records for the domain using a private key of an authoritative server. After the DNSSEC records have been signed, the registry may incrementally publish the signed DNSSEC records to a separate server. Exemplary methods may also include “took-aside” operations in which, for example, add, update, and/or delete operations may be executed on data stored in a registry database and reported to a requester, prior to applying digital-signatures to the DNSSEC data. After reporting that the instructions have been executed, the registry may generate a digital signature based on the add, update, and/or delete changes, and commit the digital signature to a registry resolution database. | 11-01-2012 |
20120271442 | SYSTEMS AND METHODS FOR PROVIDING ACCESS TO RESOURCES THROUGH ENHANCED AUDIO SIGNALS - Systems and methods are provided for using a hidden audio signal. In one exemplary embodiment, the method includes registering, at a central database, one or more of an identifier and a destination resource associated with the identifier, and encoding the one or more of the identifier and the destination resource in a hidden audio signal. The method further includes transmitting the hidden audio signal, including the one or more of the identifier and the destination resource, in connection with an acoustic signal, and receiving the acoustic signal at a user device. In addition, the method includes decoding the encoded one or more of the identifier and the destination resource at the user device; and requesting, from the central database, information associated with the one or more of the identifier and the destination resource. Further, the method includes receiving, at the user device, the requested information. | 10-25-2012 |
20120254386 | Transfer of DNSSEC Domains - Systems and methods of transferring a DNSSEC enabled domain from a losing hosting provider to a gaining hosting provider are described in which the transfer of the domain may be achieved without disruption to a DNSSEC validation of the domain. Systems and methods, such as those directed to registry and/or registrar servers, may include transferring a DNSKEY or Delegation Signer (DS) record from a gaining hosting provider to a losing hosting provider prior to transferring the domain from the losing hosting provider to the gaining hosting provider. A gaining hosting provider may sign DNS records of the domain with the gaining hosting provider DNSKEY prior to transferring the domain from the losing hosting provider to the gaining hosting provider. Additionally, a registry server, or similar device, may be configured to act as an intermediary between the losing hosting provider and the gaining hosting provider during the transfer process. | 10-04-2012 |
20120174220 | DETECTING AND MITIGATING DENIAL OF SERVICE ATTACKS - Embodiments of this invention provide methods for detecting a denial of service attack (DoS) and isolating traffic that relates to the attack. The method may begin by collecting network traffic data by observing individual packets carried over the network. The data may then be compiled into a time series comprising network traffic data relating successive time-intervals. A difference value based upon the entry in the time series for a large time-window and for a small time-window. A deviation score may then be determined by calculating the ratio of the difference values. The deviation score may indicate whether an attack occurred. In an embodiment of the invention, an attack is deemed to occur if the deviation score is between 0.6 and 1.4. | 07-05-2012 |
20120174198 | Shared Registration Multi-Factor Authentication Tokens - A system and method for more efficiently establishing a chain of trust from a registrant to a registry. A registrant credential is associated with a Shared Registration command and is sent by a registrar to a registry. Upon successful validation, a token is generated and bound to a registrant identifier. The token is included along with the registrant identifier in subsequent discrete Shared Registration commands submitted to the registry on behalf of the registrant. The registrant thus needs to submit its credential only once for changes that require several discrete commands. Also, it is more efficient for the Shared Registration System to validate a token for a set of commands than to validate different registrant credential for each discrete command. | 07-05-2012 |
20120173684 | METHOD AND SYSTEM FOR PARTITIONING RECURSIVE NAME SERVERS - A method of applying device preferences to network traffic includes establishing first DNS settings of a first device and establishing second DNS settings of a second device. The first DNS settings are associated with one or more first name servers. The second DNS settings are associated with one or more second name servers. The method also includes transmitting, from the first device, at least a portion of a first DNS query and a public IP address to the first name server. The method further includes transmitting, from the second device, at least a portion of a second DNS query and the public IP address to the second name server | 07-05-2012 |
20120173490 | METHOD AND SYSTEM FOR IMPLEMENTING BUSINESS LOGIC - A method of recovering a database includes providing a computer having a processor and providing a backup database including a last change marker. The method also includes extracting, using the processor, the last change marker from the backup database and providing transaction logs. Each transaction of the transaction logs includes input data, processed data, and a change marker. The method further includes sorting, using the processor, the transactions of the transaction logs using the change markers, replaying, using the processor, one or more of the transactions of the transaction logs, and generating a recovered database. | 07-05-2012 |
20120117173 | CONTROL AND MANAGEMENT OF ELECTRONIC MESSAGING - A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine ifs desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee. | 05-10-2012 |
