US20090248623A1 - Accessing digital identity related reputation data - Google Patents
Accessing digital identity related reputation data Download PDFInfo
- Publication number
- US20090248623A1 US20090248623A1 US12/482,306 US48230609A US2009248623A1 US 20090248623 A1 US20090248623 A1 US 20090248623A1 US 48230609 A US48230609 A US 48230609A US 2009248623 A1 US2009248623 A1 US 2009248623A1
- Authority
- US
- United States
- Prior art keywords
- digital identity
- reputation
- data
- records
- registrant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 82
- 230000000694 effects Effects 0.000 claims abstract description 9
- 230000008569 process Effects 0.000 abstract description 23
- 238000010200 validation analysis Methods 0.000 description 41
- 239000003550 marker Substances 0.000 description 22
- 238000012795 verification Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 230000002207 retinal effect Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 238000012552 review Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 201000009032 substance abuse Diseases 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002349 favourable effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002068 genetic effect Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000010845 search algorithm Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- LFQSCWFLJHTTHZ-UHFFFAOYSA-N Ethanol Chemical compound CCO LFQSCWFLJHTTHZ-UHFFFAOYSA-N 0.000 description 1
- 208000001613 Gambling Diseases 0.000 description 1
- 241000208125 Nicotiana Species 0.000 description 1
- 235000002637 Nicotiana tabacum Nutrition 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 230000003028 elevating effect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 238000005494 tarnishing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1076—Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]
- H04L65/1079—Screening of IP real time communications, e.g. spam over Internet telephony [SPIT] of unsolicited session attempts, e.g. SPIT
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Definitions
- the present inventions relate generally to managing Internet digital identities and, more specifically, systems and methods for registering digital identities, validating digital identity origin and ownership, and tracking and publishing digital identity related reputation data.
- the Internet is a worldwide network of computers and computer networks arranged to allow the easy and robust exchange of information between users of computers.
- ISPs Internet Service Providers
- Content providers place multimedia information, i.e. text, graphics, sounds, and other forms of data, at specific locations on the Internet referred to as websites.
- the combination of all the websites and their corresponding webpages on the Internet is generally known as the World Wide Web (WWW) or simply the Web.
- WWW World Wide Web
- Websites may be created using HyperText Markup Language (HTML) to generate a standard set of tags that define how the webpages for the website are to be displayed.
- Users of the Internet may access content providers' websites using software known as an Internet browser, such as MICROSOFT INTERNET EXPLORER or NETSCAPE NAVIGATOR. After the browser has located the desired webpage, it requests and receives information from the webpage, typically in the form of an HTML document, and then displays the webpage content for the user. The user may then view other webpages at the same website or move to an entirely different website using the browser.
- HTML HyperText Markup Language
- IP Internet Protocol
- Each IP address is a 32 bit binary number, but is typically shown in dotted decimal notion (i.e.—192.145.68.112) to improve human readability. IP addresses, however, even in dotted decimal notation, are difficult for people to remember and use.
- a Uniform Resource Locator (URL) is much easier to remember and may be used to point to any computer, directory, or file on the Internet.
- a browser is able to access a website on the Internet through the use of a URL.
- the URL may include a Hypertext Transfer Protocol (HTTP) request combined with the website's internet address, also known as the website's domain name.
- HTTP Hypertext Transfer Protocol
- An example of a URL with a HTTP request and domain name is: http://www.companyname.com. In this example, the “http” identifies the URL as a HTTP request and the “companyname.com” is the domain name.
- domain names are generally company trademarks, personal names, or short phrases concatenated with a top level domain name (TLD) extension (e.g. .com, .net, .org, .biz, .us, .cc, .ws, .de, etc.).
- TLD extensions can be divided into two groups. The first group is known as generic Top-Level Domains (gTLD) and the second group is country code TLDs (ccTLD). Examples of gTLDs include .com, .net, .org, .biz, etc.
- Examples of current ccTLDs include .us for the United States, .uk and .gb for United Kingdom, .ca for Canada, .de for Germany, .jp for Japan, etc. Most gTLDs are organized through a central domain name Shared Registration System (SRS) based on their TLD.
- SRS Shared Registration System
- the process for registering a domain name with .com, .net, .org and some other TLDs allows an Internet user to use an ICANN-accredited Registrar to register their domain name. For example, if an Internet user, John Doe, wishes to register the domain name “mycompany.com,” John Doe may initially determine whether the desired domain name is available by contacting a domain name Registrar. The Internet user may make this contact using the Registrar's webpage and typing the desired domain name into a field on the Registrar's webpage created for this purpose. Upon receiving the request from the Internet user, the Registrar may ascertain whether “mycompany.com” has already been registered by checking the SRS database associated with the TLD of the domain name.
- the results of the search may then be displayed on the webpage to thereby notify the Internet user of the availability of the domain name. If the domain name is available, the Internet user may proceed with the registration process. Otherwise, the Internet user may keep selecting alternative domain names until an available domain name is found. Domain names are typically registered for a period of one to ten years with first rights to continually re-register the domain name.
- An individual or entities' domain name is increasingly the anchor around which their online presence is maintained.
- a company's website www.companyname.com
- email system [email protected]
- Websites allow individuals and businesses to share their information with a large number of Internet users. Many products and services are offered for sale on the Internet, thus elevating the Internet to an essential tool of commerce. Internet businesses, whether a large corporation or an individual, are rapidly creating websites to take advantage of the growing number of customers using the Internet and customers' increasing willingness to purchase goods and services over the Web. Websites created by Internet businesses may be reached by millions of Internet savvy customers, thereby allowing Internet businesses to offer their products and services to a very large pool of potential customers.
- Some Internet business websites typically those that receive or share sensitive information (i.e.—those associated with banks, credit card companies, online businesses, social organizations, etc.) may require Internet users to login to the website with a secure username and password before accessing the website's content.
- the username/password system is a common form of secret authentication data used to control website access.
- the username/password is kept secret from those not allowed access. Those wishing to gain access are tested on whether or not they have a valid (recognized) username and whether they know the associated password. Internet users are granted or denied access to websites accordingly.
- a digital identity is a set of characteristics by which a person or thing is recognizable or distinguished in the digital realm. Digital identity allows for the electronic recognition of an individual or thing without confusing it for someone or something else.
- URL i.e.—OPENID
- client software i.e.—MICROSOFT WINDOWS CARDSPACE
- URL-based digital identity systems utilize a framework based on the concept that any individual or entity can identify themselves on the Internet with a URL provided by a Digital Identity Provider (i.e.—johndoe.openid.com).
- the Digital Identity Provider maintains an Identity Server on which a Digital Identity Database (a database of provided digital identity URLs and the corresponding authentication passwords) is stored.
- a Digital Identity Database a database of provided digital identity URLs and the corresponding authentication passwords
- the Internet user may utilize their digital identity URL to access various websites. For example, to login to an OPENID-enabled website, the user enters their digital identity URL in the username box. The user is then momentarily redirected to the user's Digital Identity Provider's website (or an authentication window appears) to login using whatever password they have set up with their Digital Identity Provider.
- the Digital Identity Provider sends the participating website an encrypted message (a token) confirming the identity of the person logging in.
- Client-software-based digital identity systems utilize a piece of client software that enables Internet users to securely provide their digital identity to online services.
- CARDSPACE for example, is a framework developed by MICROSOFT that securely stores an individual or entities' digital identity and provides an interface for choosing the appropriate digital identity for a particular transaction, such as logging into a website.
- CARDSPACE pops up a security-hardened user interface with a set of “cards” for the user to choose from. Each card has some identity data associated with it.
- a request in the form of a web service call goes to the Digital Identity Provider, and a signed and encrypted security token is returned containing the required information (i.e.—credit limit, employer's name and address, or perhaps a social security number).
- the user decides whether to release this information to the requesting online service. If the user approves, the token is sent on to the website where the token is processed and the user is authenticated.
- OPENID Digital Identity Providers offering URL-based (OPENID) digital identity services, meaning they offer digital identity URLs and servers to authenticate them.
- an Internet user may wish to participate in an online social network or dating service, offer an item or service for online sale, or post a comment or opinion on a website.
- the Internet user may be identified by their digital identity.
- the Requestor could obtain, review, and assess digital identity related reputation data, including, but not limited to, reputation of the digital identity itself or reputation of a person, entity, user, registrant, URL, domain name, email address, or website associated with the digital identity. The Requestor could then decide whether to interact with the Internet user based upon the digital identity related reputation data with the Subject.
- a Subject i.e.—the individual or entity to whom a digital identity is registered
- the favorable rating would encourage Internet users to engage in online social, e-commerce, or other activities with the Subject.
- Phishing is the luring of sensitive information, such as passwords, credit card numbers, bank accounts, or other personal information, from an Internet user by masquerading as someone trustworthy with a legitimate need for such information.
- Pharming is a hacker's attack aiming to redirect a website's traffic to another (bogus) website. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software.
- Spam or unsolicited email is flooding the Internet with many copies of the identical or nearly identical message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services.
- the limitations cited above and others are substantially overcome through the systems and methods disclosed herein.
- the systems and methods of the present inventions allow for more efficient registration of digital identities, validation of digital identity origin and ownership, and tracking and publication of digital identity related reputation data.
- Certain embodiments of the present inventions take advantage of the unique role of Digital Identity Providers who are also domain name Registries or domain name Registrars, which have access to information that other parties do not. This includes client contact information, billing records, complaints against clients, etc. If the Digital Identity Provider is also a PKI (public key infrastructure) certification authority, it has access to an even wider range of information obtained through a verification process of its clients.
- PKI public key infrastructure
- An example embodiment of a digital identity registration system includes means for receiving a requested digital identity from a prospective Registrant, means for searching a Digital Identity Database for the availability of the digital identity, means for registering, if available, the digital identity to the Registrant, and means for updating the Digital Identity Database to indicate a change in the digital identity's registration status.
- the digital identity comprises a URL that contains a domain name
- the system may further comprise means for confirming whether the domain name is owned by the Registrant. If the domain name is available, the system may further comprise means for offering the domain name for sale and registration.
- the system also may comprise means for receiving digital identity registration information from the Registrant and means for validating the registration information before registering the digital identity. If validated, a Validation Marker may be provided to the Registrant.
- a requested digital identity is received from a Registrant.
- the Digital Identity Database is then searched to determine the availability of the requested digital identity. If available, the requested digital identity is then registered to the Registrant and the Digital Identity Database is updated to indicate the registration. If the digital identity comprises a URL that contains a domain name, the process may confirm whether the Registrant owns or controls the domain name, for example by searching WHOIS records. The process also may receive registration information from the Registrant and validate the registration information from the Registrant prior to registering the requested digital identity.
- An example embodiment of a digital identity validation system includes means for registering a digital identity to a Registrant, a Records Database for storing registration related records, and means for verifying certain information in the records.
- a Digital Identity Provider may maintain the database.
- the information to be verified may include information regarding a Registrant or other person or entity associated with the digital identity.
- the information also may include name, address, phone number, email address, website, URL, or other information.
- the verification means may contact a Registrant, administrative contact, technical contact, or another contact to confirm at least some information in the records.
- a Validation Marker may be provided to the Registrant indicating that the digital identity has been validated.
- the Validation Marker may be a displayable image, a certificate for display on a webpage, a change in appearance for the digital identity, or an audible sound.
- a digital identity is registered to a Registrant.
- the registration records may include information regarding a digital identity, its Registrant, or another person or entity associated with the digital identity. It also may include name, address, phone number, email address, website, URL, or other information.
- the information is then verified. As a non-limiting example, the information may be verified by contacting a Registrant, administrative contact, technical contact, or another contact to confirm at least some information in the records. If the information is verified, the Digital Identity Provider may provide the Registrant with a Validation Marker indicating that the digital identity has been validated.
- a Validation Marker may be in the form of a displayable image, perhaps a digital certificate for display on a webpage, a change in appearance of the digital identity when it appears on a computer screen, or an audible sound.
- An example embodiment of a system for tracking and publishing digital identity related reputation data includes a Digital Identity Provider that maintains a Digital Identity Database for storing a Plurality of Digital Identities and a Reputation Database for storing digital identity related reputation data for one or more digital identities.
- Reputation data may be tracked regarding the digital identity itself, URLs or domain names associated with the digital identity, digital identity purchasers or registrants (whether individuals or entities), or email addresses or websites associated with the digital identity.
- the reputation data may include ratings for various categories, such as email practices, website content, privacy policies and practices, fraudulent activities, domain name related complaints, overall reputation, etc.
- the Digital Identity Provider may update reputation data based on a variety of events related to the digital identity.
- a Requestor When a Requestor is exposed to a digital identity online (i.e.—on a blog, social or dating website, or online sales or auction service), the Requestor may choose to review and assess digital identity related reputation data before opting to further interact with the digital identity.
- An embodiment of the present invention allows a Requestor to access a Reputation Database to review digital identity related reputation data before making this decision.
- the Digital Identity Provider or another party may publish digital identity related reputation data in the WHOIS records.
- Reputation ratings or values may be published in the WHOIS records of the domain name linked to the digital identity.
- links or references to a location of the reputation ratings or values may be published in the WHOIS, such links or references may include a URL link, a DNS address, an IP address, a computer port, or any combination thereof.
- Reputation ratings or values also may be published by the Digital Identity Provider or another party via any means of publication available including, but not limited to, an accessible database, a website, other electronic storage, or printed media.
- One embodiment of the method for publishing the domain name related reputation data in the WHOIS records includes the following steps, the Digital Identity Provider collects digital identity related information and forms digital identity related reputation data. Then, the Digital Identity Provider stores the digital identity related reputation data in the WHOIS records.
- FIG. 1 illustrates a possible embodiment of a digital identity registration system.
- FIG. 2 illustrates a possible embodiment of a digital identity registration system.
- FIG. 3 illustrates a possible embodiment of a digital identity registration system.
- FIG. 4 illustrates a possible embodiment of a digital identity database and a records database.
- FIG. 5 is a flow diagram illustrating possible steps that may be taken with a digital identity registration system.
- FIG. 6 is a flow diagram illustrating possible steps that may be taken with a digital identity registration system.
- FIG. 7 illustrates a possible embodiment of a digital identity validation system.
- FIG. 8 illustrates a possible embodiment of a digital identity validation system.
