摘要:
A Hosting Entity or another entity may provide a framework for collecting DNS Business Information from a Controlling Party of a domain name and entering it into DNS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting DNS Business Information from Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. DNS Business Information will be typically available for viewing to everyone along with the traditional DNS information.
摘要:
A Hosting Entity or another entity may provide a framework for collecting DNS Business Information from a Non-Controlling Party of a domain name and entering it into DNS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting DNS Business Information from Non-Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. DNS Business Information will be typically available for viewing to everyone along with the traditional DNS information.
摘要:
A Registering Entity or another entity may provide a framework for collecting WHOIS Business Information from a Non-Controlling Party of a domain name and entering it into WHOIS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting WHOIS Business Information from Non-Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. WHOIS Business Information will be typically available for viewing to everyone along with the traditional WHOIS information.
摘要:
A Hosting Entity or another entity may provide a framework for collecting DNS Business Information from a Controlling Party of a domain name and entering it into DNS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting DNS Business Information from Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. DNS Business Information will be typically available for viewing to everyone along with the traditional DNS information.
摘要:
A Hosting Entity or another entity may provide a framework for collecting DNS Business Information from a Non-Controlling Party of a domain name and entering it into DNS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting DNS Business Information from Non-Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. DNS Business Information will be typically available for viewing to everyone along with the traditional DNS information.
摘要:
A Registering Entity or another entity may provide a framework for collecting WHOIS Business Information from a Non-Controlling Party of a domain name and entering it into WHOIS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting WHOIS Business Information from Non-Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. WHOIS Business Information will be typically available for viewing to everyone along with the traditional WHOIS information.
摘要:
Methods of the present inventions allow for verifying the authenticity of social website accounts. An example embodiment of a domain name control based social website account authentication method may comprise the steps of receiving a request (that may include a business name and a business email address) to verify the authenticity of a social website account, determining whether the domain name used by the business email address is registered to and under control of the business, and—if so—certifying the authenticity of the social website account.
摘要:
Methods of the present inventions allow for verifying the authenticity of social website accounts. An example embodiment of a business validation based social website account authentication method may comprise the steps of receiving a request (that may include a business name and a business email address) to verify the authenticity of a social website account, validating the business name and business email address, and determining whether the domain name is registered to and under control of the business. If the business name and business email address are both validated, and the domain name is registered to and under control of the business, the social website account's authenticity may be certified.
摘要:
Methods of the present inventions allow for verifying the authenticity of social website accounts. An example embodiment of a public key certificate based social website account authentication method may comprise the steps of receiving a request (that may include a business name and a business email address) to verify the authenticity of a social website account and determining whether a public key certificate has been issued for the domain name used by the business email address. If a public key certificate has been issued, the method may further comprise determining whether the public key certificate identifies the business name and/or domain name provided in the original request. If so, the method may further comprise determining whether the business email address is under the control of the business and, if so, certifying the authenticity of the social website account.
摘要:
Methods of the present inventions allow for verifying the authenticity of social website accounts. An example embodiment of a domain name control based social website account authentication method may comprise the steps of receiving a request (that may include a business name and a business email address) to verify the authenticity of a social website account, determining whether the domain name used by the business email address is registered to and under control of the business, and—if so—certifying the authenticity of the social website account.