H04L61/302

System and method for domain name valuation

A method and a computer system for performing the method of determining an initial value or lifetime value for a domain name is provided. The method for determining an initial value includes obtaining, over a communication network, a domain name from requestor; obtaining, over the communication network, one or more inputs from one or more domain name data sources; applying the one or more inputs and the domain name to an initial lifetime worth computer model, wherein the one or more inputs comprise data related to comparable historical domain names, data from a linguistic model analysis, data from a linguistic frequency list, and data related to a second-level domain to top-level domain relationship analysis; determining, by a hardware processor, an initial lifetime worth for the domain name based on the initial lifetime worth computer model; and providing the initial lifetime worth for the domain name to the requestor.

Message Identification, Processing, and monitoring Systems and Methods For Communications Commerce
20180013709 · 2018-01-11 ·

Systems and methods are provided for embedding a sender's unique identification in a digital message, for providing additional communication data to a recipient device, and for controlling communications between the sender and multiple recipients and among those recipients depending on the sender's preferences, among other embodiments.

Coordinating transactions for domain names administered using a domain name portfolio

A method for coordinating transactions for domain names to register a plurality of domain names with a domain name portfolio stored in a storage, such that each of the domain names in a plurality of domain names belongs to only the domain name portfolio as a unique member of the domain name portfolio; associate a portfolio account with the domain name portfolio, the portfolio account configured for managing a pool of funds available for use in payment of the transactions for said each of the domain names of the plurality of domain names; receive credit payment instructions attributed to the portfolio account, the credit payment instructions containing a credit payment amount; record the credit payment amount against the pool of funds in order to increase a level of the pool of funds; receive debit payment instructions associated with a domain name of the domain name portfolio and domain name transaction information associated with the transaction for the domain name; record the debit payment amount against the pool of funds in order to decrease the level of the pool of funds; and generate and send a periodic report over the network detailing the level of the pool of funds and the transaction applied against two or more of the domain names as members of the domain name portfolio.

Systems and methods for preserving privacy of a registrant in a domain name system (“DNS”)
11706036 · 2023-07-18 · ·

A method and a computer system is provided for executing the method for providing a registration data directory service (RDDS). The method includes obtaining, at a RDDS, a RDDS query comprising a location assertion from a RDDS client from a RDDS client; providing, by the RDDS, a request for personally identifying information (PII) for the RDDS query from a privacy provider, wherein the request comprises the location assertion; obtaining, by the RDDS, the PII for the RDDS query; and providing, by the RDDS, a response to the RDDS query to the RDDS client, wherein the response comprises PII.

Using a learning algorithm to suggest domain names

Methods are taught for creating training data for a learning algorithm, training the learning algorithm with the training data and using the trained learning algorithm to suggest domain names to users. A domain name registrar may store activities of a user on a registrar website. Preferably, domain name searches, selected suggested domain names and domain names registered to the user are stored as the training data in a training database. The training data may be stored so that earlier activities act as inputs to the learning algorithm while later activities are the expected outputs of the learning algorithm. Once trained, the learning algorithm may receive activities of other users and suggest domain names to the other users based on their activities.

DNS-based public key infrastructure for digital object architectures

One embodiment of the present application sets forth a computer-implemented method for establishing trust for handles used to identify digital objects in a digital object architecture (DOA) by associating a first attester identifier with a first attester from a trusted public key infrastructure (PKI), identifying a first digital object public key for a first digital object, generating, by the first attester, a first digital object identity attestation that associates the first digital object public key with a handle identifier for the first digital object, wherein the handle identifier is external to the trusted PKI, and generating a first attester identity attestation attesting that the first attester is authentic, where the first attester identity attestation includes the first attester identifier.

Verification of domain events

A method for verifying eligibility of a domain name registrant via a verification web interface for a domain name either registered or in the process of registration with a registrar over a communications network. The method comprising: provide a network link to the registrar or to a registry operator of the domain name; receive an event request for the domain name via the verification web interface including a claim ID associated with the domain name for a domain event; receive a verification request using the network link via the verification web interface including a registrant claim ID and registrant identification information, the registrant claim ID previously provided to the registrant; confirm matching of the registrant claim ID with the claim ID; obtain registrant verification information; access external verification information and compare against the registrant verification information a confirm domain event message or a deny domain event message.

DOMAIN SQUATTING DETECTION
20230057438 · 2023-02-23 ·

Detection of squatting domains is disclosed. A set of new fully qualified domain names (FQDNs) is received. The set of new FQDNs is analyzed to detect domain squatting by identifying a subset of the new FQDNs as candidate squatting domains. The candidate squatting domains are distributed to a security device/service.

Machine learning-based generation of similar domain names

A method of generating receiving a valid domain name comprises evaluating a received valid domain name in a neural network trained to generate similar domain names, and providing an output comprising at least one domain name similar to the received valid domain name generated by the neural network. In a further example, a recurrent neural network is trained using valid domain names and observed malicious similar domain names and/or linguistic rules. In another example, the output of the recurrent neural network further comprises a similarity score reflecting a degree of similarity between the valid domain name and the similar domain name, such that the similarity score can be used to generate a ranked list of domain names similar to the valid domain name.

Systems and methods for secure authorization of registry functions

Systems, methods, and computer-readable storage media for enabling secure transfer of Internet domains between registrars. An example method can include receiving, at a registry, a request from a first registrar for information associated with an object recorded in the registry and registered by the first registrar, then generating, at the registry, an authorization code, the authorization code having an expiration. The registry can then transmit, to the first registrar, the authorization code, which in turn can be given to the registrant. The registrant can forward the authorization code to the second registrar, and the registry can receive, from a second registrar before the expiration has been reached: the authorization code and a transfer request for the object, the transfer request identifying a transfer of the object from the first registrar to the second registrar. At that point the registry can verify the authorization code authorize the transfer request of the object from the first registrar to the second registrar.