- FIG. 9 is a flow diagram illustrating possible steps that may be taken with a digital identity validation system.
- FIG. 10 is a flow diagram illustrating possible steps that may be taken with a digital identity validation system.
- FIG. 11 illustrates a possible embodiment of a digital identity tracking and publication system.
- FIG. 12 is a flow diagram illustrating possible steps that may be taken with a digital identity tracking and publication system.
- FIG. 13 is a flow diagram illustrating possible steps that may be taken with a digital identity tracking and publication system.
- FIG. 14 is a flow diagram illustrating possible steps that may be taken with a digital identity tracking and publication system.
- FIG. 1 A streamlined example embodiment of a digital identity registration system is illustrated in FIG. 1 .
- the illustrated embodiment includes means 101 for receiving a requested digital identity from a Registrant 100 , means 102 for determining whether the digital identity is available, and means 103 for registering the digital identity, if available, to the Registrant 100 .
- This embodiment places no limitation on the format of the requested digital identity.
- a requested digital identity may be in the form of a piece of client software, a digital certificate, or a URL comprising any combination of characters-perhaps including a domain name that may be owned by the Registrant 100 .
- FIG. 2 A more detailed example embodiment of a digital identity registration system is illustrated in FIG. 2 .
- the illustrated embodiment includes a Digital Identity Provider 205 , a website 201 , a Digital Identity Database 206 , means 204 for searching the Digital Identity Database, WHOIS records 209 , means 208 for searching WHOIS records 209 , means 210 for validating registration information provided by the Registrant 100 , means 211 for updating the Digital Identity Database 206 , a Records Database 213 , and means 212 for updating the Records Database 213 .
- This embodiment places no limitation on the format of the requested digital identity.
- a requested digital identity may be in the form of a piece of client software, a digital certificate, or a URL comprising any combination of characters-perhaps including a domain name that may be owned by the Registrant 100 .
- the Registrant 100 may be an individual or an entity including, but not limited to, a person, a business, a governmental institution, an educational institution, a non-profit organization, or a social organization.
- the website 201 may be hosted on a server owned or operated by a Digital Identity Provider 205 , which may be a domain name Registrar, Registry, or Reseller.
- the website 201 may be accessible to any Internet user with Internet access.
- the website 201 may have a digital identity field 202 and a registration information field 203 in which a Registrant 100 may enter a requested digital identity and related registration information.
- the requested digital identity may comprise a piece of client software, a digital certificate, a URL comprising any combination of characters—perhaps including a domain name that may be owned by the Registrant 100 , or another security token.
- the registration information could include, among other things, information about the requested digital identity, information about the Registrant 100 , or information about a person, entity, name, address, telephone number, email address, URL, domain name, or website associated with the Registrant 100 of the requested digital identity.
- the information also may include an administrative contact, a technical contact, or an other contact associated with the Registrant 100 of the requested digital identity.
- the information also could comprise biometric identification data, non-limiting examples of which may include a photograph, voiceprint, fingerprint, retinal scan, and/or DNA data.
- the system may include means 204 for searching a Digital Identity Database 206 —that may store a plurality of registered digital identities 207 —for the availability of the requested digital identity.
- the Digital Identity Database 206 may be maintained by a Digital Identity Provider 205 .
- the Digital Identity Database 206 may comprise a local database, online database, desktop database, server-side database, relational database, hierarchical database, network database, object database, object-relational database, associative database, concept-oriented database, entity-attribute-value database, multi-dimensional database, semi-structured database, star schema database, XML database, file, collection of files, spreadsheet, or other means of data storage located on a computer, client, server, or other storage device.
- the Digital Identity Database 206 search may be accomplished by a desktop, network, or online search engine.
- the Digital Identity Database 206 search may utilize uninformed, list, tree, graph, SQL, tradeoff based, informed, adversarial, constraint satisfaction, string, genetic, sorting, probabilistic, tabu, federated, minimax, or ternary search algorithms.
- the system may include means 208 for determining whether the Registrant 100 owns or controls the domain name, perhaps by searching WHOIS records.
- WHOIS records may be maintained by a Registry, a Registrar, and/or another party and are readily accessible over the Internet.
- WHOIS is a TCP-based query/response protocol that is widely used for querying these records to determine the owner of a domain name, an IP address, or an autonomous system number on the Internet.
- the WHOIS search may utilize either a command line interface or a web-based tool and either “thick” or “thin” lookups.
- “Thin” registries store a limited amount of information about a domain name, typically including: “Domain Name,” “Registrar,” “Whois Server,” Referral URL,” “Name Server,” “Status,” “Updated Date,” “Creation Date,” “Expiration Date,” etc. “Thick” registries also store Registrant, Administrative, Technical, and Billing contact information.
- the .info and .biz TLDs are “thick” while .com and .net TLDs are “thin.” Registrars usually store detailed information about the domain names registered through them. Even though the WHOIS records are public, many registries and registrars limit access to the WHOIS data by automated solutions (i.e.—computer programs, scripts, “crawlers,” etc.).
- a domain name Registry or Registrar may avoid such limitations. Additionally, for the domain names registered through a Registrar, the Registrar has access to the domain name registrations, renewals, transfers, expirations, etc. in real time. The instant embodiment is therefore particularly advantageous because the Digital Identity Provider 205 may also be a Registrar, Registry, or Reseller.
- Said determining means 208 also may be performed with a lookup service, such as a quick, lightweight mechanism for obtaining data, possibly utilizing Lightweight Directory Access Protocol (LDAP) or similar protocols as are known in the art. Said determining means 208 also may comprise contacting the Registrant 100 (or another individual or entity) to confirm domain name ownership and/or control.
- a lookup service such as a quick, lightweight mechanism for obtaining data, possibly utilizing Lightweight Directory Access Protocol (LDAP) or similar protocols as are known in the art.
- Said determining means 208 also may comprise contacting the Registrant 100 (or another individual or entity) to confirm domain name ownership and/or control.
- LDAP Lightweight Directory Access Protocol
- the system may include means for the Registrant 100 to purchase and/or register the domain name.
- the purchasing and registering means may comprise a website-enabled domain name purchase and registration system as is known in the art.
- the system also may include means 210 for validating the registration information entered by the Registrant 100 in the registration information field 203 on the website 201 .
- the means 210 for validating registration information are discussed in the “Digital Identity Validation” section below and elsewhere in this application.
- the system also may include means 211 for adding the digital identity to the plurality of registered digital identities 207 stored in the Digital Identity Database 206 . It may also comprise means 212 for adding the Registrant's 100 registration information to the registration-related records 214 stored in a Records Database 213 . These means ( 211 and 212 ) therefore register the digital identity by updating these databases ( 206 and 213 ) to reflect the change in the newly-registered digital identities' registration status.
- FIG. 3 Another example embodiment of a digital identity registration system is illustrated in FIG. 3 .
- the illustrated embodiment includes a website 201 , a Digital Identity Database 206 , a Records Database 213 , means 204 for searching the Digital Identity Database 206 , and means 103 for registering a digital identity.
- the website may have a digital identity field 202 and a registration information field 203 in which a Registrant 100 may enter a requested digital identity and related registration information.
- the means 204 for searching a Digital Identity Database 206 determines the availability of the digital identity entered in the digital identity field 202 , perhaps by searching the Digital Identity Database 206 , which stores a plurality of registered digital identities 207 .
- the means 103 for registering the digital identity may add the digital identity to the Digital Identity Database 206 and add the registration information entered in the registration information field 203 by the Registrant 100 to the Records Database 213 .
- FIG. 4 illustrates a Digital Identity Database 206 that may store a plurality of registered digital identities 207 .
- FIG. 4 also illustrates a Records Database 213 that may store registration related records 214 , such as the name, address, telephone number, email address, and/or other contact information for a Registrant 100 , administrative contact 800 , technical contact 801 , and/or other contact 802 ; a person, entity, name, address, telephone number, email address, URL, domain name, and/or website associated with a Registrant 100 and/or a digital identity; and/or biometric identification data, such as a photograph, voiceprint, fingerprint, retinal scan, and/or DNA data.
- registration related records 214 such as the name, address, telephone number, email address, and/or other contact information for a Registrant 100 , administrative contact 800 , technical contact 801 , and/or other contact 802 ; a person, entity, name, address, telephone number, email address, URL, domain name, and/or website associated with a
- a requested digital identity may be received from a Registrant 100 (Step 500 ).
- the availability of the digital identity is then determined (Step 501 ). If the digital identity is unavailable, the process ends. If available, the digital identity is registered to the Registrant (Step 502 ).
- a Registrant 100 enters a requested digital identity (or perhaps identities) and registration information in data entry fields 202 and 203 on a website 201 .
- the website 201 may be hosted by a Digital Identity Provider 205 , which may be domain name Registrar, Registry, or Reseller.
- the availability of the requested digital identity may be determined (Step 601 ). This may be accomplished by searching a Digital Identity Database 206 —that may store a plurality of registered digital identities 207 —for the availability of the requested domain name. If the digital identity is unavailable, the process may end.
- one or more alternate digital identities may be proposed to the Registrant 100 .
- the alternate digital identities may be similar to (or otherwise based on) the requested digital identity.
- the Registrant 100 may then select an alternate digital identity for registration.
- a next process step may include determining whether the digital identity contains a domain name (Step 602 ) and, if so, whether the domain name is owned or controlled by the Registrant. (Step 603 ). This may be accomplished by searching WHOIS records 209 for registration information regarding the domain name. This also may be accomplished with a lookup service, such as a quick, lightweight mechanism for obtaining data, possibly utilizing Lightweight Directory Access Protocol (LDAP) or similar protocols as are known in the art. It also may comprise contacting the Registrant 100 (or another individual or entity) to confirm domain name ownership and/or control.
- LDAP Lightweight Directory Access Protocol
- the process may end. If the domain name is unregistered and available for registration, the process may include the Registrant 100 to purchase and/or register the domain name. If the Registrant 100 owns or controls the domain name, a next process step may include validating the registration information entered by the Registrant 100 in the registration information field 203 on the website 201 (Step 604 ). This may be accomplished as set forth in the “Digital Identity Validation” section below and elsewhere in this application. If the registration information is not validated, the process may end. If the registration information is validated, a next process step may include registering the digital identity to the Registrant (Step 605 ). This may be accomplished by adding the digital identity to the plurality of registered digital identities 207 stored in the Digital Identity Database 206 and by adding the Registrant's 100 registration information to the registration-related records 214 stored in a Records Database 213 .
- FIG. 7 A streamlined example embodiment of a digital identity validation system is illustrated in FIG. 7 .
- the illustrated embodiment includes means 103 for registering a digital identity to a Registrant 100 , a Records Database 213 for storing registration related records 214 (which may include information regarding the digital identity and/or the Registrant 100 ), and means 700 for verifying the information.
- This embodiment places no limitation on the format of the digital identity to be validated.
- the subject digital identity may be in the form of a piece of client software, a digital certificate, or a URL comprising any combination of characters—perhaps including a domain name that may be owned by the Registrant 100 .
- FIG. 8 A more detailed example embodiment of a digital identity validation system is illustrated in FIG. 8 .
- the illustrated embodiment includes means 103 for registering a digital identity to a Registrant 100 , a Digital Identity Provider 205 , a Records Database 213 for storing registration related records 214 (which may include information regarding the digital identity, the Registrant 100 , a technical contact 800 , an administrative contact 801 , and/or an other contact 802 ), means 700 for verifying the information in the Records Database 213 , means 803 for contacting the Registrant 100 , technical contact 800 , administrative contact 801 , and/or other contact 802 to confirm information in the Records Database 213 , a Validation Marker 804 , and means 805 for providing the Registrant 100 with a Validation Marker 804 .
- the Registrant 100 may be an individual or an entity including, but not limited to, a person, a business, a governmental institution, an educational institution, a non-profit organization, or a social organization.
- the means 103 for registering a digital identity to the Registrant 100 may include the systems and/or methods described in the “Digital Identity Registration” section above and elsewhere in this application. This embodiment places no limitation on the format of the digital identity to be validated.
- a digital identity may be in the form of a piece of client software, a digital certificate, or a URL comprising any combination of characters-perhaps including a domain name that may be owned by the Registrant 100 .
- the instant embodiment also may include a Records Database 213 , which may store registration related records 214 .
- the registration related records 214 stored in the Records Database 214 may comprise information regarding a digital identity, Registrant 100 , technical contact 800 , administrative contact 801 , or other contact 802 , possibly including information regarding a person, entity, name, address, telephone number, URL, email address, domain name, and/or website associated with a digital identity or Registrant 100 .
- the information may also include biometric identification data, non-limiting examples of which may include a photograph, voiceprint, fingerprint, retinal scan, and/or DNA data.
- the records 214 also could include a link or reference regarding a location of an additional registration record.
- the Records Database 213 may comprise a local database, online database, desktop database, server-side database, relational database, hierarchical database, network database, object database, object-relational database, associative database, concept-oriented database, entity-attribute-value database, multi-dimensional database, semi-structured database, star schema database, XML database, file, collection of files, spreadsheet, or other means of data storage located on a computer, client, server, or other storage device.
- the Records Database 213 may be maintained by a Digital Identity Provider 205 , which may be a domain name Registry, Registrar, or Reseller, or another entity that provides digital identities.
- the instant embodiment may include means 700 for verifying at least some of the information in the Records Database 213 .
- This validation may be accomplished by searching the Records Database 213 for at least some information and verifying the information with any person or entity.
- This search may be accomplished by a desktop, network, or online search engine and may utilize uninformed, list, tree, graph, SQL, tradeoff based, informed, adversarial, constraint satisfaction, string, genetic, sorting, probabilistic, tabu, federated, minimax, or ternary search algorithms.
- the verifying means 700 also may comprise means 803 for contacting the Registrant 100 , technical contact 800 , administrative contact 801 , and/or other contact 802 to confirm at least some of the information in the Records Database 213 .
- the verifying means 700 and/or the contacting means 803 could utilize an automated and/or manual process to contact the Registrant 100 , technical contact 800 , administrative contact 801 , and/or other contact 802 to verify information.
- the manual and/or automated processes could be accomplished by a telephone call, email communication, written communication, and or other method of contact as is known in the art.