20120117095 | Test Automation Tool For Domain Registration Systems - The present subject matter is directed to systems and methods for automating the testing of multi-function systems, such as naming registration systems and the like. A method of testing a registry, and the like, may include providing a command phrase including an add command and at least one function that includes an artificial attribute for a domain added by the add command. The command phrase may specify an operation, a protocol, and an object. The operation may include at least one of add, delete, or update domain. The protocol may include at least one of RRP and EPP. One or more parameters associated with the command phrase may be provided and may include an expected response code and/or a variable. One or more additional parameters that are associated with the command phrase may be determined and a database may be accessed to provide the one or more additional parameters. The command phrase, the one or more additional parameters, and/or the one or more additional parameters may be translated into an XML command and the XML command transmitted to the registry, or the like. A response from the registry may be evaluated to determine potential problems with database. | 05-10-2012 |
20120117041 | DEBUGGING A STORED PROCEDURE IN A DATABASE - This invention provides tools and methods for debugging a stored procedure in a database. The methods allow for debugging of the stored procedure even when it is invoked over a normal connection to a database management system, for example using ODBC. The developer can debug the stored procedure using an integrated development environment, including viewing the values of variables and the position of the execution pointer as the stored procedure executes. The invention also provides methods for allowing the developer for changing the source code of the stored procedure during debugging. | 05-10-2012 |
20120096311 | METHOD AND APPARATUS FOR AN IMPROVED FILE REPOSITORY - A method and apparatus for of storing data comprising monitoring a plurality of storage units within a mass storage area and detecting when a storage unit within the mass storage area is overloaded. The method further comprising randomly distributing the data on the overloaded storage unit to the other storage units within the mass storage area. | 04-19-2012 |
20120095974 | DATABASE SYNCHRONIZATION AND VALIDATION - Systems and methods for verifying data in a distributed database using different automated check operations at different times during the database read and update cycles. Various functions may be performed including executing a first check during update operations of the database. A second check may also be executed during the update operation of the database, and be implemented as an execution thread of an update daemon. A third check may be executed at a time interval between update functions of the update daemon. A fourth check may be executed during a time that the database is not being updated. Integrity of data in the database may be verified by a computer processor based on the first, second, third, and fourth checks. | 04-19-2012 |
20120072407 | METHOD AND SYSTEM FOR TRIGGERING WEB CRAWLING BASED ON REGISTRY DATA - A method of triggering crawling of a domain includes receiving information related to a domain from a registrar and processing the information related to the domain. The method also includes storing the processed information in a registry zone file and forming a list of registry data based on the processed information. The list of registry data comprises a subset of the registry zone file. The method further includes crawling one or more of the domains in the list of registry data. | 03-22-2012 |
20120047173 | Method of and Apparatus for Identifying Requestors of Machine-Generated Requests to Resolve a Textual Identifier - Methods and systems provide tracking or logging requests to resolve non-existent textual identifiers and classifying the textual identifier into a predefined set of taxonomical categories to support the detection of requestors of machine generated requests to resolve textual identifiers. Detection includes calculating a measure of probability based on the analysis and classification of prior textual identifier requests from a requestor. | 02-23-2012 |
20120047153 | Method of and Apparatus for Identifying Machine-Generated Textual Identifiers - Methods and systems provide tracking or logging requests to resolve non-existent textual identifiers and classifying the textual identifier into a predefined set of taxonomical categories to support the detection of machine generated textual identifiers. Detection includes calculating a measure of probability based on the analysis and classification of prior textual identifier requests from a set of requests for a specific textual identifier. | 02-23-2012 |
20110283174 | Optimizing Security Seals on Web Pages - A method of providing web site verification information to a user can include receiving a DNS query including a host name and a seal verification site name, parsing the DNS query, and extracting the host name from the DNS query. The method also can include accessing a DNS zone file including a list of Trust Services customers and determining if the host name is associated with a Trust Services customer in the list of Trust Services customers. The method further can include transmitting a positive identifier to the requester if the host name is associated with a Trust Services customer and transmitting a negative identifier to the requester if the host name is not associated with a Trust Services customer. In a specific embodiment, the Trust Services include issuance of digital certificates. | 11-17-2011 |
20110258237 | System For and Method Of Identifying Closely Matching Textual Identifiers, Such As Domain Names - Methods and systems provide tracking or logging requests to resolve non-existent domain (NXDomains) and organizing the NXDomains to support searching of the domain names including ranking the NXDomains based on popularity, e.g, number of hits or potential traffic based on the number of requests made for the NXDomain. NXDomain logs may be organized so that it supports searching by creating an inverted index including n-grams of the NXDomains. Searching includes identifying a target substring in one or more of the indexes, selecting those matching NXDomains satisfying some threshold criteria, and displaying the NXDomains in a selected order such as by demand or popularity associated with, for example, a selected geographical location from which resolution requests targeting respective NXDomains originate. | 10-20-2011 |
