H04L61/3015

Verification of domain events

A method for verifying eligibility of a domain name registrant via a verification web interface for a domain name either registered or in the process of registration with a registrar over a communications network. The method comprising: provide a network link to the registrar or to a registry operator of the domain name; receive an event request for the domain name via the verification web interface including a claim ID associated with the domain name for a domain event; receive a verification request using the network link via the verification web interface including a registrant claim ID and registrant identification information, the registrant claim ID previously provided to the registrant; confirm matching of the registrant claim ID with the claim ID; obtain registrant verification information; access external verification information and compare against the registrant verification information a confirm domain event message or a deny domain event message.

Method, Apparatus, and System for Sending Control Request Based on Key Value Configuration
20220394010 · 2022-12-08 ·

A method, an apparatus, and a system for sending a control request based on a key value configuration. The method includes generating, by a client controller, a control request, wherein having a plurality of configuration parameters, wherein the plurality of configuration parameters comprise a flexible key value, a control object name, and a universally unique identifier (UUID), where the flexible key value identifies a requested control object, and the flexible key value is determined using at least one of the control object name or the UUID, and sending, by the client controller, the control request to a server controller, where the control request indicates to the server controller to configure the control object.

Method, Apparatus, and System for Sending Control Request Based on Key Value Configuration
20220394010 · 2022-12-08 ·

A method, an apparatus, and a system for sending a control request based on a key value configuration. The method includes generating, by a client controller, a control request, wherein having a plurality of configuration parameters, wherein the plurality of configuration parameters comprise a flexible key value, a control object name, and a universally unique identifier (UUID), where the flexible key value identifies a requested control object, and the flexible key value is determined using at least one of the control object name or the UUID, and sending, by the client controller, the control request to a server controller, where the control request indicates to the server controller to configure the control object.

Malware detection method for preventing execution of malware, method for detecting domain generation algorithm, and computer device therefor
11522906 · 2022-12-06 · ·

A malware detection method for preventing execution of malware, a method for detecting a domain generation algorithm, and a computer device therefor are provided. The malware detection method includes monitoring, by a processor of a computer, domain name system (DNS) query requests for all processes and replies to the query requests and counting, by the processor, the number of times of failure DNS query requests per unit process and determining, by the processor, malware.

Domain name permutation
11588826 · 2023-02-21 · ·

Methods and systems for identifying a network threat are disclosed. The methods described herein may involve receiving at least one permutation of a domain name, wherein the at least one permutation is registered with a domain name registrar. The methods described herein may further involve executing a scanning function to identify an active service on the at least one permutation registered with the domain name registrar and implementing a threat prevention procedure upon identifying an active service on the at least one permutation.

Systems and methods of monitoring network devices
11502929 · 2022-11-15 · ·

Implementations of the disclosed subject matter provide systems and methods of assigning, at a server, a unique identifier to each of a plurality of devices communicatively coupled to one another and the server via a communications network. Each unique identifier may be converted to a device hash key by applying a hash function. A range of device hash keys of the plurality of devices may be split into N approximately equal sectors, where N is a prime number and each sector includes 1/N of the device hash keys of the plurality of the devices. K monitoring workers provided by the server may monitor the plurality of devices in an order based on the respective device hash key, where K is an integer.

Systems and methods of monitoring network devices
11502929 · 2022-11-15 · ·

Implementations of the disclosed subject matter provide systems and methods of assigning, at a server, a unique identifier to each of a plurality of devices communicatively coupled to one another and the server via a communications network. Each unique identifier may be converted to a device hash key by applying a hash function. A range of device hash keys of the plurality of devices may be split into N approximately equal sectors, where N is a prime number and each sector includes 1/N of the device hash keys of the plurality of the devices. K monitoring workers provided by the server may monitor the plurality of devices in an order based on the respective device hash key, where K is an integer.

System, method, and computer program for AWS autoscaling of Tuxedo systems

As described herein, a system, method, and computer program are provided for AWS autoscaling of Tuxedo systems. In use, an AWS cloud based deployment of a Tuxedo system is identified. Further, autoscaling of the Tuxedo system is provided in accordance with an autoscaling configuration of the AWS, using a Tuxedo registrar that maps AWS EC2 DNS names or internet protocol (IP) addresses with Tuxedo-compliant names capable of being used by the Tuxedo system.

System, method, and computer program for AWS autoscaling of Tuxedo systems

As described herein, a system, method, and computer program are provided for AWS autoscaling of Tuxedo systems. In use, an AWS cloud based deployment of a Tuxedo system is identified. Further, autoscaling of the Tuxedo system is provided in accordance with an autoscaling configuration of the AWS, using a Tuxedo registrar that maps AWS EC2 DNS names or internet protocol (IP) addresses with Tuxedo-compliant names capable of being used by the Tuxedo system.

SYSTEMS, DEVICES, AND METHODS FOR IMPROVED AFFIX-BASED DOMAIN NAME SUGGESTION
20230043891 · 2023-02-09 · ·

Embodiments relate to systems, devices, and computing-implemented methods for generating domain name suggestions by obtaining a domain name suggestion input that includes textual data, segmenting the textual data into tokens, obtaining a list of possible affixes to the textual data, determining conditional probabilities for the possible affixes using a language model, ranking the list of possible affixes based on the conditional probabilities to generate a ranked list of affixes, and generating domain name suggestions based on the ranked list of affixes.