- a Digital Identity Provider 205 employee may call, email, or write to the Registrant 100 , technical contact 800 , administrative contact 801 , and/or other contact 802 and confirm that at least some of the information contained in the Records Database 213 is accurate.
- This function also could be performed by computer-implemented—or otherwise automated—processes, such as automated calling or email systems as are known in the art.
- the verifying means 700 could also be accomplished by obtaining voice-recognition, visual, written, electronic, and/or biometric verification of at least some of the information in the Records Database.
- Biometric verification systems may include means for obtaining fingerprint, retinal, DNA, or other physical characteristic verification.
- a Registrant 100 may provide one or more physical characteristics that may be processed by an algorithm to create a digital representation of the obtained biometric. The digital representation may then be entered into the Records Database 213 . Verification requires the biometric of the user to be captured again, and processed into a digital template. That template may then be compared to the digital representation stored in the database to determine a match.
- the instant embodiment may include means 805 for providing the Registrant 100 with a Validation Marker 804 .
- a Validation Marker 804 indicates that a digital identity has been validated and may be in the form of a displayable image, perhaps a digital certificate for display on a webpage.
- a Validation Marker 804 also may take the form of a change in appearance of the digital identity when it appears on a computer screen, possibly implemented by a piece of software that alters the digital identity's color, shape, or size.
- a Validation Marker 804 also could be an audible sound, such as an audio file that plays when the digital identity appears on a computer screen.
- Means 805 for providing a Validation Marker 804 to a Registrant 100 include, but are not limited to: (1) sending a piece of software to the Registrant 100 (or other individual or entity) for installation on his computer, server, website, database, or other storage device; (2) storing the Validation Marker 804 on a computer, server, website, database, or other storage device from which the Registrant 100 (or other individual or entity) may retrieve said Validation Marker 804 ; or (3) sending the Validation Marker 804 to a third party for storage on a computer, server, website, database, or other storage device from which the Registrant 100 (or other individual or entity) may retrieve said Validation Marker 804 .
- a digital identity may be registered to a Registrant 100 (Step 900 ).
- one or more registration related records may be collected from the Registrant 100 (Step 901 ). At least some of the information collected from the Registrant 100 is then verified (Step 902 ).
- a digital identity may be registered to a Registrant 100 (Step 900 ). This step may be accomplished by any of the methods described in the “Digital Identity Registration” section above and elsewhere in this application.
- one or more registration related records 214 may be collected from the Registrant 100 (Step 901 ).
- the registration related records 214 may comprise information regarding a digital identity, Registrant 100 , technical contact 800 , administrative contact 801 , or other contact 802 , possibly including information regarding a person, entity, name, address, telephone number, URL, email address, domain name, and/or website associated with a digital identity or Registrant 100 .
- the information may also include biometric identification data, non-limiting examples of which may include a photograph, voiceprint, fingerprint, retinal scan, and/or DNA data.
- the records 214 also could include a link or reference regarding a location of an additional registration record.
- the verification step may be accomplished by contacting the Registrant 100 , technical contact 800 , administrative contact 801 , or other contact 802 (Step 1000 ) and confirming at least some of the information with the contacted person or entity (Step 1001 ).
- the verifying step (Step 902 ) and/or the contacting step (Step 1000 ) could utilize an automated and/or manual process to contact the Registrant 100 , technical contact 800 , administrative contact 801 , and/or other contact 802 to verify information.
- the manual processes could be accomplished by a telephone call, email communication, written communication, and/or in-person contact.
- a Digital Identity Provider 205 employee may call, email, write, or make personal contact with the Registrant 100 , technical contact 800 , administrative contact 801 , and/or other contact 802 and confirm that at least some of the information is accurate.
- These functions also could be performed by a computer-implemented-or otherwise automated-process, such as automated calling or email systems as are known in the art.
- the verification step may be accomplished by obtaining voice-recognition, visual, written, electronic, and/or biometric verification of at least some of the information in the Records Database 213 .
- a Registrant 100 may provide a photograph, voiceprint, fingerprint, retinal scan, DNA, and/or other biometric sample.
- the sample may be in the form of a document, audio file, data file, or other type of computer file.
- This information may then be processed by an algorithm to create a digital representation of the obtained biometric.
- the digital representation may then be entered into the Records Database 213 .
- Verification requires the biometric of the user to be captured again, and processed into a digital template. That template may then be compared to the digital representation stored in the database to determine a match. If there is a match, the information is confirmed.
- a next step may include providing the Registrant 100 with a Validation Marker 804 (Step 1002 ), which allows the Registrant 100 to publicize his or her digital identity validation.
- a Validation Marker 804 may be provided to a Registrant 100 by, among other methods: (1) sending a piece of software to the Registrant 100 (or other individual or entity) for installation on his computer, server, website, database, or other storage device; (2) storing the Validation Marker 804 on a computer, server, website, database, or other storage device from which the Registrant 100 (or other individual or entity) may retrieve said Validation Marker 804 ; or (3) sending the Validation Marker 804 to a third party for storage on a computer, server, website, database, or other storage device from which the Registrant 100 (or other individual or entity) may retrieve said Validation Marker 804 .
- the Digital Identity Provider 205 may include one or more domain name Registries, Registrars, and/or Resellers, or another entity that provides digital identities.
- Digital identity related reputation data may include one or more values, ratings, or scores per a digital identity. The data may further include links or references to the locations (typically on a network) where such values, ratings, or scores may be found.
- FIG. 11 An example embodiment of a digital identity related reputation tracking and publishing system is illustrated in FIG. 11 .
- the illustrated embodiment includes a Digital Identity Provider 205 , a Digital Identity Database 206 , a Reputation Database 1100 , a Presentation Means 1101 , a Subject 1102 , and a Requester 1103 .
- the Digital Identity Provider 205 may be a domain name Registry, a Registrar of domain names, or a Reseller of a Registrar, or another entity that provides digital identities.
- the Digital Identity Provider 205 may be an accredited ICANN (Internet Corporation for Assigned Names and Numbers) Registry or Registrar. Examples of ICANN-accredited Registrars include GoDaddy.com, Wild West Domains, Blue Razor, etc.
- the Digital Identity Provider 205 may maintain the Digital Identity Database 206 , which may contain one or more digital identities registered through or with the Digital Identity Provider 205 .
- the Subject 1102 may be a person or an entity associated with one or more digital identities registered through the Digital Identity Provider 205 .
- the Subject 1102 may be a client of the Digital Identity Provider 205 , a purchaser of products or services provided by the Digital Identity Provider 205 , a user of the products or services provided by the Digital Identity Provider 205 (i.e.—email account users), a Registrant 100 of one or more digital identities registered through the Digital Identity Provider 205 , a person or entity on record with the Digital Identity Provider 205 (i.e.—registration related records, billing records, technical and/or administrative records, etc.), a person or entity appearing in the WHOIS records for one or more domain names associated with a digital identity registered through the Digital Identity Provider 205 , or any combination thereof.
- the system may include one or more Subjects.
- the system also may include one or more Digital Identity Providers 205 .
- the system of FIG. 11 is described as having one Digital Identity Provider.
- the products or services provided by the Digital Identity Provider 205 may include registering a digital identity or domain name, issuing a digital certificate, and/or providing an email or hosting service (accounts), computer software, website designing tools and/or services, reputation tracking service, or any combination thereof.
- the Reputation Database 1100 may store digital identity related reputation data. There may be multiple records in the Reputation Database 1100 for a single digital identity from the Digital Identity Database 206 .
- the Reputation Database 1100 may be maintained by the Digital Identity Provider 205 , but also could be maintained by a third party.
- the Reputation Database 1100 may store reputation records for various categories associated with a digital identity. Such categories may include email practices, website content, privacy policies and practices, fraudulent activities, complaints, overall reputation, or any combination thereof.
- the overall reputation may be calculated from other reputation records using the sum, average, weighted, scaled, minimum, maximum, or any other formula.
- the reputation data may be tracked on a person or an entity, a digital identity, a domain name associated with a digital identity, a URL associated with a digital identity, an email address associated with a digital identity, a website associated with a digital identity, or any combination thereof.
- the Reputation Database 1100 may store data regarding the amount of spam originating from an email address associated with a digital identity (per week, per month, per year, total, etc.), the number of complaints (about spam, phishing, and/or other fraudulent activities), or content of a website associated with a digital identity (illegal drugs, alcohol, tobacco, sex, pornography, nudity, or any other form of adult content, profanity, violence, intolerance, hate, Vietnamese, particularly groups, extremists, Matterism, witchcraft, gambling, casino, spam, MLM, pyramid schemes, fraud, or any other illegal activity, etc.).
- the values in the reputation data may be numeric ratings or values out of a predetermined set of discrete values.
- the digital identity Registrant 100 reputation values may be calculated as minimum, maximum, average, weighted, scaled, sum, or any other formula from some or all digital identities with the same Registrant 100 .
- the Reputation Database 1100 may obtain various reputation data from other reputation services, such as SENDERBASE.ORG, BONDED SENDER PROGRAM, SPAMCOP, “societies” of trusted users, black and white domain/IP/email lists, CLOUDMARK, VERISIGN, VERIFIED DOMAINS LIST, TRUSTE, etc.
- the Reputation Database 1100 also may obtain various reputation data from individuals or entities that may submit such data to the Digital Identity Provider 205 for review, vetting, and publication. The variety of reputation data may aid in making better decisions by the Requester 1103 .
- the Digital Identity Provider 205 may provide suggestions or recommendations if a particular digital identity, domain name, URL, email address, etc. should be trusted.
- the Digital Identity Provider 205 may start tracking digital identity related reputation unilaterally, or after a request from the Subject 1102 .
- the Digital Identity Provider 205 may offer the reputation tracking as an additional service to the Digital Identity Provider's clients.
- the Requester 1103 may be a person, an entity, or a technological means, such as a computer software, website, web service, etc.
- the system may include one or more Requesters.
- the data from the Reputation Database 1100 may be provided to the Requester 1103 via the Presentation Means 1101 .
- the Presentation Means 1101 are means for presenting the data and may be maintained by the Digital Identity Provider 205 and may include DNS records, WHOIS records, a website, a web service, a computer software, an API-based solution or protocol, or any combination thereof.
- the Digital Identity Provider 205 may post reputation values on a website, in the DNS or WHOIS records of a domain name associated with a digital identity, or post a URL link to the location on the network (i.e.—Internet website) where the reputation data may be found.
- the partners of the Digital Identity Provider 205 may have access to the Reputation Database 1100 .
- the Presentation Means 1101 in this embodiment may include a system that periodically feeds reputation data to the partners.
- the reputation data may be in XML (eXtensible Markup Language), character-delimited (i.e.—CSV (Comma-Separated Values) or TSV (Tab Separated Values)), fixed length, or other formats.
- the system of the present invention provides a framework, centralized around a Digital Identity Provider, for accessing the digital identity related reputation data. Any Internet or email user (or automated solutions) may find digital identity related reputation data through a Digital Identity Provider where the digital identity was registered or in other locations as specified above.
- a Digital Identity Provider 205 may set one or more values in digital identity related reputation data to initial values (Step 1200 ).
- the Digital Identity Provider 205 may change one or more values in domain name related reputation data (Step 1201 ). If it is desired to continue keeping track of the digital identity related reputation (Step 1202 ), Steps 1201 and 1202 may be repeated (Step 1203 ).
- the initial values may be set to null, zero, or any other value.
- the values may be on various scales, for example from 0 to 100, from 0 to infinity, or from ⁇ 100 to 100, where 0 may represent a digital identity with no reputation, etc.
- the Digital Identity Provider 205 may develop a schedule of points to be awarded for various events associated with the digital identity.
- the email practices reputation rating (score, value) of the digital identity and the email address reputation rating may be reduced by one. If the digital identity exists for a year with no complaints, the digital identity's overall reputation rating may be raised by 10 points. If the Digital Identity Provider 205 validates the digital identity Registrant 100 contact information, the overall reputation rating may be raised by 20 points, etc. Additional points may be awarded if the digital identity is assigned an SSL certificate issued by a certification authority. The rating may be reduced if illegal content is present on a website associated with a digital identity. The ratings also may be adjusted so that more recent activities have a greater weight than older activities.
- the ratings may be changed (i.e.—reset to their initial values).
- the Digital Identity Provider 205 may provide historical values of the reputation ratings.
- digital identity related reputation may be tracked from the point of initial registration (i.e.—point of sale).
- a Registrant 100 who intends to register a digital identity, may visit a Digital Identity Provider's 205 website (Step 1400 ).
- the Registrant 100 may be a person or entity that registers the digital identity.
- the Digital Identity Provider 205 may offer the Registrant 100 a reputation tracking service (Step 1401 ).
- the reputation tracking service may be free of charge for the Registrant 100 or may be a paid service.
- the Digital Identity Provider 205 may register the digital identity (Step 1402 ).
- the Digital Identity Provider 205 may register the digital identity (Step 1403 ), may verify the registrant (Step 1404 ), and may set initial reputation values in reputation data (Step 1405 ).
- the verification step may be accomplished with the systems and/or methods described above in the “Digital Identity Validation” section, and elsewhere in this application.
- the validation step also may be accomplished by validating a Registrant's 100 business records, driver's licenses, or other documents.
- Basic levels may include validating basic contact information.
- Advanced levels may include verification of a variety of a Registrant's 100 registration information and/or documents. More extensive and comprehensive verification levels may result in higher reputation values (assuming the verification was successful).
- the Digital Identity Provider 205 may still create reputation data for the digital identity and populate it with default values.
- FIG. 13 illustrates a method for accessing digital identity related reputation data to determine whether to interact with a digital identity.
- the method includes the following steps.
- a Requester 1103 intends to interact online with a digital identity (Step 1300 ).
- the Requester 1103 identifies a digital identity (Step 1301 ).
- the Requester 1103 determines a Digital Identity Provider 205 of the digital identity (Step 1302 ).
- the Requester 1103 determines the location of digital identity related reputation data (Step 1303 ).
- the Requester 1103 accesses the digital identity related reputation data (Step 1304 ). Based on the digital identity related reputation data, the Requester 1103 decides (determines) whether to interact with the digital identity (Steps 1305 and 1306 ).