20110208962 | STREAMLINED PROCESS FOR ENROLLMENT OF MULTIPLE DIGITAL CERTIFICATES - The enrollment process for purchasing multiple digital certificates configured using different cryptographic algorithms or hashing algorithms is streamlined. A certificate purchaser wishing to purchase two or more certificates is prompted to provide answers to common enrollment questions, such as the purchaser's contact information, payment details, web sever software, and the like, using a simplified and streamlined enrollment process. Each certificate is optionally configured using a different hashing algorithm. | 08-25-2011 |
20110162053 | SERVICE ASSISTED SECRET PROVISIONING - A method for providing a secret that is provisioned to a first device to a second device includes generating a One-Time Password at the first device using the secret and obtaining an identifier of the secret. The method also includes providing the One-Time Password and the identifier to the second device and sending the One-Time Password and the identifier to a remote provisioning service. The method also includes verifying that the One-Time Password corresponds to the secret, and sending to the second device an encrypted secret and a decryption key for decrypting the encrypted secret. The encrypted secret and the decryption key may be sent using different communications methods. The method also includes decrypting the encrypted secret using the decryption key to provide the secret and storing the secret at the second device. | 06-30-2011 |
20110161289 | Data Replication Across Enterprise Boundaries - Systems and methods for synchronizing verification data in a distributed database including client and server databases. The server database may exchange verification data regarding one-time passwords to multiple client databases. An update to the server database may be initiated based on information stored in the client database by pushing updated verification information from the client database to the server database via an SSL tunnel. An update to the client database may be initiated based on information stored in the server database by pulling updated verification data from the server database to the client database via an SSL tunnel. The client database and the server database may include a two-dimensional data field including the verification data and an associated key identifier, and a site ID. The site ID may include a unique identifier to identify the respective database in which it is included. The data field may include a sequence number assigned to each row of data that increases every time the row of information is updated. The client database and the server database may also include a replication tracking table including a record of the last known update to a remote database. Data fields that require updating may be determined based on the site ID and a comparison of the sequence numbers from the replication tracking table and the server's database. | 06-30-2011 |
20110159848 | METHODS AND APPARATUS FOR PROVISIONING DEVICES WITH SECRETS - A method for provisioning a mobile device with a secret to be used as a basis for generating One-Time passwords includes receiving a first request using a first communications method. The first request includes a mobile device identifier. The method also includes sending a credential message using a second communications method. The credential message includes an authentication credential. The method also includes receiving a second request using a third communications method different from the second communications method. The second request includes information based upon the authentication credential sent by the provisioning service. The method also includes sending the secret if the authentication credential in the credential message corresponds to the information based upon the authentication credential in the second request. | 06-30-2011 |
20110154027 | METHOD AND SYSTEM FOR CO-TERMINATION OF DIGITAL CERTIFICATES - A method of renewing a plurality of digital certificates includes receiving, at a first time, a request from a user to renew a first digital certificate and determining an expiration date for the first digital certificate. The method also includes receiving, at a second time, a request from the user to renew a second digital certificate and determining an expiration date for the second digital certificate. The expiration date for the second certificate is later than the expiration date for the first certificate. The method further includes determining a new expiration date occurring after the first time and the second time and renewing the first digital certificate. An expiration date for the renewed first digital certificate is equal to the new expiration date. Moreover, the method includes renewing the second digital certificate. An expiration date for the renewed second digital certificate is equal to the new expiration date. | 06-23-2011 |
20110153479 | Alternative Approach to Deployment and Payment for Digital Certificates - A method for managing payment of digital certificates includes receiving a request to issue a digital certificate to a subscriber, capturing and saving payment information of the subscriber, performing a first authentication and verification of the subscriber at a first time, and performing at least one additional authentication and verification of the subscriber at least once every authentication period. A long-lived certificate is issued to the subscriber provided the subscriber is authenticated and verified. The long-lived certificate is valid for an expiration period. However, the long-lived certificate is revoked if (1) the additional authentications and verification produce invalid results, or (2) if payment is not received during a payment period. The authentication period is shorter than the expiration period and there are at least a first and a second authentication period within the expiration period. The expiration period is longer than the authentication period. | 06-23-2011 |
