摘要:
Provided is a method for subscribing to a data feed from an internet of things ("IoT") device (105). The method comprises obtaining, by a subscribe application program interface ("API") (135) of a container (115), a subscription request to subscribe to the data feed from a requestor (140), wherein the container (115) is operable to provide one or more services to an internet of things ("IoT") device (105) through one or more application programming interfaces ("APIs"), wherein subscription request is associated with data stored in one or more domain name system ("DNS") records; determining that the subscription request is permissible based on a list of approved requestors (140); and providing the data feed to the requestor (140), wherein the requestor (140) is another container (115) or another IoT device (105).
摘要:
Provided is a method for establishing ownership of a component of an internet of things ("IoT") device. The method comprises receiving, at a registration service, a request to register the component of the IoT device, the request comprising a public key of the component of the IoT device, an identifier of the component of the IoT device, and a public key of an owner of the component of the IoT device; determining a qualified name for the component of the IoT device based on a name associated with the owner of the component of the IoT device; generating one or more domain name system ("DNS") records for the component of the IoT device, the one or more DNS records comprising an authentication or authorization file that identifies a chain of ownership of the component of the IoT device; and storing the one or more DNS records in a registry.
摘要:
Alternative keyword inputs may be generated based on an input keyword input (310). Multiple n-grams may be determined from the input keyword input (320). Combinations of n-grams may be generated (330). Pronounceability of the combinations may be determined (340). Combinations of n-grams with pronounceability that exceed a predetermined threshold may be provided (350).
摘要:
Embodiments relate to systems, devices, and computer-implemented methods for managing domain name space collisions by accessing information, such as a domain name string, corresponding to a domain name resolution request and response. Based on at least the domain name string, a type of use value associated with the request can be determined. Based on at least the type of use value, a name collision risk value for the request can be determined. If the name collision risk value indicates there is a specified risk of a domain name string collision, then a domain name collision mitigation strategy can be generated and/or implemented.
摘要:
Implementations relate to systems (110) and methods for configuring a probe server network using a reliability model. A company, customer, or organization may wish to outsource the management of a set of name servers used to operate a domain name, such as a domain name associated with a Web site. In aspects, that deployment of name servers can be monitored by a separate set of failover or probe servers which are configured to track the uptime, operability, and performance of the underlying name servers, which can number in the thousands. An administrator or other user may wish to determine a minimum number of probe servers to apply to the name server topology, to achieve desired service levels. According to aspects, automated tools and logic are provided which model and simulate the overall network including the number and arrangement of necessary probe servers to ensure performance, failover reliability, and other factors.
摘要:
Techniques for inferring the existence of suspicious software by detecting multiple name server requests for the same sets of non-existent domains. Implementations can allow for detecting the existence of malware or other suspicious software without requiring reverse engineering of the malware's domain generation algorithm.
摘要:
A system and method for establishing a chain of trust from a registrant to a registry. A registrant request to a registrar to change a domain name record includes at least one registrant factor, such as a one time password. The registrar can formulate an extended EPP command that includes the factor to effectuate the change and send it to a registry. The registry can verify the at least one factor using at least one validation server. If the factor is successfully verified, the EPP can be processed by the registry. If the factor is not verified, the EPP command may not be processed and an error message may be generated and sent to the registrar.
摘要:
Techniques for inferring the existence of suspicious software by detecting multiple name server requests for the same sets of non-existent domains. Implementations can allow for detecting the existence of malware or other suspicious software without requiring reverse engineering of the malware's domain generation algorithm.