- the Requester 1103 may be an individual or entity, but also could be a computer software running in conjunction with a server or a client program. If the Requester is a computer software, the intention to interact with a digital identity (Step 1300 ) may comprise a logic algorithm's determination to interact. The intention to interact (Step 1300 ) also may arise from an individual or entity's online encounter with a Subject's 1102 digital identity. Such an encounter could occur in an online social network or dating service, a website where a Subject 1102 offers an item for service or online sale, or where a Subject 1102 posts a comment or opinion on a website. For each of these applications, the Subject 1102 may be identified by his or her digital identity.
- the Digital Identity Provider 205 for the Subject's 1102 digital identity may then be determined (Step 1302 ).
- the Digital Identity Provider 205 may be readily identifiable from the digital identity itself, an email, domain name, website, URL, or blog associated with the digital identity, or any other online encounter described in the previous paragraph.
- the Digital Identity Provider 205 also may be ascertained by a search of a Digital Identity Database 206 and/or Records Database 213 that may be made publicly available by a Digital Identity Provider 205 or another entity. If the digital identity comprises a domain name, the Digital Identity Provider 205 may be ascertained by a search of WHOIS records 209 or DNS records.
- the location of the digital identity related reputation data may be determined (Step 1303 ).
- the location of the data may be, among other things, a database, a website, a web service, WHOIS records, DNS records, etc.
- the location of the digital identity related reputation data may be a predetermined location (i.e.—http://reputation.godaddy.com) or may be provided by a link or reference.
- the link or reference to the location may be, inter alia, a URL link, a DNS address, an IP address, a computer port, or any combination thereof.
- the Requester 1103 may then access the reputation data (Step 1304 ), perhaps via a website, and decide (determine) whether the values in the digital identity related reputation data are appropriate to permit interaction with the digital identity. If the decision is made to interact, the Requester 1103 may proceed to email, communicate, sell, buy, date, or otherwise interact with the Subject's 1102 digital identity.
- the Requester may be computer software working in conjunction with an Internet browser. If the domain name and/or URL associated with the Subject's 1102 digital identity have a low reputation, the webpage located at the URL may be blocked. Alternatively, the computer software may give the Requester 1103 a warning that the domain name and/or the URL have a low reputation. The user may then decide whether to visit the URL.
- Each URL associated with a digital identity may have its own reputation rating. This is especially feasible when multiple parties are responsible for the content of a website associated with the domain name.
- the Digital Identity Provider or another party may publish digital identity related reputation data in the DNS or WHOIS records 209 .
- the reputation values (ratings, scores) or one or more URL links, where the reputation values can be found, may be published in the DNS or WHOIS records 209 .
- the party that tries to access digital identity related reputation data may obtain it, inter alia, from a predetermined URL on the Internet or from the DNS or WHOIS records 209 .
- One embodiment of the method for publishing digital identity related reputation in the WHOIS records 209 includes the following steps.
- the Digital Identity Provider 205 collects digital identity related information and forms digital identity related reputation data. Then, the Digital Identity Provider 205 stores the digital identity related reputation data in the WHOIS records 209 .
- the Digital Identity Database 206 and the Records Database 213 may be part of the same database, or separate databases. Similarly, they may be located on the same server or physically (and/or geographically) separated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- This patent application is a divisional of U.S. patent application Ser. No. 11/746,522 to Adelman et. al., with filing date May 9, 2007 and titled “DIGITAL IDENTITY RELATED REPUTATION TRACKING AND PUBLISHING.”
- This patent application is also related to the following patent applications, all assigned to The Go Daddy Group, Inc:
- U.S. patent application Ser. No. ______ to Adelman et. al., with filing date May 9, 2007 and titled “TRACKING DIGITAL IDENTITY RELATED REPUTATION DATA,” which also is a divisional of U.S. patent application Ser. No. 11/746,522.
- U.S. patent application Ser. No. 11/746,484 to Adelman et. al., with filing date May 9, 2007 and titled “DIGITAL IDENTITY REGISTRATION.”
- U.S. patent application Ser. No. 11/746,505 to Adelman et. al., with filing date May 9,2007 and titled “DIGITAL IDENTITY VALIDATION.”
- U.S. patent application Ser. No. 10/977,373 to Adelman et. al., with filing date Oct. 29,2004 and titled “TRACKING DOMAIN NAME RELATED REPUTATION.”
- U.S. patent application Ser. No. 10/976,834 to Adelman et. al. with filing date Oct. 29, 2004 and titled “PUBLISHING DOMAIN NAME RELATED REPUTATION IN WHOIS RECORDS.”
- U.S. patent application Ser. No. 10/976,547 to Adelman et. al., with filing date Oct. 29, 2004 and titled “PRESENTING SEARCH ENGINE RESULTS BASED ON DOMAIN NAME RELATED REPUTATION.”
- U.S. patent application Ser. Nos. 11/746,522, 11/746,484, and 11/746,505 are continuations-in-part of U.S. patent application Ser. Nos. 10/977,373, 10/976,834, and 10/976,547.
- The subject matter of all of the above-listed patent applications is commonly owned and assigned to The Go Daddy Group, Inc. All such patent applications are incorporated herein in their entirety by reference.
- The present inventions relate generally to managing Internet digital identities and, more specifically, systems and methods for registering digital identities, validating digital identity origin and ownership, and tracking and publishing digital identity related reputation data.
- The Internet is a worldwide network of computers and computer networks arranged to allow the easy and robust exchange of information between users of computers. Hundreds of millions of people around the world have access to computers connected to the Internet via Internet Service Providers (ISPs). Content providers place multimedia information, i.e. text, graphics, sounds, and other forms of data, at specific locations on the Internet referred to as websites. The combination of all the websites and their corresponding webpages on the Internet is generally known as the World Wide Web (WWW) or simply the Web.
- Websites may be created using HyperText Markup Language (HTML) to generate a standard set of tags that define how the webpages for the website are to be displayed. Users of the Internet may access content providers' websites using software known as an Internet browser, such as MICROSOFT INTERNET EXPLORER or NETSCAPE NAVIGATOR. After the browser has located the desired webpage, it requests and receives information from the webpage, typically in the form of an HTML document, and then displays the webpage content for the user. The user may then view other webpages at the same website or move to an entirely different website using the browser.
- Browsers are able to locate specific websites because each website on the Internet has a unique Internet Protocol (IP) address. Each IP address is a 32 bit binary number, but is typically shown in dotted decimal notion (i.e.—192.145.68.112) to improve human readability. IP addresses, however, even in dotted decimal notation, are difficult for people to remember and use. A Uniform Resource Locator (URL) is much easier to remember and may be used to point to any computer, directory, or file on the Internet. A browser is able to access a website on the Internet through the use of a URL. The URL may include a Hypertext Transfer Protocol (HTTP) request combined with the website's internet address, also known as the website's domain name. An example of a URL with a HTTP request and domain name is: http://www.companyname.com. In this example, the “http” identifies the URL as a HTTP request and the “companyname.com” is the domain name.
- Individuals, companies, and other entities that provide content on the web generally want to use their name or one of their trademarks as part of their domain name. Thus, domain names are generally company trademarks, personal names, or short phrases concatenated with a top level domain name (TLD) extension (e.g. .com, .net, .org, .biz, .us, .cc, .ws, .de, etc.). TLD extensions can be divided into two groups. The first group is known as generic Top-Level Domains (gTLD) and the second group is country code TLDs (ccTLD). Examples of gTLDs include .com, .net, .org, .biz, etc. Examples of current ccTLDs include .us for the United States, .uk and .gb for United Kingdom, .ca for Canada, .de for Germany, .jp for Japan, etc. Most gTLDs are organized through a central domain name Shared Registration System (SRS) based on their TLD.
- The process for registering a domain name with .com, .net, .org and some other TLDs allows an Internet user to use an ICANN-accredited Registrar to register their domain name. For example, if an Internet user, John Doe, wishes to register the domain name “mycompany.com,” John Doe may initially determine whether the desired domain name is available by contacting a domain name Registrar. The Internet user may make this contact using the Registrar's webpage and typing the desired domain name into a field on the Registrar's webpage created for this purpose. Upon receiving the request from the Internet user, the Registrar may ascertain whether “mycompany.com” has already been registered by checking the SRS database associated with the TLD of the domain name. The results of the search may then be displayed on the webpage to thereby notify the Internet user of the availability of the domain name. If the domain name is available, the Internet user may proceed with the registration process. Otherwise, the Internet user may keep selecting alternative domain names until an available domain name is found. Domain names are typically registered for a period of one to ten years with first rights to continually re-register the domain name.
- An individual or entities' domain name is increasingly the anchor around which their online presence is maintained. For example, a company's website (www.companyname.com) and email system ([email protected]) utilize the company's domain name as an integral part of their architecture.
- For Internet users and businesses alike, the Internet continues to be increasingly valuable. More people are using the Web for everyday tasks, from shopping, banking, and paying bills to consuming media and entertainment. E-commerce is growing, with businesses delivering more services and content across the Internet, communicating and collaborating online, and inventing new ways to connect with each other.
- Websites allow individuals and businesses to share their information with a large number of Internet users. Many products and services are offered for sale on the Internet, thus elevating the Internet to an essential tool of commerce. Internet businesses, whether a large corporation or an individual, are rapidly creating websites to take advantage of the growing number of customers using the Internet and customers' increasing willingness to purchase goods and services over the Web. Websites created by Internet businesses may be reached by millions of Internet savvy customers, thereby allowing Internet businesses to offer their products and services to a very large pool of potential customers.
- Some Internet business websites, typically those that receive or share sensitive information (i.e.—those associated with banks, credit card companies, online businesses, social organizations, etc.) may require Internet users to login to the website with a secure username and password before accessing the website's content.
- The username/password system is a common form of secret authentication data used to control website access. The username/password is kept secret from those not allowed access. Those wishing to gain access are tested on whether or not they have a valid (recognized) username and whether they know the associated password. Internet users are granted or denied access to websites accordingly.
- Many websites have different rules governing the creation of usernames and passwords. Some require passwords that include a complex combination of letters, numbers, and other characters. Others have no restrictions whatsoever.
- With the proliferation of login-access websites, Internet users often must remember dozens (or more) different username/password combinations, one for each secure website they wish to access. This has resulted in what has come to be known as “password fatigue.”
- Partly in response to this perceived problem, the concept of the “digital identity” has evolved. A digital identity is a set of characteristics by which a person or thing is recognizable or distinguished in the digital realm. Digital identity allows for the electronic recognition of an individual or thing without confusing it for someone or something else.
- There are many applications for an Internet user's digital identity, including authenticating the user before permitting access to a website. One method for such authentication includes the use of a URL (i.e.—OPENID) that may or may not interact with a piece of client software (i.e.—MICROSOFT WINDOWS CARDSPACE).
- URL-based digital identity systems (such as OPENID) utilize a framework based on the concept that any individual or entity can identify themselves on the Internet with a URL provided by a Digital Identity Provider (i.e.—johndoe.openid.com). The Digital Identity Provider maintains an Identity Server on which a Digital Identity Database (a database of provided digital identity URLs and the corresponding authentication passwords) is stored. Once obtained, the Internet user may utilize their digital identity URL to access various websites. For example, to login to an OPENID-enabled website, the user enters their digital identity URL in the username box. The user is then momentarily redirected to the user's Digital Identity Provider's website (or an authentication window appears) to login using whatever password they have set up with their Digital Identity Provider. Once authenticated, the Digital Identity Provider sends the participating website an encrypted message (a token) confirming the identity of the person logging in.
- Client-software-based digital identity systems (such as MICROSOFT WINDOWS CARDSPACE) utilize a piece of client software that enables Internet users to securely provide their digital identity to online services. CARDSPACE, for example, is a framework developed by MICROSOFT that securely stores an individual or entities' digital identity and provides an interface for choosing the appropriate digital identity for a particular transaction, such as logging into a website. When a CARDSPACE user's browser opens a password-protected website, CARDSPACE pops up a security-hardened user interface with a set of “cards” for the user to choose from. Each card has some identity data associated with it. When the user chooses a card, a request in the form of a web service call goes to the Digital Identity Provider, and a signed and encrypted security token is returned containing the required information (i.e.—credit limit, employer's name and address, or perhaps a social security number). The user then decides whether to release this information to the requesting online service. If the user approves, the token is sent on to the website where the token is processed and the user is authenticated.
- In February 2007, MICROSOFT announced that it will collaborate with other companies on interoperability between OPENID and CARDSPACE as digital identity technologies.
- There are currently numerous Digital Identity Providers offering URL-based (OPENID) digital identity services, meaning they offer digital identity URLs and servers to authenticate them.
- Applicants have noticed that these services, however, require that a Registrant's digital identity be hosted on the Digital Identity Provider's servers. This has resulted in digital identity URLs that necessarily incorporate the Digital Identity Provider's domain name (i.e.—johndoe.myopenid.com, johndoe.pip.verisignlabs.com, johndoe.videntity.com, or getopenid.com/johndoe). An Internet user who wishes to own a domain name and obtain a digital identity URL must therefore separately register their domain name and digital identity though different entities (a domain name Registrar and a Digital Identity Provider). This results in the domain name and the digital identity URL being hosted by different entities on different servers and the inability of the Internet user to easily utilize his domain name in his digital identity URL. This precludes the Internet user from having a streamlined set of e-commerce tools (i.e.—email address, website address, and digital identity URL) based on his domain name.
- Irrespective of the digital identity platform utilized (WINDOWS CARDSPACE, OPENID, or other—perhaps undeveloped—technologies), there are numerous other ways (aside from website user authentication) in which an Internet user's digital identity may be utilized.
- For example, an Internet user may wish to participate in an online social network or dating service, offer an item or service for online sale, or post a comment or opinion on a website. For each of these applications, the Internet user may be identified by their digital identity.
- It would be useful to a Requester (including those deciding whether to interact online with the Internet user) if, before choosing to interact, the Requestor could obtain, review, and assess digital identity related reputation data, including, but not limited to, reputation of the digital identity itself or reputation of a person, entity, user, registrant, URL, domain name, email address, or website associated with the digital identity. The Requestor could then decide whether to interact with the Internet user based upon the digital identity related reputation data with the Subject.
- Conversely, it would be useful to a Subject (i.e.—the individual or entity to whom a digital identity is registered) to have a favorable reputation rating made available to Internet users. The favorable rating would encourage Internet users to engage in online social, e-commerce, or other activities with the Subject.