20110145899 | Single Action Authentication via Mobile Devices - A method for authenticating a user includes receiving a user identification, confirming the user identification, sending a request to the user to perform a single action on a communication device, creating a session to receive the single action from the communication device, receiving an identifier from the communication device, using the identifier to verify that the user has the communication device, and authenticating the user based on the confirmed user information and the verification that the user has the communication device. The identification can include a username and a password or can be a one time password. | 06-16-2011 |
20110145835 | Lockless Queues - A method for passing data from a first processing thread to a second processing thread, wherein the first processing thread produces data to be processed by the second processing thread. The data from the first processing thread may be inserted into objects that in turn are inserted into a queue ob objects to be processed by the second thread. The queue may be a circular array, wherein the array includes a pointer to a head and a pointer to a tail, wherein only the first processing thread modifies the tail pointer and only the second processing thread modifies the head pointer. | 06-16-2011 |
20110145569 | METHOD AND SYSTEM FOR PROVISIONING MULTIPLE DIGITAL CERTIFICATES - A method of provisioning a first digital certificate and a second digital certificate based on an existing digital certificate includes receiving information related to the existing digital certificate. The existing digital certificate includes a first name listed in a Subject field and a second name listed in a SubjectAltName extension. The method also includes receiving an indication from a user to split the existing digital certificate and extracting the first name from the Subject field and the second name from the SubjectAltName extension of the existing digital certificate. The method further includes extracting the public key from the existing digital certificate, provisioning the first digital certificate with the first name listed in a Subject field of the first digital certificate and the public key, and provisioning the second digital certificate with the second name listed in a Subject field of the second digital certificate and the public key. | 06-16-2011 |
20110145567 | METHOD AND SYSTEM TO COMBINE MULTIPLE DIGITAL CERTIFICATES USING THE SUBJECT ALTERNATIVE NAME EXTENSION - A method for forming a digital certificate includes receiving contact information associated with the digital certificate. The contact information includes at least a name, a mailing address, and an email address. The method also includes receiving billing information associated with the digital certificate and receiving a Certificate Signing Request (CSR) for the digital certificate. The method further includes receiving a first name for use in forming the digital certificate and receiving a second name for use in forming the digital certificate. Moreover, the method includes receiving an indication of a vendor of web server software, receiving an indication of a service period for the digital certificate, and forming the digital certificate. The first name is stored in a Subject field of the digital certificate and the second name is stored in the SubjectAltName extension of the digital certificate. | 06-16-2011 |
20110126292 | Method and System for Providing Security Seals on Web Pages - A method of providing web site verification information to a user includes receiving a DNS query including a host name and a seal verification site name, parsing the DNS query, and extracting the host name from the DNS query. The method also includes accessing a DNS zone file including a list of Trust Services customers and determining if the host name is associated with a Trust Services customer in the list of Trust Services customers. The method further includes transmitting a positive identifier to the requester if the host name is associated with a Trust Services customer and transmitting a negative identifier to the requester if the host name is not associated with a Trust Services customer. In a specific embodiment, the Trust Services include issuance of digital certificates. | 05-26-2011 |
20110125658 | Method and System for Performing Fraud Detection for Users with Infrequent Activity - A method of categorizing a recent transaction as anomalous includes a) receiving information about a recent transaction and b) accessing information about one or more historical transactions. The one or more historical transactions have at least one party in common with the recent transaction. The method also includes c) determining a similarity value between the recent transaction and a transaction i of the one or more historical transactions and d) determining if the similarity value is greater than or equal to a predetermined threshold value. The method further includes e) if the similarity is greater than or equal to the predetermined threshold value, categorizing the recent transaction as not anomalous or f) if the similarity is less than the predetermined threshold value, determining if there are additional transactions. If there are additional transactions, incrementing counter i and repeating steps c) through f). | 05-26-2011 |
20110110267 | METHOD AND SYSTEM FOR APPLICATION LEVEL LOAD BALANCING IN A PUBLISH/SUBSCRIBE MESSAGE ARCHITECTURE - A method of publishing a message includes receiving a subscription request at a first remote relay from a first client and transmitting a subscription message from the remote relay to each of a first set of central relays. The method also includes receiving a publication request at a second remote relay from a second client and transmitting a publication message from the second remote relay to a first central relay of the first set of central relays and a second central relay of a second set of central relays. The method further includes determining, at the first central relay, that a target matches at least a portion of a pattern, transmitting the message string from the first central relay to the first remote relay, determining, at the first remote relay, that the target matches at least a portion of the pattern, and transmitting the message string to the first client. | 05-12-2011 |
