摘要:
A method for administering a top-level domain by analyzing domain name registrations for requests for suspicious or malicious domain names. A request to register a domain name is received (401). The requested domain name's information may be stored in a registry database. The requested domain name may also be conditionally stored in the domain name system (DNS) zone. The requested domain name is compared to a list of botnet domain names stored in a watch list database (403). If the requested domain name corresponds to one of the botnet domain names, the requested domain name is prevented from being added to the DNS zone or is removed from the DNS zone, if it has already been stored there (405). The information regarding the requested domain name is stored in the registry database, even if the domain name does not ultimately stay in the DNS zone (409).
摘要:
Systems, methods, and apparatuses consistent with the invention relate to protecting namespaces. In one exemplary implementation, the systems, methods, and apparatuses may validate whether or not there is consistency of sponsorship between a first namespace and a second namespace grouped with the first namespace, and perform an action related to the first namespace if there is consistency of sponsorship.
摘要:
Systems and methods for performing DNSSEC signing are described in which digital signature operations may be performed by a network accessible signing server that is configured to interact with a separate client application. Exemplary methods may include receiving a signing request at the signing server from the client application to sign first data. The signing server may determine an active KSK and/or an active ZSK for the first data. The first data may then be transmitted by the signing server to a digital signature modules, which may include, for example, a hardware support module, or software signing applications. The signing server may receive a digitally signed version of the first data from the digital signature module, and provide the signed first data to the client application.
摘要:
Systems, methods, and apparatuses consistent with the invention relate to protecting namespaces. In one exemplary implementation, the systems, methods, and apparatuses may validate whether or not there is consistency of sponsorship between a first namespace and a second namespace grouped with the first namespace, and perform an action related to the first namespace if there is consistency of sponsorship.
摘要:
A method for administering a top-level domain by analyzing domain name registrations for requests for suspicious or malicious domain names. A request to register a domain name is received (401). The requested domain name's information may be stored in a registry database. The requested domain name may also be conditionally stored in the domain name system (DNS) zone. The requested domain name is compared to a list of botnet domain names stored in a watch list database (403). If the requested domain name corresponds to one of the botnet domain names, the requested domain name is prevented from being added to the DNS zone or is removed from the DNS zone, if it has already been stored there (405). The information regarding the requested domain name is stored in the registry database, even if the domain name does not ultimately stay in the DNS zone (409).
摘要:
Method and system for routing EPP requests over a network are provided. A routing system includes multiple frontend service interfaces, one or more gateways, a management server, and a backend service platform that provides multiple application services. The frontend service interfaces are addressable using virtual IP addresses ("VIP") and can be provided by the gateways. The routing system defines a many-to-many mapping between the frontend service interfaces and a set of services provided by the backend service platform. A requestor can send a request over EPP to a targeted service interface to access one or more backend services, by sending the request to a target IP or domain name that corresponds to a VIP associated with the targeted service interface. Using the many-to-many mapping and the VIP of the targeted service interface, the routing system can identify backend services sought by the request and provide the requestor with access to the backend services.