- Unfortunately, malevolent Internet users may be motivated to defraud digital identity related reputation systems. For example, an individual may fraudulently register a digital identity and take steps to cause a negative reputation rating for the digital identity or an individual, entity, domain name, email address, or website fraudulently associated with the digital identity. Malware also could be developed to simulate a valid digital identity for the purpose of tarnishing the digital identity's reputation.
- Applicants have noticed that presently-existing Digital Identity Providers offer no digital identity validation process allowing digital identity users to prove that they are the true, correct, and legal originator of their digital identity.
- Even a validated digital identity registrant, however, may abuse the Internet. Among such abuses are phishing, pharming, spamming, or posting illegal content on a website (i.e.—child pornography).
- Phishing is the luring of sensitive information, such as passwords, credit card numbers, bank accounts, or other personal information, from an Internet user by masquerading as someone trustworthy with a legitimate need for such information. Pharming is a hacker's attack aiming to redirect a website's traffic to another (bogus) website. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software. Spam or unsolicited email is flooding the Internet with many copies of the identical or nearly identical message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services.
- Applicants are unaware of any system or method for tracking or publishing digital identity related reputation for such Internet use or abuse (either positive or negative).
- In response to the concerns discussed above, there is a need for better systems and methods for registering digital identities, validating digital identity origin and ownership, and tracking and publishing digital identity related reputation data.
- The limitations cited above and others are substantially overcome through the systems and methods disclosed herein. The systems and methods of the present inventions allow for more efficient registration of digital identities, validation of digital identity origin and ownership, and tracking and publication of digital identity related reputation data.
- Certain embodiments of the present inventions take advantage of the unique role of Digital Identity Providers who are also domain name Registries or domain name Registrars, which have access to information that other parties do not. This includes client contact information, billing records, complaints against clients, etc. If the Digital Identity Provider is also a PKI (public key infrastructure) certification authority, it has access to an even wider range of information obtained through a verification process of its clients.
- An example embodiment of a digital identity registration system includes means for receiving a requested digital identity from a prospective Registrant, means for searching a Digital Identity Database for the availability of the digital identity, means for registering, if available, the digital identity to the Registrant, and means for updating the Digital Identity Database to indicate a change in the digital identity's registration status. If the digital identity comprises a URL that contains a domain name, the system may further comprise means for confirming whether the domain name is owned by the Registrant. If the domain name is available, the system may further comprise means for offering the domain name for sale and registration. The system also may comprise means for receiving digital identity registration information from the Registrant and means for validating the registration information before registering the digital identity. If validated, a Validation Marker may be provided to the Registrant.
- In an exemplary process, a requested digital identity is received from a Registrant. The Digital Identity Database is then searched to determine the availability of the requested digital identity. If available, the requested digital identity is then registered to the Registrant and the Digital Identity Database is updated to indicate the registration. If the digital identity comprises a URL that contains a domain name, the process may confirm whether the Registrant owns or controls the domain name, for example by searching WHOIS records. The process also may receive registration information from the Registrant and validate the registration information from the Registrant prior to registering the requested digital identity.
- An example embodiment of a digital identity validation system includes means for registering a digital identity to a Registrant, a Records Database for storing registration related records, and means for verifying certain information in the records. A Digital Identity Provider may maintain the database. The information to be verified may include information regarding a Registrant or other person or entity associated with the digital identity. The information also may include name, address, phone number, email address, website, URL, or other information. The verification means may contact a Registrant, administrative contact, technical contact, or another contact to confirm at least some information in the records. If the information is verified, a Validation Marker may be provided to the Registrant indicating that the digital identity has been validated. The Validation Marker may be a displayable image, a certificate for display on a webpage, a change in appearance for the digital identity, or an audible sound.
- In an exemplary process, a digital identity is registered to a Registrant. During the registration process, one or more registration records are collected from the Registrant. The registration records may include information regarding a digital identity, its Registrant, or another person or entity associated with the digital identity. It also may include name, address, phone number, email address, website, URL, or other information. The information is then verified. As a non-limiting example, the information may be verified by contacting a Registrant, administrative contact, technical contact, or another contact to confirm at least some information in the records. If the information is verified, the Digital Identity Provider may provide the Registrant with a Validation Marker indicating that the digital identity has been validated. Among other things, a Validation Marker may be in the form of a displayable image, perhaps a digital certificate for display on a webpage, a change in appearance of the digital identity when it appears on a computer screen, or an audible sound.
- An example embodiment of a system for tracking and publishing digital identity related reputation data includes a Digital Identity Provider that maintains a Digital Identity Database for storing a Plurality of Digital Identities and a Reputation Database for storing digital identity related reputation data for one or more digital identities. Reputation data may be tracked regarding the digital identity itself, URLs or domain names associated with the digital identity, digital identity purchasers or registrants (whether individuals or entities), or email addresses or websites associated with the digital identity. The reputation data may include ratings for various categories, such as email practices, website content, privacy policies and practices, fraudulent activities, domain name related complaints, overall reputation, etc. The Digital Identity Provider may update reputation data based on a variety of events related to the digital identity. When a Requestor is exposed to a digital identity online (i.e.—on a blog, social or dating website, or online sales or auction service), the Requestor may choose to review and assess digital identity related reputation data before opting to further interact with the digital identity. An embodiment of the present invention allows a Requestor to access a Reputation Database to review digital identity related reputation data before making this decision.
- If a Registrant's digital identity incorporates a domain name, the Digital Identity Provider or another party may publish digital identity related reputation data in the WHOIS records. Reputation ratings or values may be published in the WHOIS records of the domain name linked to the digital identity. Alternatively, links or references to a location of the reputation ratings or values may be published in the WHOIS, such links or references may include a URL link, a DNS address, an IP address, a computer port, or any combination thereof. Reputation ratings or values also may be published by the Digital Identity Provider or another party via any means of publication available including, but not limited to, an accessible database, a website, other electronic storage, or printed media. One embodiment of the method for publishing the domain name related reputation data in the WHOIS records includes the following steps, the Digital Identity Provider collects digital identity related information and forms digital identity related reputation data. Then, the Digital Identity Provider stores the digital identity related reputation data in the WHOIS records.
- The above features and advantages of the present invention will be better understood from the following detailed description taken in conjunction with the accompanying drawings.
-
FIG. 1 illustrates a possible embodiment of a digital identity registration system. -
FIG. 2 illustrates a possible embodiment of a digital identity registration system. -
FIG. 3 illustrates a possible embodiment of a digital identity registration system. -
FIG. 4 illustrates a possible embodiment of a digital identity database and a records database. -
FIG. 5 is a flow diagram illustrating possible steps that may be taken with a digital identity registration system. -
FIG. 6 is a flow diagram illustrating possible steps that may be taken with a digital identity registration system. -
FIG. 7 illustrates a possible embodiment of a digital identity validation system. -
FIG. 8 illustrates a possible embodiment of a digital identity validation system. -
FIG. 9 is a flow diagram illustrating possible steps that may be taken with a digital identity validation system. -
FIG. 10 is a flow diagram illustrating possible steps that may be taken with a digital identity validation system. -
FIG. 11 illustrates a possible embodiment of a digital identity tracking and publication system. -
FIG. 12 is a flow diagram illustrating possible steps that may be taken with a digital identity tracking and publication system. -
FIG. 13 is a flow diagram illustrating possible steps that may be taken with a digital identity tracking and publication system. -
FIG. 14 is a flow diagram illustrating possible steps that may be taken with a digital identity tracking and publication system. - The present invention will now be discussed in detail with regard to the attached drawing figures which were briefly described above. In the following description, numerous specific details are set forth illustrating the Applicants' best mode for practicing the invention and enabling one of ordinary skill in the art to make and use the invention. It will be obvious, however, to one skilled in the art that the present invention may be practiced without many of these specific details. In other instances, well-known machines and method steps have not been described in particular detail in order to avoid unnecessarily obscuring the present invention. Unless otherwise indicated, like parts and method steps are referred to with like reference numerals.
- Digital Identity Registration
- A streamlined example embodiment of a digital identity registration system is illustrated in
FIG. 1 . The illustrated embodiment includes means 101 for receiving a requested digital identity from aRegistrant 100, means 102 for determining whether the digital identity is available, and means 103 for registering the digital identity, if available, to theRegistrant 100. This embodiment places no limitation on the format of the requested digital identity. Thus, as non-limiting examples, a requested digital identity may be in the form of a piece of client software, a digital certificate, or a URL comprising any combination of characters-perhaps including a domain name that may be owned by theRegistrant 100. - A more detailed example embodiment of a digital identity registration system is illustrated in
FIG. 2 . The illustrated embodiment includes aDigital Identity Provider 205, awebsite 201, aDigital Identity Database 206, means 204 for searching the Digital Identity Database, WHOIS records 209, means 208 for searchingWHOIS records 209, means 210 for validating registration information provided by theRegistrant 100, means 211 for updating theDigital Identity Database 206, aRecords Database 213, and means 212 for updating theRecords Database 213. This embodiment places no limitation on the format of the requested digital identity. Thus, as non-limiting examples, a requested digital identity may be in the form of a piece of client software, a digital certificate, or a URL comprising any combination of characters-perhaps including a domain name that may be owned by theRegistrant 100. - The
Registrant 100 may be an individual or an entity including, but not limited to, a person, a business, a governmental institution, an educational institution, a non-profit organization, or a social organization. Thewebsite 201 may be hosted on a server owned or operated by aDigital Identity Provider 205, which may be a domain name Registrar, Registry, or Reseller. Thewebsite 201 may be accessible to any Internet user with Internet access. Thewebsite 201 may have adigital identity field 202 and aregistration information field 203 in which aRegistrant 100 may enter a requested digital identity and related registration information. The requested digital identity may comprise a piece of client software, a digital certificate, a URL comprising any combination of characters—perhaps including a domain name that may be owned by theRegistrant 100, or another security token. The registration information could include, among other things, information about the requested digital identity, information about theRegistrant 100, or information about a person, entity, name, address, telephone number, email address, URL, domain name, or website associated with theRegistrant 100 of the requested digital identity. The information also may include an administrative contact, a technical contact, or an other contact associated with theRegistrant 100 of the requested digital identity. The information also could comprise biometric identification data, non-limiting examples of which may include a photograph, voiceprint, fingerprint, retinal scan, and/or DNA data. - To determine whether the requested digital identity is available, the system may include means 204 for searching a
Digital Identity Database 206—that may store a plurality of registereddigital identities 207—for the availability of the requested digital identity. TheDigital Identity Database 206 may be maintained by aDigital Identity Provider 205. As a non-limiting example, theDigital Identity Database 206 may comprise a local database, online database, desktop database, server-side database, relational database, hierarchical database, network database, object database, object-relational database, associative database, concept-oriented database, entity-attribute-value database, multi-dimensional database, semi-structured database, star schema database, XML database, file, collection of files, spreadsheet, or other means of data storage located on a computer, client, server, or other storage device. TheDigital Identity Database 206 search may be accomplished by a desktop, network, or online search engine. TheDigital Identity Database 206 search may utilize uninformed, list, tree, graph, SQL, tradeoff based, informed, adversarial, constraint satisfaction, string, genetic, sorting, probabilistic, tabu, federated, minimax, or ternary search algorithms. - If the requested digital identity includes a domain name, the system may include means 208 for determining whether the
Registrant 100 owns or controls the domain name, perhaps by searching WHOIS records. WHOIS records may be maintained by a Registry, a Registrar, and/or another party and are readily accessible over the Internet. WHOIS is a TCP-based query/response protocol that is widely used for querying these records to determine the owner of a domain name, an IP address, or an autonomous system number on the Internet. The WHOIS search may utilize either a command line interface or a web-based tool and either “thick” or “thin” lookups. “Thin” registries store a limited amount of information about a domain name, typically including: “Domain Name,” “Registrar,” “Whois Server,” Referral URL,” “Name Server,” “Status,” “Updated Date,” “Creation Date,” “Expiration Date,” etc. “Thick” registries also store Registrant, Administrative, Technical, and Billing contact information. The .info and .biz TLDs are “thick” while .com and .net TLDs are “thin.” Registrars usually store detailed information about the domain names registered through them. Even though the WHOIS records are public, many registries and registrars limit access to the WHOIS data by automated solutions (i.e.—computer programs, scripts, “crawlers,” etc.). This prevents copying substantial parts of the WHOIS records and potential use of this data for unsolicited email campaigns. Typically, a domain name Registry or Registrar may avoid such limitations. Additionally, for the domain names registered through a Registrar, the Registrar has access to the domain name registrations, renewals, transfers, expirations, etc. in real time. The instant embodiment is therefore particularly advantageous because theDigital Identity Provider 205 may also be a Registrar, Registry, or Reseller. - Said determining means 208 also may be performed with a lookup service, such as a quick, lightweight mechanism for obtaining data, possibly utilizing Lightweight Directory Access Protocol (LDAP) or similar protocols as are known in the art. Said determining means 208 also may comprise contacting the Registrant 100 (or another individual or entity) to confirm domain name ownership and/or control.