20110106924 | Internet Domain Name Super Variants - Systems and methods for registering a domain, including Internationalized Domain Names (IDNs), including receiving a request to register an IDN and determining a language category of the request. Code points of the request are converted to yield a generalized variant of the IDN. The generalized variant is compared to a stored database of registered IDNs that may include similar generalized variants of the registered IDNs. Based on the comparison, it is determined whether or not to resister the IDN. In the case the that ION registration is allowed the generalized variant of the IDN may be stored in the database to protect against later registration by similar IDNs. Converting the code points of the request may include identifying corresponding code points of variants within the language category, and converting each of the code points of the requested IDN based on a deterministic algorithm applied to the corresponding code points. The deterministic algorithm may be applied to a value of each of the corresponding code points to yield a representative code point from among the corresponding code points, and the generalized variant may include a representative code point for each of the code points of the request. | 05-05-2011 |
20110106891 | HIERARCHICAL PUBLISH AND SUBSCRIBE SYSTEM - A method of publishing a publication message includes receiving, at one of a plurality of first relays, a subscription request from a first client and transmitting the subscription request from the one of the plurality of first relays to only one of a plurality of central relays. The method also includes receiving, at another of the plurality of first relays, a publication request from a second client. The publication request includes the publication message. The method further includes transmitting the publication message from the another of the plurality of first relays to all of the plurality of central relays, transmitting the publication message from at least one of the plurality of central relays to the one of the plurality of first relays, and transmitting the publication message from the one of the plurality of first relays to the first client. | 05-05-2011 |
20110099628 | METHOD AND SYSTEM FOR WEIGHTING TRANSACTIONS IN A FRAUD DETECTION SYSTEM - A method of computing a similarity between a first transaction having a set of properties and a second transaction having the set of properties includes computing an initial weight for each of the properties of the set of properties and computing a similarity between each of the properties of the first transaction and the properties of the second transaction. The method also includes adjusting the initial weight for each of the properties based on a measure of the commonness of each of the properties of the set of properties, normalizing the adjusted weights, and computing the similarity by summing the products of the normalized adjusted weights and the computed similarities. | 04-28-2011 |
20110099284 | Efficient Multiple Filter Packet Statistics Generation - Incoming data streams are managed by receiving a data stream on at least one network interface card (NIC) and performing operations on the data stream using a first process running several first threads for each network interface card and at least one group of second multiple processes each with an optional group of second threads. The first process and the one or more groups of second multiple processes are independent and communicate via the shared memory. The first threads for each network interface card are different than the group of second threads. The system includes at least one network interface card that receives a data stream, a first processor that runs a first process that uses a plurality of first threads for each network interface card and a second processor that runs at least one group of second multiple processes each with an optional group of second threads. The first process and the one or more groups of second multiple processes are independent and communicate via the shared memory. | 04-28-2011 |
20110099169 | METHOD AND SYSTEM FOR CLUSTERING TRANSACTIONS IN A FRAUD DETECTION SYSTEM - A method of determining a clustering metric includes receiving a first set of transactions and a second set of transactions. For transaction i of the first set and transaction j of the second set, the method includes (a) determining an intersection set, (b) determining a union set; (c) computing a common linkage between transaction i and transaction j equal to the intersection set divided by the union set, and (d) incrementing index j and repeating steps (a)-(c). The method also includes (e) summing the common linkages between transaction i and the transactions of the second set, (f) normalizing the sum of the common linkages by a number of the second set, and (g) incrementing index i and repeating steps (a)-(f). The method further includes (h) summing the normalized common linkages and (i) normalizing the sum of the normalized common linkages by a number of the first set. | 04-28-2011 |
20110087769 | Domain Popularity Scoring - Systems and methods for scoring a domain including analyzing counter data and information obtained from a web site associated with the domain. Methods may include receiving requests to resolve the domain at an authoritative domain resolution server. A counter may be incremented for the domain based on the received requests. Information may be obtained from a web page associated with the domain. For example, obtaining information from the web page may include obtaining quantitative, qualitative, and/or functional information from the web page, such as link information, a status of network links corresponding to the link information, and associated ratios. The status of link information may include searching for functional details and/or results, such as, domain redirections, domain errors, mirror content, and commonly linked sites. A score may be calculated for the domain based upon the counter data and the information obtained from the web page associated with the domain. | 04-14-2011 |
