Patent classifications
H04L61/3025
System and method for managing network connected devices
A system for managing network connected devices, comprising at least one hardware processor adapted to produce a plurality of unique device descriptors, each describing one of a plurality of network connected devices, by: for each of a plurality of device descriptors, each having a plurality of supported actions, and one or more domain device identifiers, each identifier associating the device descriptor with one of a plurality of management domains: for each of the plurality of management domains not associated with the device descriptor: instructing execution on a network connected device described by the device descriptor a domain identification query according to the descriptor's plurality of supported actions, to determine a new domain device identifier; identifying in the plurality of device descriptors a second device descriptor having a domain device identifier equal to the new domain device identifier; and merging the device descriptor with the second device descriptor.
Systems and methods for secure authorization of registry functions
Systems, methods, and computer-readable storage media for enabling secure transfer of Internet domains between registrars. An example method can include receiving, at a registry, a request from a first registrar for information associated with an object recorded in the registry and registered by the first registrar, then generating, at the registry, an authorization code, the authorization code having an expiration. The registry can then transmit, to the first registrar, the authorization code, which in turn can be given to the registrant. The registrant can forward the authorization code to the second registrar, and the registry can receive, from a second registrar before the expiration has been reached: the authorization code and a transfer request for the object, the transfer request identifying a transfer of the object from the first registrar to the second registrar. At that point the registry can verify the authorization code authorize the transfer request of the object from the first registrar to the second registrar.
EMAIL MESSAGE RECEIVING SYSTEM IN A CLOUD INFRASTRUCTURE
A new and improved onboarding process for configuring and activating an email message receiving system (EMRS) to accept and process email messages on behalf of a customer is disclosed. The process comprises generating a customer-account-specific Domain Name Server (DNS) name that identifies a customer of the EMRS and a mail server for accepting and processing email messages for a domain associated with the customer. The process includes providing the customer-account-specific DNS name to the customer, receiving a request to process email messages for the domain associated with the customer and identifying using the customer-account-specific DNS name, the mail server for receiving the email messages for the domain. The process further includes verifying, using the customer-account-specific DNS name, that the customer has permission for receiving the email messages for the domain. The process includes processing the email messages and delivering the messages to a destination system.
Protecting Internet of Things (IoT) Devices at the Network Level
An Internet of Things (IoT) protection service at the network level is described. A secure session is established between an edge server and an IoT client that is requesting to send data to an IoT device. The edge server receives the request from the IoT client over the secure session instead of the IoT device directly because a Domain Name System (DNS) request for a unique fully qualified domain name assigned to the IoT device returns an IP address of the edge server instead of an IP address of the IoT device. The edge server analyzes the request to determine whether to transmit the request to the IoT device, including applying web application firewall rule(s) against the request. If the request does not trigger any rule, then the edge server transmits the request to the IoT device. If the request triggers any rule, then the edge server blocks the request.
Domain name determination
Systems and methods are disclosed for provide alternative domain names for a single Internet website to different users in results of search queries. The systems and methods can perform operations including maintaining alternative domain names for a single webpage of a content provider and associated context information of the alternative domain names. The operations also include receiving a request for the context information and providing the context information in response to the request. The operations further include receiving a notification of usage of an alternative domain name based on the context information. Additionally, the operations include determining usage metrics for the plurality of alternative domain names of the content provider based on the usage information. Moreover, the operations include periodically culling alternative domain names of the content provider based on the usage metrics.
Methods and systems for identifying malware enabled by automatically generated domain names
Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.
GATEWAY SELECTION FOR PRIVATE WIRELESS NETWORKS
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may determine whether a geographic location code associated with a geographic location of the UE matches a geographic location code in a received message. Based on the determination, the UE may select a non-public network (NPN) function. Additionally or alternatively, a UE may discover or select an NPN function based on determining that legal requirements, such as one or more interception conditions, are independent of the geographic location of the UE. For example, the UE may discover and one or more NPN functions according to a query performed using an NPN function identifier or an NPN identifier. The UE may determine that the NPN function selection (e.g., for a geographic location of the UE) is independent of an interception condition (e.g., associated with the geographic location of the UE).
Domain name operation verification code generation and/or verification
System, apparatus, methods, and computer-readable medium for generating a verification code related to a registry operation request are provided. A verification process may be performed to determine if a verification request related to a registry operation is to be approved. If the request is to be approved, a verification code is generated that includes identifying information of a verification service provider and a code indicating that the request has been verified.
Alternate character set domain name suggestion and registration using translation and/or transliteration
Some embodiments provide domain name suggestions based on a user-provided ASCII phrase translated and/or transliterated into any of a number of supported non-English language character sets. To suggest non-English-language domain names, some embodiments parse, translate, and transliterate the user-provided ASCII names into domain names that include at least one non-English language character. Moreover, some embodiments determine the DNS registration status (e.g., as a second-level domain) of the Punycode (in ASCII) corresponding to these non-English domain names and provide the user with the ability to register any that are unregistered.
Dynamic binding and load determination in a content delivery network (CDN)
A content provider has a plurality of content provider domain names, and a content delivery network (CDN) allocates a plurality of CDN domain names to the particular content provider. The content provider domain names are mapped to the CDN domain names. CDN domain names are bound to corresponding CDN clusters. The binding of the of CDN domain names to corresponding CDN clusters is modified.