- If the domain name is unregistered and available for registration, the system may include means for the
Registrant 100 to purchase and/or register the domain name. The purchasing and registering means may comprise a website-enabled domain name purchase and registration system as is known in the art. - The system also may include means 210 for validating the registration information entered by the
Registrant 100 in theregistration information field 203 on thewebsite 201. The means 210 for validating registration information are discussed in the “Digital Identity Validation” section below and elsewhere in this application. - The system also may include means 211 for adding the digital identity to the plurality of registered
digital identities 207 stored in theDigital Identity Database 206. It may also comprise means 212 for adding the Registrant's 100 registration information to the registration-relatedrecords 214 stored in aRecords Database 213. These means (211 and 212) therefore register the digital identity by updating these databases (206 and 213) to reflect the change in the newly-registered digital identities' registration status. - Another example embodiment of a digital identity registration system is illustrated in
FIG. 3 . The illustrated embodiment includes awebsite 201, aDigital Identity Database 206, aRecords Database 213, means 204 for searching theDigital Identity Database 206, and means 103 for registering a digital identity. In this embodiment, the website may have adigital identity field 202 and aregistration information field 203 in which aRegistrant 100 may enter a requested digital identity and related registration information. The means 204 for searching aDigital Identity Database 206, determines the availability of the digital identity entered in thedigital identity field 202, perhaps by searching theDigital Identity Database 206, which stores a plurality of registereddigital identities 207. The means 103 for registering the digital identity may add the digital identity to theDigital Identity Database 206 and add the registration information entered in theregistration information field 203 by theRegistrant 100 to theRecords Database 213. -
FIG. 4 illustrates aDigital Identity Database 206 that may store a plurality of registereddigital identities 207.FIG. 4 also illustrates aRecords Database 213 that may store registration relatedrecords 214, such as the name, address, telephone number, email address, and/or other contact information for aRegistrant 100,administrative contact 800,technical contact 801, and/orother contact 802; a person, entity, name, address, telephone number, email address, URL, domain name, and/or website associated with aRegistrant 100 and/or a digital identity; and/or biometric identification data, such as a photograph, voiceprint, fingerprint, retinal scan, and/or DNA data. - Several different methods may be used to register a digital identity. In a streamlined embodiment illustrated in
FIG. 5 , a requested digital identity may be received from a Registrant 100 (Step 500). The availability of the digital identity is then determined (Step 501). If the digital identity is unavailable, the process ends. If available, the digital identity is registered to the Registrant (Step 502). - A more detailed example embodiment of a digital identity registration process is illustrated in
FIG. 6 . In this example embodiment, aRegistrant 100 enters a requested digital identity (or perhaps identities) and registration information in data entry fields 202 and 203 on awebsite 201. (Step 600). Thewebsite 201 may be hosted by aDigital Identity Provider 205, which may be domain name Registrar, Registry, or Reseller. Next, the availability of the requested digital identity may be determined (Step 601). This may be accomplished by searching aDigital Identity Database 206—that may store a plurality of registereddigital identities 207—for the availability of the requested domain name. If the digital identity is unavailable, the process may end. - In another embodiment, one or more alternate digital identities may be proposed to the
Registrant 100. The alternate digital identities may be similar to (or otherwise based on) the requested digital identity. TheRegistrant 100 may then select an alternate digital identity for registration. - If the requested digital identity or alternate digital identity is available (Step 601), a next process step may include determining whether the digital identity contains a domain name (Step 602) and, if so, whether the domain name is owned or controlled by the Registrant. (Step 603). This may be accomplished by searching
WHOIS records 209 for registration information regarding the domain name. This also may be accomplished with a lookup service, such as a quick, lightweight mechanism for obtaining data, possibly utilizing Lightweight Directory Access Protocol (LDAP) or similar protocols as are known in the art. It also may comprise contacting the Registrant 100 (or another individual or entity) to confirm domain name ownership and/or control. - If the domain name is not owned or controlled by the
Registrant 100, the process may end. If the domain name is unregistered and available for registration, the process may include theRegistrant 100 to purchase and/or register the domain name. If theRegistrant 100 owns or controls the domain name, a next process step may include validating the registration information entered by theRegistrant 100 in theregistration information field 203 on the website 201 (Step 604). This may be accomplished as set forth in the “Digital Identity Validation” section below and elsewhere in this application. If the registration information is not validated, the process may end. If the registration information is validated, a next process step may include registering the digital identity to the Registrant (Step 605). This may be accomplished by adding the digital identity to the plurality of registereddigital identities 207 stored in theDigital Identity Database 206 and by adding the Registrant's 100 registration information to the registration-relatedrecords 214 stored in aRecords Database 213. - Digital Identity Validation
- A streamlined example embodiment of a digital identity validation system is illustrated in
FIG. 7 . The illustrated embodiment includes means 103 for registering a digital identity to aRegistrant 100, aRecords Database 213 for storing registration related records 214 (which may include information regarding the digital identity and/or the Registrant 100), and means 700 for verifying the information. This embodiment places no limitation on the format of the digital identity to be validated. Thus, as non-limiting examples, the subject digital identity may be in the form of a piece of client software, a digital certificate, or a URL comprising any combination of characters—perhaps including a domain name that may be owned by theRegistrant 100. - A more detailed example embodiment of a digital identity validation system is illustrated in
FIG. 8 . The illustrated embodiment includes means 103 for registering a digital identity to aRegistrant 100, aDigital Identity Provider 205, aRecords Database 213 for storing registration related records 214 (which may include information regarding the digital identity, theRegistrant 100, atechnical contact 800, anadministrative contact 801, and/or an other contact 802), means 700 for verifying the information in theRecords Database 213, means 803 for contacting theRegistrant 100,technical contact 800,administrative contact 801, and/orother contact 802 to confirm information in theRecords Database 213, aValidation Marker 804, and means 805 for providing theRegistrant 100 with aValidation Marker 804. - The
Registrant 100 may be an individual or an entity including, but not limited to, a person, a business, a governmental institution, an educational institution, a non-profit organization, or a social organization. The means 103 for registering a digital identity to theRegistrant 100 may include the systems and/or methods described in the “Digital Identity Registration” section above and elsewhere in this application. This embodiment places no limitation on the format of the digital identity to be validated. Thus, as non-limiting examples, a digital identity may be in the form of a piece of client software, a digital certificate, or a URL comprising any combination of characters-perhaps including a domain name that may be owned by theRegistrant 100. - The instant embodiment also may include a
Records Database 213, which may store registration relatedrecords 214. The registration relatedrecords 214 stored in theRecords Database 214 may comprise information regarding a digital identity,Registrant 100,technical contact 800,administrative contact 801, orother contact 802, possibly including information regarding a person, entity, name, address, telephone number, URL, email address, domain name, and/or website associated with a digital identity orRegistrant 100. The information may also include biometric identification data, non-limiting examples of which may include a photograph, voiceprint, fingerprint, retinal scan, and/or DNA data. Therecords 214 also could include a link or reference regarding a location of an additional registration record. As non-limiting examples, TheRecords Database 213 may comprise a local database, online database, desktop database, server-side database, relational database, hierarchical database, network database, object database, object-relational database, associative database, concept-oriented database, entity-attribute-value database, multi-dimensional database, semi-structured database, star schema database, XML database, file, collection of files, spreadsheet, or other means of data storage located on a computer, client, server, or other storage device. TheRecords Database 213 may be maintained by aDigital Identity Provider 205, which may be a domain name Registry, Registrar, or Reseller, or another entity that provides digital identities. - To validate the origin and/or ownership of the subject digital identity, the instant embodiment may include means 700 for verifying at least some of the information in the
Records Database 213. This validation may be accomplished by searching theRecords Database 213 for at least some information and verifying the information with any person or entity. This search may be accomplished by a desktop, network, or online search engine and may utilize uninformed, list, tree, graph, SQL, tradeoff based, informed, adversarial, constraint satisfaction, string, genetic, sorting, probabilistic, tabu, federated, minimax, or ternary search algorithms. - As a non-limiting example, the verifying means 700 also may comprise means 803 for contacting the
Registrant 100,technical contact 800,administrative contact 801, and/orother contact 802 to confirm at least some of the information in theRecords Database 213. The verifying means 700 and/or the contacting means 803 could utilize an automated and/or manual process to contact theRegistrant 100,technical contact 800,administrative contact 801, and/orother contact 802 to verify information. The manual and/or automated processes could be accomplished by a telephone call, email communication, written communication, and or other method of contact as is known in the art. For example, aDigital Identity Provider 205 employee may call, email, or write to theRegistrant 100,technical contact 800,administrative contact 801, and/orother contact 802 and confirm that at least some of the information contained in theRecords Database 213 is accurate. This function also could be performed by computer-implemented—or otherwise automated—processes, such as automated calling or email systems as are known in the art. - The verifying means 700 could also be accomplished by obtaining voice-recognition, visual, written, electronic, and/or biometric verification of at least some of the information in the Records Database. Biometric verification systems may include means for obtaining fingerprint, retinal, DNA, or other physical characteristic verification. In a biometric system that may be used, a
Registrant 100 may provide one or more physical characteristics that may be processed by an algorithm to create a digital representation of the obtained biometric. The digital representation may then be entered into theRecords Database 213. Verification requires the biometric of the user to be captured again, and processed into a digital template. That template may then be compared to the digital representation stored in the database to determine a match. - To provide the
Registrant 100 with means to publicize his or her digital identity validation, the instant embodiment may include means 805 for providing theRegistrant 100 with aValidation Marker 804. AValidation Marker 804 indicates that a digital identity has been validated and may be in the form of a displayable image, perhaps a digital certificate for display on a webpage. AValidation Marker 804 also may take the form of a change in appearance of the digital identity when it appears on a computer screen, possibly implemented by a piece of software that alters the digital identity's color, shape, or size. AValidation Marker 804 also could be an audible sound, such as an audio file that plays when the digital identity appears on a computer screen. -
Means 805 for providing aValidation Marker 804 to aRegistrant 100 include, but are not limited to: (1) sending a piece of software to the Registrant 100 (or other individual or entity) for installation on his computer, server, website, database, or other storage device; (2) storing theValidation Marker 804 on a computer, server, website, database, or other storage device from which the Registrant 100 (or other individual or entity) may retrieve saidValidation Marker 804; or (3) sending theValidation Marker 804 to a third party for storage on a computer, server, website, database, or other storage device from which the Registrant 100 (or other individual or entity) may retrieve saidValidation Marker 804. - Several different methods may be used to validate a digital identity. In a streamlined embodiment illustrated in
FIG. 9 , a digital identity may be registered to a Registrant 100 (Step 900). During the registration process, one or more registration related records may be collected from the Registrant 100 (Step 901). At least some of the information collected from theRegistrant 100 is then verified (Step 902). - A more detailed example embodiment of a digital identity validation process is illustrated in
FIG. 10 . In this example embodiment, a digital identity may be registered to a Registrant 100 (Step 900). This step may be accomplished by any of the methods described in the “Digital Identity Registration” section above and elsewhere in this application. During the registration process, one or more registration relatedrecords 214 may be collected from the Registrant 100 (Step 901). The registration relatedrecords 214 may comprise information regarding a digital identity,Registrant 100,technical contact 800,administrative contact 801, orother contact 802, possibly including information regarding a person, entity, name, address, telephone number, URL, email address, domain name, and/or website associated with a digital identity orRegistrant 100. The information may also include biometric identification data, non-limiting examples of which may include a photograph, voiceprint, fingerprint, retinal scan, and/or DNA data. Therecords 214 also could include a link or reference regarding a location of an additional registration record. - At least some of the information collected from the
Registrant 100 is then verified (Step 902). The verification step (Step 902) may be accomplished by contacting theRegistrant 100,technical contact 800,administrative contact 801, or other contact 802 (Step 1000) and confirming at least some of the information with the contacted person or entity (Step 1001). The verifying step (Step 902) and/or the contacting step (Step 1000) could utilize an automated and/or manual process to contact theRegistrant 100,technical contact 800,administrative contact 801, and/orother contact 802 to verify information. The manual processes could be accomplished by a telephone call, email communication, written communication, and/or in-person contact. For example, aDigital Identity Provider 205 employee may call, email, write, or make personal contact with theRegistrant 100,technical contact 800,administrative contact 801, and/orother contact 802 and confirm that at least some of the information is accurate. These functions also could be performed by a computer-implemented-or otherwise automated-process, such as automated calling or email systems as are known in the art. - Alternatively, the verification step (Step 902) may be accomplished by obtaining voice-recognition, visual, written, electronic, and/or biometric verification of at least some of the information in the
Records Database 213. As a non-limiting example, during the digital identity registration process, aRegistrant 100 may provide a photograph, voiceprint, fingerprint, retinal scan, DNA, and/or other biometric sample. The sample may be in the form of a document, audio file, data file, or other type of computer file. This information may then be processed by an algorithm to create a digital representation of the obtained biometric. The digital representation may then be entered into theRecords Database 213. Verification requires the biometric of the user to be captured again, and processed into a digital template. That template may then be compared to the digital representation stored in the database to determine a match. If there is a match, the information is confirmed. - If the information is not confirmed, the process may end. If the information is confirmed, a next step may include providing the