20110060950 | METHOD AND SYSTEM FOR RECOVERY OF A FAILED REGISTRY - A method of recovering a registry includes accessing a plurality of registry zone files for the registry and archiving, on a first periodic basis, the plurality of registry zone files. Each of the registry zone files includes at least domain names, registrar IDs, and status information represented in a first predetermined format. The method also includes accessing bulk WHOIS data for the registry and archiving, on a second periodic basis, the bulk WHOIS data. The bulk WHOIS data includes at least nameserver server names, IP addresses, and status information represented in a second predetermined format. The method further includes validating one of the plurality of archived registry zone files based on a comparison between the plurality of registry zone files and the bulk WHOIS data, publishing the validated registry zone file to a second registry's nameservers, initiating a root zone change request, and updating authoritative nameservers. | 03-10-2011 |
20110051728 | Method for Optimizing a Route Cache - A system and method for managing a route cache to reduce the risk of disruption from denial of service attacks. All traffic arriving on a front interface from local (on-link) nodes (e.g., neighbor nodes) can be treated normally. However, for packets arriving from remote (off-link) sources addressed to a given destination IP address, a single, shared route cache entry can be used. The source-address field in this entry can be zeroed-out since it will not be used for traffic coming from any one source. Similarly, for all packets going to off-link destinations through the front-interface, another single shared route cache entry can be created and used. The destination-address field in this entry can be zeroed out since it will not be used for traffic going to any one destination. | 03-03-2011 |
20110047292 | METHOD AND SYSTEM FOR INTELLIGENT ROUTING OF REQUESTS OVER EPP - Method and system for routing EPP requests over a network are provided. The EPP request can include XML namespace information and optionally XML sub-product information. A gateway can receive the request and analyze the namespace and in some instances, sub-product information to determine the service to which the request is directed. Thereupon, the gateway can route the request to the appropriate service by consulting a routing table that can have status and connectivity information for all the available services. | 02-24-2011 |
20110035469 | METHOD AND SYSTEM FOR FILTERING OF NETWORK TRAFFIC - A method of filtering a plurality of DNS queries, wherein each DNS query includes a query name and a resource record type, includes defining a filter rule including a domain name, a filter type, and a throttle percentage and forming a filter file including the filter rule. The method also includes transmitting the filter file from a server to a plurality of filter proxies, transmitting the filter file from each of the plurality of filter proxies to one or more processing engines, and receiving the plurality of DNS queries at one of the one or more processing engines. The method includes determining a match between the domain name and the query name and between the resource record type and the filter type for a subset of the plurality of DNS queries, and blocking a predetermined percentage (equal to the throttle percentage) of the subset of the plurality of DNS queries. | 02-10-2011 |
20110022678 | METHOD AND SYSTEM FOR DATA LOGGING AND ANALYSIS - A method of logging internet requests includes defining a plurality of field types of interest and receiving a request from the internet including one or more fields. The method also includes determining that a first field type of a first field of the one or more fields matches one of the plurality of field types of interest and caching at least a portion of the first field in a cache. The method further includes determining that a second field type of a second field of the one or more fields matches one of the plurality of field types of interest caching at least a portion of the second field in the cache. The method includes transmitting the cache to a server, determining, a number of occurrences of a field value of at least one of the first field type or the second field type, and providing a report including the number of occurrences of the field value. | 01-27-2011 |
20110016217 | METHOD AND SYSTEM FOR PREDICTING DOMAIN NAME REGISTRATION RENEWAL PROBABILITY - A method for determining probability of a domain name registration renewal includes receiving a plurality of inputs associated with the domain name and assigning each of the plurality of inputs to at least one category from among a plurality of categories. The method also includes assigning a weighted value to each of the plurality of categories and calculating the probability of the domain name registration renewal based in part on the weighted value of each category. | 01-20-2011 |
20110016022 | METHOD AND SYSTEM FOR SALE OF DOMAIN NAMES - A method of determining a multi-year renewal price for an expiring domain name includes setting a first selling price for the expiring domain name and determining that a first period of time has elapsed. The method also includes setting a second selling price for the expiring domain name. The second selling price is less than the first selling price. The method further includes determining the multi-year renewal price. A price for a first year is equal to the second selling price and a price for a second year is greater than the second selling price and less than or equal to the first selling price. | 01-20-2011 |
20100325723 | SHARED REGISTRATION SYSTEM MULTI-FACTOR AUTHENTICATION - A system and method for establishing a chain of trust from a registrant to a registry. A registrant request to a registrar to change a domain name record includes at least one registrant factor, such as a one time password. The registrar can formulate an extended EPP command that includes the factor to effectuate the change and send it to a registry. The registry can verify the at least one factor using at least one validation server. If the factor is successfully verified, the EPP can be processed by the registry. If the factor is not verified, the EPP command may not be processed and an error message may be generated and sent to the registrar. | 12-23-2010 |
20100325250 | CHARACTERIZING UNREGISTERED DOMAIN NAMES - Methods and apparatus for characterizing unregistered domain names are provided. One embodiment includes obtaining a list of a plurality of resolution requests for the unregistered domain names, determining a number of occurrences of each of the unregistered domain names, computing a plurality of groupings based on the number of occurrences, and associating a score with each of the unregistered domain names. | 12-23-2010 |
