摘要:
Embodiments relate to systems, devices, and computer-implemented methods for characterizing domain names by determining a name server switching footprint for domain names using a data set corresponding to name server operations for the domain names. The domain names can be clustered into groups based on the name server switching footprints, and intended uses of domain names in a group can be extrapolated to other domain names in the group. Name server switching footprints can also be predicted for new domains names using a prediction model trained using the determined name server switching footprints for the domain names in the data set.
摘要:
A system, and computer-readable memory containing instructions include requesting a tokenizing authority to provide a tokenized string that represent a domain name, using the tokenized domain name string to perform a lookup against a database of registered tokenized domain name strings, determining whether the tokenized domain name string exists in the database, and returning results based on the existence of tokenized domain name strings and optionally variants thereof. The method, system, and computer-readable memory may further include returning an encryption key corresponding to an encrypted record of information related to the domain name corresponding to the tokenized domain name string.
摘要:
Method and system for routing EPP requests over a network are provided. A routing system includes multiple frontend service interfaces, one or more gateways, a management server, and a backend service platform that provides multiple application services. The frontend service interfaces are addressable using virtual IP addresses ("VIP") and can be provided by the gateways. The routing system defines a many-to-many mapping between the frontend service interfaces and a set of services provided by the backend service platform. A requestor can send a request over EPP to a targeted service interface to access one or more backend services, by sending the request to a target IP or domain name that corresponds to a VIP associated with the targeted service interface. Using the many-to-many mapping and the VIP of the targeted service interface, the routing system can identify backend services sought by the request and provide the requestor with access to the backend services.
摘要:
Methods and systems are disclosed for quickly providing Whois services to a new top level domain after it is provisioned in a registry. In one embodiment, domain data is received at a first system regarding a top level domain (TLD). The domain data is assigned an authoritative port of a Whois server and is provisioned in a registry database. In certain embodiments, the Whois server provides information relating to domain name registrations of the TLD in the database, according to the authoritative port. The Whois server determines that a Whois query is received at the authoritative port for the queried TLD and responds with the queried information. To the requester, the responses appear as if they are sent from a unique Whois server for each TLD, but the Whois server is actually shared among the TLDs.
摘要:
A system and method for modifying a bulk set of domain names through bulk operations. A request to modify a bulk set of data associated with domain names is received by a registry. A bulk processing engine associated with the registry can analyze the requested update job, and enforce compliance with a set of policies governing the operation of registry. A priority level can also be assigned to the requested job, so that it will be executed before or after other pending jobs. The user can likewise provide user-supplied policies, which can also be validated against the set of registry policies. Data faults can be reduced or eliminated, and update operations can be performed by comparatively inexperienced personnel.
摘要:
A mechanism to pro-actively combat domain abuse that can be used by one or more of TLD operators, registrars and their delegated resellers, and ultimately registrants is disclosed. A computer receives a plurality of disparate abuse feeds, each abuse feed comprising data relating to particular subset of potential domain name abuse and applies one or more filters to the data to create a custom abuse feed, then groups the filtered data from the custom abuse feed into groups of data based on priority levels. For each of the groups of data, one or more corresponding workflows are performed in response to the potential domain name abuse. The net benefit is to all parties, including Internet end-users, by reducing costs and harms associated with domain name abuse, such as fraud, theft, false products, false medication, and the like. Embodiments of the invention are disclosed.
摘要:
Disclosed embodiments provide domain name registration, e-mail registration, e-mail forwarding, and other services via resource-limited interfaces, such as SMS-based services. Domain names may be requested, registered, and managed, and e-mail addresses may be requested and forwarding options selected by a user by way of a resource-limited device or protocol. E-mails may be provided to a user over an e-mail-to-SMS forwarding system.
摘要:
Systems and methods for creating a new domain, such as a top-level domain or a second-level domain, make use of a Domain Manager that enables a user to enter data that is necessary or optional to implement the creation of a new domain. Systems such as, for example, a Registry and one or more Registrars, may use the data defined by the Domain Manager to create a new domain.
摘要:
A system, method, and computer-readable medium, is described that implements a repository object history ("WhoWas") service that receives a WhoWas query to retrieve historical information about a repository object's change history, including a domain's registration activity. The WhoWas service searches repository object history information, formats it, and returns the results. The WhoWas service may be restricted to authorized users and may charge a fee for use. The service may also perform statistical data gathering based on historical WhoWas information, including on subsets of domains based on particular domain characteristics. In addition, historic IP address information and location information may be gathered and returned.