Registrant 100 with a Validation Marker 804 (Step 1002), which allows theRegistrant 100 to publicize his or her digital identity validation. AValidation Marker 804 may be provided to aRegistrant 100 by, among other methods: (1) sending a piece of software to the Registrant 100 (or other individual or entity) for installation on his computer, server, website, database, or other storage device; (2) storing theValidation Marker 804 on a computer, server, website, database, or other storage device from which the Registrant 100 (or other individual or entity) may retrieve saidValidation Marker 804; or (3) sending theValidation Marker 804 to a third party for storage on a computer, server, website, database, or other storage device from which the Registrant 100 (or other individual or entity) may retrieve saidValidation Marker 804. - Digital Identity Related Reputation Tracking and Publishing
- For the purposes of this application, the
Digital Identity Provider 205 may include one or more domain name Registries, Registrars, and/or Resellers, or another entity that provides digital identities. Digital identity related reputation data may include one or more values, ratings, or scores per a digital identity. The data may further include links or references to the locations (typically on a network) where such values, ratings, or scores may be found. - An example embodiment of a digital identity related reputation tracking and publishing system is illustrated in
FIG. 11 . The illustrated embodiment includes aDigital Identity Provider 205, aDigital Identity Database 206, aReputation Database 1100, aPresentation Means 1101, aSubject 1102, and aRequester 1103. TheDigital Identity Provider 205 may be a domain name Registry, a Registrar of domain names, or a Reseller of a Registrar, or another entity that provides digital identities. TheDigital Identity Provider 205 may be an accredited ICANN (Internet Corporation for Assigned Names and Numbers) Registry or Registrar. Examples of ICANN-accredited Registrars include GoDaddy.com, Wild West Domains, Blue Razor, etc. TheDigital Identity Provider 205 may maintain theDigital Identity Database 206, which may contain one or more digital identities registered through or with theDigital Identity Provider 205. TheSubject 1102 may be a person or an entity associated with one or more digital identities registered through theDigital Identity Provider 205. - The
Subject 1102 may be a client of theDigital Identity Provider 205, a purchaser of products or services provided by theDigital Identity Provider 205, a user of the products or services provided by the Digital Identity Provider 205 (i.e.—email account users), aRegistrant 100 of one or more digital identities registered through theDigital Identity Provider 205, a person or entity on record with the Digital Identity Provider 205 (i.e.—registration related records, billing records, technical and/or administrative records, etc.), a person or entity appearing in the WHOIS records for one or more domain names associated with a digital identity registered through theDigital Identity Provider 205, or any combination thereof. The system may include one or more Subjects. The system also may include one or moreDigital Identity Providers 205. For simplification purposes, the system ofFIG. 11 is described as having one Digital Identity Provider. - The products or services provided by the
Digital Identity Provider 205 may include registering a digital identity or domain name, issuing a digital certificate, and/or providing an email or hosting service (accounts), computer software, website designing tools and/or services, reputation tracking service, or any combination thereof. - The
Reputation Database 1100 may store digital identity related reputation data. There may be multiple records in theReputation Database 1100 for a single digital identity from theDigital Identity Database 206. TheReputation Database 1100 may be maintained by theDigital Identity Provider 205, but also could be maintained by a third party. TheReputation Database 1100 may store reputation records for various categories associated with a digital identity. Such categories may include email practices, website content, privacy policies and practices, fraudulent activities, complaints, overall reputation, or any combination thereof. The overall reputation may be calculated from other reputation records using the sum, average, weighted, scaled, minimum, maximum, or any other formula. The reputation data may be tracked on a person or an entity, a digital identity, a domain name associated with a digital identity, a URL associated with a digital identity, an email address associated with a digital identity, a website associated with a digital identity, or any combination thereof. - The
Reputation Database 1100 may store data regarding the amount of spam originating from an email address associated with a digital identity (per week, per month, per year, total, etc.), the number of complaints (about spam, phishing, and/or other fraudulent activities), or content of a website associated with a digital identity (illegal drugs, alcohol, tobacco, sex, pornography, nudity, or any other form of adult content, profanity, violence, intolerance, hate, racism, militant groups, extremists, Satanism, witchcraft, gambling, casino, spam, MLM, pyramid schemes, fraud, or any other illegal activity, etc.). The values in the reputation data may be numeric ratings or values out of a predetermined set of discrete values. Examples of sets of discrete values include: Yes-No, Bad-Fair-Good-Excellent, etc. Thedigital identity Registrant 100 reputation values may be calculated as minimum, maximum, average, weighted, scaled, sum, or any other formula from some or all digital identities with thesame Registrant 100. - The
Reputation Database 1100 may obtain various reputation data from other reputation services, such as SENDERBASE.ORG, BONDED SENDER PROGRAM, SPAMCOP, “societies” of trusted users, black and white domain/IP/email lists, CLOUDMARK, VERISIGN, VERIFIED DOMAINS LIST, TRUSTE, etc. TheReputation Database 1100 also may obtain various reputation data from individuals or entities that may submit such data to theDigital Identity Provider 205 for review, vetting, and publication. The variety of reputation data may aid in making better decisions by theRequester 1103. - Besides providing “raw” data in the
Reputation Database 1100 for theRequester 1103 to make decisions, theDigital Identity Provider 205 may provide suggestions or recommendations if a particular digital identity, domain name, URL, email address, etc. should be trusted. - The
Digital Identity Provider 205 may start tracking digital identity related reputation unilaterally, or after a request from theSubject 1102. TheDigital Identity Provider 205 may offer the reputation tracking as an additional service to the Digital Identity Provider's clients. - The
Requester 1103 may be a person, an entity, or a technological means, such as a computer software, website, web service, etc. The system may include one or more Requesters. The data from theReputation Database 1100 may be provided to theRequester 1103 via thePresentation Means 1101. - The
Presentation Means 1101 are means for presenting the data and may be maintained by theDigital Identity Provider 205 and may include DNS records, WHOIS records, a website, a web service, a computer software, an API-based solution or protocol, or any combination thereof. For example, theDigital Identity Provider 205 may post reputation values on a website, in the DNS or WHOIS records of a domain name associated with a digital identity, or post a URL link to the location on the network (i.e.—Internet website) where the reputation data may be found. - In another embodiment, the partners of the
Digital Identity Provider 205 may have access to theReputation Database 1100. ThePresentation Means 1101 in this embodiment may include a system that periodically feeds reputation data to the partners. The reputation data may be in XML (eXtensible Markup Language), character-delimited (i.e.—CSV (Comma-Separated Values) or TSV (Tab Separated Values)), fixed length, or other formats. - The system of the present invention provides a framework, centralized around a Digital Identity Provider, for accessing the digital identity related reputation data. Any Internet or email user (or automated solutions) may find digital identity related reputation data through a Digital Identity Provider where the digital identity was registered or in other locations as specified above.
- Several different methods may be used to track and publish digital identity related reputation. In an example embodiment illustrated in
FIG. 12 , aDigital Identity Provider 205 may set one or more values in digital identity related reputation data to initial values (Step 1200). TheDigital Identity Provider 205 may change one or more values in domain name related reputation data (Step 1201). If it is desired to continue keeping track of the digital identity related reputation (Step 1202),Steps - The initial values may be set to null, zero, or any other value. The values may be on various scales, for example from 0 to 100, from 0 to infinity, or from −100 to 100, where 0 may represent a digital identity with no reputation, etc. The
Digital Identity Provider 205 may develop a schedule of points to be awarded for various events associated with the digital identity. - For example, if the
Digital Identity Provider 205 receives a legitimate complaint about a spam email message associated with a digital identity, the email practices reputation rating (score, value) of the digital identity and the email address reputation rating may be reduced by one. If the digital identity exists for a year with no complaints, the digital identity's overall reputation rating may be raised by 10 points. If theDigital Identity Provider 205 validates thedigital identity Registrant 100 contact information, the overall reputation rating may be raised by 20 points, etc. Additional points may be awarded if the digital identity is assigned an SSL certificate issued by a certification authority. The rating may be reduced if illegal content is present on a website associated with a digital identity. The ratings also may be adjusted so that more recent activities have a greater weight than older activities. - If circumstances require (i.e.—the digital identity is transferred from one
Digital Identity Provider 205 to another, theRegistrant 100 is changed, ownership of the digital identity is changed, registration related information changes, or if the digital identity expires), the ratings may be changed (i.e.—reset to their initial values). TheDigital Identity Provider 205 may provide historical values of the reputation ratings. - In another example embodiment of a digital identity tracking and publishing method, illustrated in
FIG. 14 , digital identity related reputation may be tracked from the point of initial registration (i.e.—point of sale). ARegistrant 100, who intends to register a digital identity, may visit a Digital Identity Provider's 205 website (Step 1400). TheRegistrant 100 may be a person or entity that registers the digital identity. TheDigital Identity Provider 205 may offer the Registrant 100 a reputation tracking service (Step 1401). The reputation tracking service may be free of charge for theRegistrant 100 or may be a paid service. If the Registrant does not want the reputation tracking service, theDigital Identity Provider 205 may register the digital identity (Step 1402). If theRegistrant 100 opts for the reputation tracking service, theDigital Identity Provider 205 may register the digital identity (Step 1403), may verify the registrant (Step 1404), and may set initial reputation values in reputation data (Step 1405). - As non-limiting examples, the verification step may be accomplished with the systems and/or methods described above in the “Digital Identity Validation” section, and elsewhere in this application. The validation step also may be accomplished by validating a Registrant's 100 business records, driver's licenses, or other documents. There may be multiple levels of verification performed. Basic levels may include validating basic contact information. Advanced levels may include verification of a variety of a Registrant's 100 registration information and/or documents. More extensive and comprehensive verification levels may result in higher reputation values (assuming the verification was successful).
- In yet another embodiment, if the
Registrant 100 does not opt for the reputation tracking service, theDigital Identity Provider 205 may still create reputation data for the digital identity and populate it with default values. -
FIG. 13 illustrates a method for accessing digital identity related reputation data to determine whether to interact with a digital identity. The method includes the following steps. ARequester 1103 intends to interact online with a digital identity (Step 1300). TheRequester 1103 identifies a digital identity (Step 1301). TheRequester 1103 determines aDigital Identity Provider 205 of the digital identity (Step 1302). TheRequester 1103 determines the location of digital identity related reputation data (Step 1303). TheRequester 1103 accesses the digital identity related reputation data (Step 1304). Based on the digital identity related reputation data, theRequester 1103 decides (determines) whether to interact with the digital identity (Steps 1305 and 1306). - The
Requester 1103 may be an individual or entity, but also could be a computer software running in conjunction with a server or a client program. If the Requester is a computer software, the intention to interact with a digital identity (Step 1300) may comprise a logic algorithm's determination to interact. The intention to interact (Step 1300) also may arise from an individual or entity's online encounter with a Subject's 1102 digital identity. Such an encounter could occur in an online social network or dating service, a website where aSubject 1102 offers an item for service or online sale, or where a Subject 1102 posts a comment or opinion on a website. For each of these applications, theSubject 1102 may be identified by his or her digital identity. - The
Digital Identity Provider 205 for the Subject's 1102 digital identity may then be determined (Step 1302). TheDigital Identity Provider 205 may be readily identifiable from the digital identity itself, an email, domain name, website, URL, or blog associated with the digital identity, or any other online encounter described in the previous paragraph. TheDigital Identity Provider 205 also may be ascertained by a search of aDigital Identity Database 206 and/orRecords Database 213 that may be made publicly available by aDigital Identity Provider 205 or another entity. If the digital identity comprises a domain name, theDigital Identity Provider 205 may be ascertained by a search ofWHOIS records 209 or DNS records. - After the
Digital Identity Provider 205 is determined (Step 1302), the location of the digital identity related reputation data may be determined (Step 1303). The location of the data may be, among other things, a database, a website, a web service, WHOIS records, DNS records, etc. The location of the digital identity related reputation data may be a predetermined location (i.e.—http://reputation.godaddy.com) or may be provided by a link or reference. The link or reference to the location may be, inter alia, a URL link, a DNS address, an IP address, a computer port, or any combination thereof. TheRequester 1103 may then access the reputation data (Step 1304), perhaps via a website, and decide (determine) whether the values in the digital identity related reputation data are appropriate to permit interaction with the digital identity. If the decision is made to interact, theRequester 1103 may proceed to email, communicate, sell, buy, date, or otherwise interact with the Subject's 1102 digital identity. - In this method the Requester may be computer software working in conjunction with an Internet browser. If the domain name and/or URL associated with the Subject's 1102 digital identity have a low reputation, the webpage located at the URL may be blocked. Alternatively, the computer software may give the Requester 1103 a warning that the domain name and/or the URL have a low reputation. The user may then decide whether to visit the URL. Each URL associated with a digital identity may have its own reputation rating. This is especially feasible when multiple parties are responsible for the content of a website associated with the domain name.
- The Digital Identity Provider or another party may publish digital identity related reputation data in the DNS or WHOIS records 209. The reputation values (ratings, scores) or one or more URL links, where the reputation values can be found, may be published in the DNS or WHOIS records 209. The party that tries to access digital identity related reputation data may obtain it, inter alia, from a predetermined URL on the Internet or from the DNS or WHOIS records 209. One embodiment of the method for publishing digital identity related reputation in the WHOIS records 209 includes the following steps. The
Digital Identity Provider 205 collects digital identity related information and forms digital identity related reputation data. Then, theDigital Identity Provider 205 stores the digital identity related reputation data in the WHOIS records 209. - In all of the above embodiments, the
Digital Identity Database 206 and theRecords Database 213 may be part of the same database, or separate databases. Similarly, they may be located on the same server or physically (and/or geographically) separated. - Other embodiments and uses of this invention will be apparent to those having ordinary skill in the art upon consideration of the specification and practice of the invention disclosed herein. The specification and examples given should be considered exemplary only, and it is contemplated that the appended claims will cover any other such embodiments or modifications as fall within the true scope of the invention.
- The Abstract accompanying this specification is provided to enable the United States Patent and Trademark Office and the public generally to determine quickly from a cursory inspection the nature and gist of the technical disclosure and in no way intended for defining, determining, or limiting the present invention or any of its embodiments.