20100318858 | METHOD AND SYSTEM FOR AUDITING TRANSACTION DATA FROM DATABASE OPERATIONS - A method for validating SRS registry transaction data includes receiving OLTP transaction data from a first database, parsing the OLTP transaction data, and comparing the parsed OLTP transaction data to one or more of a set of profiles. Each of the one or more of the set of profiles includes metadata in XML files. The method also includes caching the parsed OLTP transaction data in a first data cache, receiving log data associated with the OLTP transaction data; and caching the log data in a second data cache. The method further includes correlating the parsed transaction data cached in the first data cache with the log data cached in the second data cache. | 12-16-2010 |
20100306836 | Control and Management of Electronic Messaging - A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine ifs desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee. | 12-02-2010 |
20100299410 | Multilingual Domain Name Resolution - A method, system, and computer-readable medium are described for registering and using multilingual domain names that include characters outside the ASCII character subset supported by the DNS system. Such multilingual domain names can in some situations be registered by first being converted into appropriate ASCII-Compatible Encodings (ACEs) that represent the corresponding multilingual domain names and that use only characters within the ASCII character subset. In addition, a variety of binary variants may be generated at registration for each multilingual domain name and then used as equivalents for the multilingual domain name, such as by storing the variants in the registry as alternative domain names or by otherwise reserving the binary variants. When requests to resolve such a registered multilingual domain name into a corresponding IP address or URL are received, the stored binary variants and/or ACE information can then be used to respond in an appropriate manner. | 11-25-2010 |
20100299409 | Multilingual Domain Name Registration - A method, system, and computer-readable medium are described for registering and using multilingual domain names that include characters outside the ASCII character subset supported by the DNS system. Such multilingual domain names can in some situations be registered by first being converted into appropriate ASCII-Compatible Encodings (ACEs) that represent the corresponding multilingual domain names and that use only characters within the ASCII character subset. In addition, a variety of binary variants may be generated at registration for each multilingual domain name and then used as equivalents for the multilingual domain name, such as by storing the variants in the registry as alternative domain names or by otherwise reserving the binary variants. When requests to resolve such a registered multilingual domain name into a corresponding IP address or URL are received, the stored binary variants and/or ACE information can then be used to respond in an appropriate manner. | 11-25-2010 |
20100293100 | Authenticated Payment | 11-18-2010 |
20100287532 | METHOD AND SYSTEM FOR INTEGRATING MULTIPLE SCRIPTS - A method of testing the server implementation of the Domain Name System protocol by using a first body of computer code in a first programming language capable of sending and receiving DNS requests, and a second body of computer readable code in a second programming language capable of generating DNS requests and verifying responses. The second programming language may be tailored to writing code being capable of generating Domain Name System requests and verifying the response thereby allowing the program to be efficiently reconfigured to test different aspects of the server. | 11-11-2010 |
20100274836 | Internet Profile Service - Systems and methods for creating and using a domain profile include identifying a status of a first page associated with a domain. The first page is retrieved and additional pages from the domain are identified based on hyperlinks from the first page. The status of the additional pages is identified and the hyperlinks are prioritized based on the status and/or a comparison with predetermined data. Content is extracted from the first page and selected pages from among the additional pages. The specific additional pages may be selected based on the prioritization. The retrieved content may be processed through a signature marker set to determine a contextual match. A purpose of the domain is determined according to the status of the first page, the status of the additional pages and results of the processing of the content. The domain profile can be displayed, stored, sent and/or searched to identify web sites or attributes of interest. | 10-28-2010 |
20100218040 | Method and Apparatus for an Improved File Repository - A method and apparatus for of storing data comprising monitoring a plurality of storage units within a mass storage area and detecting when a storage unit within the mass storage area is overloaded. The method further comprising randomly distributing the data on the overloaded storage unit to the other storage units within the mass storage area. | 08-26-2010 |
20100154048 | Digital Receipt For A Transaction - A first user ( | 06-17-2010 |
20100106731 | Determining Alternative Textual Identifiers Such as For Registered Domain Names - A method, system, and computer-readable medium is described that determines alternatives to a specified textual identifier, such as a domain name, by identifying and using words and phrases that are related to the identifier. A variety of types of related words can be used, such as synonyms and translations, and the related words can be determined in a variety of ways. One situation in which alternatives can be generated is after a user has requested to use or acquire an unavailable textual identifier, such as a request to register an already registered domain name, and the determined alternatives can then be presented to the user as possibilities for use or acquisition. When multiple alternatives are presented to the user, they can also be ranked as to relevance and ordered in a variety of ways. | 04-29-2010 |
20100100946 | Transparent Client Authentication - A system and method for authenticating an application (client) to a server or service. During a registration phase, an application that requests access to a service can receive a service identifier, which it can authenticate. The application can generate and send to the server or service an application-service key that is based upon the authenticated service identifier and a secret application key; a service-application identifier that can be based upon the authenticated service identifier and an application identifier; and a registration nonce, all of which can be stored at the server. During the authentication phase, the client can send to the server the application-service identifier, which the server can use to lookup the stored registration data. The server can send the registration nonce to the client, which can compute a proof of possession of the service-application key and send to the server. The server can compute its own version of this key and compare it to the received key. If they correspond, then the client is authenticated. | 04-22-2010 |
20100037046 | Credential Management System and Method - A centralized credential management system. Website credentials are stored at a vault storing at a vault. The website credentials are encrypted based upon a key not available to the vault and are for authenticating a user to a third party website. Through a client, a user authenticates to the vault and retrieves the encrypted website credentials and parameters and code for properly injecting the credentials into a website authentication form. The website credentials are decrypted at the client and injected into the authentication form using the parameters and code. | 02-11-2010 |
20090287998 | Text Creating and Editing System and Method with Dynamic Data Loading - The present invention is directed to a system and method for creating and editing documents or messages by dynamically loading the required data on the computing device as the documents or messages are being created or edited. This invention has relevance for creating or editing documents or messages in non-English languages using a computing device that is pre-configured to create English documents or messages, but not non-English documents or messages. Further, the present invention allows a user to create and edit documents and messages on a computing device that may not have been configured a priori or have limited storage capability to support the entire data set required for creating the documents or messages in a specific language. The computing device is required to communicate with a data storage device to dynamically load the required data from therein. | 11-19-2009 |
20090133118 | METHODS AND SYSTEMS FOR AUTOMATED AUTHENTICATION, PROCESSING AND ISSUANCE OF DIGITAL CERTIFICATES - A computer system and process for issuing digital certificates use domain-control vetting to issue certificates. A requestor requests a certificate from a certificate authority, which identifies at least one approver to approve issuance of the digital certificate. If approved, the certificate authority accepts the request, creates and signs the certificate, and the signed certificate is sent to the requester. | 05-21-2009 |
20090106211 | System and Method for Processing DNS Queries - Embodiments of the present invention provide a method and system for high-speed database searching with concurrent updating, without the use of database locks or access controls, for large database systems. Specifically, a plurality of search queries may be received over a network, the database may be searched, and a plurality of search replies may be sent over the network. While searching the database, new information received over the network may be incorporated into the database by creating a new element based on the new information and writing a pointer to the new element to the database using a single uninterruptible operation. | 04-23-2009 |
20090069040 | SYSTEM AND METHOD FOR PROVIDING COMMERCIAL SERVICES OVER A WIRELESS COMMUNICATION NETWORK - The inventive system provides real-time commercial services to users of mobile communication devices (MCDs) over a wireless communication network utilizing the short message service protocol (SMS). The inventive system establishes a dialog with a user of an MCD utilizing SMS to present the user with commercial service options and to allow the user to quickly and easily purchase the services by sending minimal SMS responses during the dialog process. Preferably, prior to utilization of the inventive system, the user subscribes with a service provider to pre-arrange payment options for purchased services, to provide information helpful in tailoring offered services and service options to the user, and optionally to receive enhanced services (such as discounted and/or last minute offers, etc.). Utilization of the inventive system occurs in three phases: trigger, purchase and claim. During the trigger phase (user or service provider initiated), the service to be purchased is selected. During the purchase phase, the user selects the grade and quantity of services to be purchased and authorizes payment which is processed by the service provider and thereafter receives a unique service code. During the claim phase, the user presents the service code at the service location, which is then verified using a local terminal, and the service is then delivered to the user. The inventive dialog process can be advantageously and readily configured for a wide variety of commercial services, including, but not limited to entertainment site admissions and travel. | 03-12-2009 |
20080273535 | METHOD AND APPARATUS FOR ASSIGNING A VIRTUAL ADDRESS TO AND TEXT-MESSAGING TO MULTIPLE TEXT-CAPABLE DESTINATION ENTITIES - A virtual address is configured. A destination address and a capability information associated with each destination entity of a set of destination entities associated with a destination party are configured. Each destination entity from the set of destination entities is a push-capable, text-message-capable entity. Each destination entity from the set of destination entities is associated with a virtual address. The virtual address defines a destination remote from the destination party and remote from premises associated with the destination party. | 11-06-2008 |