Claims (31)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/482,306 US20090248623A1 (en) | 2007-05-09 | 2009-06-10 | Accessing digital identity related reputation data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/746,522 US20070208940A1 (en) | 2004-10-29 | 2007-05-09 | Digital identity related reputation tracking and publishing |
US12/482,306 US20090248623A1 (en) | 2007-05-09 | 2009-06-10 | Accessing digital identity related reputation data |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/746,522 Division US20070208940A1 (en) | 2004-10-29 | 2007-05-09 | Digital identity related reputation tracking and publishing |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090248623A1 true US20090248623A1 (en) | 2009-10-01 |
Family
ID=41129111
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/482,306 Abandoned US20090248623A1 (en) | 2007-05-09 | 2009-06-10 | Accessing digital identity related reputation data |
US12/482,297 Abandoned US20090271428A1 (en) | 2007-05-09 | 2009-06-10 | Tracking digital identity related reputation data |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/482,297 Abandoned US20090271428A1 (en) | 2007-05-09 | 2009-06-10 | Tracking digital identity related reputation data |
Country Status (1)
Country | Link |
---|---|
US (2) | US20090248623A1 (en) |
Cited By (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8255393B1 (en) * | 2009-08-07 | 2012-08-28 | Google Inc. | User location reputation system |
US8347386B2 (en) | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
US8365252B2 (en) | 2008-10-21 | 2013-01-29 | Lookout, Inc. | Providing access levels to services based on mobile device security state |
US8381303B2 (en) | 2008-10-21 | 2013-02-19 | Kevin Patrick Mahaffey | System and method for attack and malware prevention |
US8397301B2 (en) | 2009-11-18 | 2013-03-12 | Lookout, Inc. | System and method for identifying and assessing vulnerabilities on a mobile communication device |
US8467768B2 (en) | 2009-02-17 | 2013-06-18 | Lookout, Inc. | System and method for remotely securing or recovering a mobile device |
US8489732B1 (en) | 2009-08-07 | 2013-07-16 | Google Inc. | System and method of using spatial and temporal signals to identify and prevent attacks |
US8505095B2 (en) | 2008-10-21 | 2013-08-06 | Lookout, Inc. | System and method for monitoring and analyzing multiple interfaces and multiple protocols |
US8510843B2 (en) | 2008-10-21 | 2013-08-13 | Lookout, Inc. | Security status and information display system |
US8533844B2 (en) | 2008-10-21 | 2013-09-10 | Lookout, Inc. | System and method for security data collection and analysis |
US8538815B2 (en) | 2009-02-17 | 2013-09-17 | Lookout, Inc. | System and method for mobile device replacement |
US20130339447A1 (en) * | 2012-06-19 | 2013-12-19 | IPA (Cayman) Limited | Secure Digital Remediation Systems and Methods for Managing an Online Reputation |
US8655307B1 (en) | 2012-10-26 | 2014-02-18 | Lookout, Inc. | System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security |
US8738765B2 (en) | 2011-06-14 | 2014-05-27 | Lookout, Inc. | Mobile device DNS optimization |
US8788881B2 (en) | 2011-08-17 | 2014-07-22 | Lookout, Inc. | System and method for mobile device push communications |
US8855599B2 (en) | 2012-12-31 | 2014-10-07 | Lookout, Inc. | Method and apparatus for auxiliary communications with mobile communications device |
US8855601B2 (en) | 2009-02-17 | 2014-10-07 | Lookout, Inc. | System and method for remotely-initiated audio communication |
US8984628B2 (en) | 2008-10-21 | 2015-03-17 | Lookout, Inc. | System and method for adverse mobile application identification |
US9042876B2 (en) | 2009-02-17 | 2015-05-26 | Lookout, Inc. | System and method for uploading location information based on device movement |
US9043919B2 (en) | 2008-10-21 | 2015-05-26 | Lookout, Inc. | Crawling multiple markets and correlating |
US9208215B2 (en) | 2012-12-27 | 2015-12-08 | Lookout, Inc. | User classification based on data gathered from a computing device |
US9215074B2 (en) | 2012-06-05 | 2015-12-15 | Lookout, Inc. | Expressing intent to control behavior of application components |
US9235704B2 (en) | 2008-10-21 | 2016-01-12 | Lookout, Inc. | System and method for a scanning API |
US9258377B2 (en) | 2012-08-02 | 2016-02-09 | Alibaba Group Holding Limited | Publish information on website |
US9367680B2 (en) | 2008-10-21 | 2016-06-14 | Lookout, Inc. | System and method for mobile communication device application advisement |
US9374369B2 (en) | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US9424409B2 (en) | 2013-01-10 | 2016-08-23 | Lookout, Inc. | Method and system for protecting privacy and enhancing security on an electronic device |
US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
US9642008B2 (en) | 2013-10-25 | 2017-05-02 | Lookout, Inc. | System and method for creating and assigning a policy for a mobile communications device based on personal data |
US9753796B2 (en) | 2013-12-06 | 2017-09-05 | Lookout, Inc. | Distributed monitoring, evaluation, and response for multiple devices |
US9779253B2 (en) | 2008-10-21 | 2017-10-03 | Lookout, Inc. | Methods and systems for sharing risk responses to improve the functioning of mobile communications devices |
US9955352B2 (en) | 2009-02-17 | 2018-04-24 | Lookout, Inc. | Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such |
US10122747B2 (en) | 2013-12-06 | 2018-11-06 | Lookout, Inc. | Response generation after distributed monitoring and evaluation of multiple devices |
US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US10540494B2 (en) | 2015-05-01 | 2020-01-21 | Lookout, Inc. | Determining source of side-loaded software using an administrator server |
US11854011B1 (en) * | 2016-07-11 | 2023-12-26 | United Services Automobile Association (Usaa) | Identity management framework |
US12131294B2 (en) | 2012-06-21 | 2024-10-29 | Open Text Corporation | Activity stream based interaction |
US12149623B2 (en) | 2018-02-23 | 2024-11-19 | Open Text Inc. | Security privilege escalation exploit detection and mitigation |
US12164466B2 (en) | 2010-03-29 | 2024-12-10 | Open Text Inc. | Log file management |
US12197383B2 (en) | 2015-06-30 | 2025-01-14 | Open Text Corporation | Method and system for using dynamic content types |
US12235960B2 (en) | 2019-03-27 | 2025-02-25 | Open Text Inc. | Behavioral threat detection definition and compilation |
US12261822B2 (en) | 2014-06-22 | 2025-03-25 | Open Text Inc. | Network threat prediction and blocking |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8190868B2 (en) | 2006-08-07 | 2012-05-29 | Webroot Inc. | Malware management through kernel detection |
US8769702B2 (en) | 2008-04-16 | 2014-07-01 | Micosoft Corporation | Application reputation service |
US11489857B2 (en) | 2009-04-21 | 2022-11-01 | Webroot Inc. | System and method for developing a risk profile for an internet resource |
US8626705B2 (en) * | 2009-11-05 | 2014-01-07 | Visa International Service Association | Transaction aggregator for closed processing |
US9235586B2 (en) | 2010-09-13 | 2016-01-12 | Microsoft Technology Licensing, Llc | Reputation checking obtained files |
US8863291B2 (en) | 2011-01-20 | 2014-10-14 | Microsoft Corporation | Reputation checking of executable programs |
TWI480819B (en) * | 2011-10-04 | 2015-04-11 | Univ Nat Taiwan | Peer-to-peer based reputation system and method for social network |
US9158913B2 (en) * | 2012-07-09 | 2015-10-13 | Ca, Inc. | Managing virtual machines using owner digital signatures |
US20180374151A1 (en) * | 2017-06-27 | 2018-12-27 | Intuit Inc. | Dynamic reputation score for a digital identity |
Citations (79)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5657390A (en) * | 1995-08-25 | 1997-08-12 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
US5872848A (en) * | 1997-02-18 | 1999-02-16 | Arcanvs | Method and apparatus for witnessed authentication of electronic documents |
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US6029192A (en) * | 1996-03-15 | 2000-02-22 | At&T Corp. | System and method for locating resources on a network using resource evaluations derived from electronic messages |
US6085242A (en) * | 1999-01-05 | 2000-07-04 | Chandra; Rohit | Method for managing a repository of user information using a personalized uniform locator |
US6263447B1 (en) * | 1998-05-21 | 2001-07-17 | Equifax Inc. | System and method for authentication of network users |
US20010021931A1 (en) * | 2000-03-13 | 2001-09-13 | Vaughan Ian John | Organising information |
US20010025342A1 (en) * | 2000-02-03 | 2001-09-27 | Kaoru Uchida | Biometric identification method and system |
US6332158B1 (en) * | 1998-12-03 | 2001-12-18 | Chris Risley | Domain name system lookup allowing intelligent correction of searches and presentation of auxiliary information |
US20020010795A1 (en) * | 2000-06-09 | 2002-01-24 | Brown Charles P. | Method and system for protecting domain names |
US20020026439A1 (en) * | 2000-06-30 | 2002-02-28 | Monroe Steven C. | System, method, and article of manufacture for maintaining and accessing a whois database |
US20020065903A1 (en) * | 1999-12-01 | 2002-05-30 | Barry Fellman | Internet domain name registration system |
US20020069129A1 (en) * | 2000-12-04 | 2002-06-06 | Takeshi Akutsu | Electronic commerce system for using secure user certification |
US20020078152A1 (en) * | 2000-12-19 | 2002-06-20 | Barry Boone | Method and apparatus for providing predefined feedback |
US20020091827A1 (en) * | 2000-11-01 | 2002-07-11 | Raymond King | Domain name acquisition and management system and method |
US20020120537A1 (en) * | 2001-02-28 | 2002-08-29 | Dominic Morea | Web based system and method for managing business to business online transactions |
US20020129013A1 (en) * | 1999-09-07 | 2002-09-12 | Invention Depot, Inc. | Method and system for monitoring domain name registrations |
US20020133365A1 (en) * | 2001-03-19 | 2002-09-19 | William Grey | System and method for aggregating reputational information |
US20020198866A1 (en) * | 2001-03-13 | 2002-12-26 | Reiner Kraft | Credibility rating platform |
US20020198824A1 (en) * | 2001-06-25 | 2002-12-26 | Cook Scott D. | Collecting and aggregating creditworthiness data |
US20030078894A1 (en) * | 2001-08-27 | 2003-04-24 | Masashi Kon | Over-network resource distribution system and mutual authentication system |
US6560634B1 (en) * | 1997-08-15 | 2003-05-06 | Verisign, Inc. | Method of determining unavailability of an internet domain name |
US20030105955A1 (en) * | 1998-06-04 | 2003-06-05 | International Business Machines Corporation | Secure communication system and method of operation for conducting electronic commerce using remote vault agents interacting with a vault controller |
US20030115475A1 (en) * | 2001-07-12 | 2003-06-19 | Russo Anthony P. | Biometrically enhanced digital certificates and system and method for making and using |
US20030120649A1 (en) * | 2001-11-26 | 2003-06-26 | Fujitsu Limited | Content information analyzing method and apparatus |
US20030126431A1 (en) * | 2001-10-12 | 2003-07-03 | Beattie Douglas D. | Methods and systems for automated authentication, processing and issuance of digital certificates |
US20030177274A1 (en) * | 2002-03-12 | 2003-09-18 | Chen Sun | Virtual subdomain address file suffix |
US20030182573A1 (en) * | 2000-07-07 | 2003-09-25 | Toneguzzo Steve John | Content filtering and management |
US20040008374A1 (en) * | 2002-06-25 | 2004-01-15 | Samsung Electronics Co., Ltd. | Method and apparatus for printing image using memory card |
US20040073691A1 (en) * | 1999-12-31 | 2004-04-15 | Chen Sun | Individuals' URL identity exchange and communications |
US6725269B1 (en) * | 1999-12-02 | 2004-04-20 | International Business Machines Corporation | System and method for maintaining multiple identities and reputations for internet interactions |
US6745248B1 (en) * | 2000-08-02 | 2004-06-01 | Register.Com, Inc. | Method and apparatus for analyzing domain name registrations |
US20040122926A1 (en) * | 2002-12-23 | 2004-06-24 | Microsoft Corporation, Redmond, Washington. | Reputation system for web services |
US20040162786A1 (en) * | 2003-02-13 | 2004-08-19 | Cross David B. | Digital identity management |
US20040167982A1 (en) * | 2003-02-26 | 2004-08-26 | Cohen Michael A. | Multiple registrars |
US20040169678A1 (en) * | 2002-11-27 | 2004-09-02 | Oliver Huw Edward | Obtaining user feedback on displayed items |
US20040177120A1 (en) * | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages |
US20040199520A1 (en) * | 2003-04-04 | 2004-10-07 | Parsons Advanced Holdings, Inc. | Method for checking the availability of a domain name |
US6856963B1 (en) * | 2000-01-11 | 2005-02-15 | Intel Corporation | Facilitating electronic commerce through automated data-based reputation characterization |
US20050044423A1 (en) * | 1999-11-12 | 2005-02-24 | Mellmer Joseph Andrew | Managing digital identity information |
US20050060417A1 (en) * | 2003-09-16 | 2005-03-17 | Rose Keith R. | Automated electronic personal preference & proxy network |
US20050071741A1 (en) * | 2003-09-30 | 2005-03-31 | Anurag Acharya | Information retrieval based on historical data |
US6880007B1 (en) * | 1999-06-07 | 2005-04-12 | Register Com, Inc. | Domain manager and method of use |
US20050080855A1 (en) * | 2003-10-09 | 2005-04-14 | Murray David J. | Method for creating a whitelist for processing e-mails |
US20050102354A1 (en) * | 1999-04-22 | 2005-05-12 | Scott Hollenbeck | Shared registration system for registering domain names |
US20050193076A1 (en) * | 2004-02-17 | 2005-09-01 | Andrew Flury | Collecting, aggregating, and managing information relating to electronic messages |
US20050257261A1 (en) * | 2004-05-02 | 2005-11-17 | Emarkmonitor, Inc. | Online fraud solution |
US20060004896A1 (en) * | 2004-06-16 | 2006-01-05 | International Business Machines Corporation | Managing unwanted/unsolicited e-mail protection using sender identity |
US20060005009A1 (en) * | 2004-06-30 | 2006-01-05 | International Business Machines Corporation | Method, system and program product for verifying an attribute of a computing device |
US20060004784A1 (en) * | 2004-05-27 | 2006-01-05 | Scott Ableman | Certified offer service for domain names |
US20060009994A1 (en) * | 2004-07-07 | 2006-01-12 | Tad Hogg | System and method for reputation rating |
US20060015722A1 (en) * | 2004-07-16 | 2006-01-19 | Geotrust | Security systems and services to provide identity and uniform resource identifier verification |
US20060015472A1 (en) * | 2004-07-13 | 2006-01-19 | Ahlander John L | Filtering cached content based on embedded URLs |
US20060031314A1 (en) * | 2004-05-28 | 2006-02-09 | Robert Brahms | Techniques for determining the reputation of a message sender |
US20060031319A1 (en) * | 2004-06-16 | 2006-02-09 | International Business Machines Corporation | Hiearchically verifying the identity of the sender of an e-mail message |
US20060069697A1 (en) * | 2004-05-02 | 2006-03-30 | Markmonitor, Inc. | Methods and systems for analyzing data related to possible online fraud |
US20060095586A1 (en) * | 2004-10-29 | 2006-05-04 | The Go Daddy Group, Inc. | Tracking domain name related reputation |
US20060106793A1 (en) * | 2003-12-29 | 2006-05-18 | Ping Liang | Internet and computer information retrieval and mining with intelligent conceptual filtering, visualization and automation |
US7072944B2 (en) * | 2002-10-07 | 2006-07-04 | Ebay Inc. | Method and apparatus for authenticating electronic mail |
US7076541B1 (en) * | 2000-06-05 | 2006-07-11 | Register.Com, Inc. | Method and apparatus providing distributed domain management capabilities |
US20060168057A1 (en) * | 2004-10-06 | 2006-07-27 | Habeas, Inc. | Method and system for enhanced electronic mail processing |
US20060212931A1 (en) * | 2005-03-02 | 2006-09-21 | Markmonitor, Inc. | Trust evaluation systems and methods |
US20060230039A1 (en) * | 2005-01-25 | 2006-10-12 | Markmonitor, Inc. | Online identity tracking |
US20060235824A1 (en) * | 2002-09-13 | 2006-10-19 | Overture Services, Inc. | Automated processing of appropriateness determination of content for search listings in wide area network searches |
US20060253584A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Reputation of an entity associated with a content item |
US20060253583A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations based on website handling of personal information |
US20060271668A1 (en) * | 2002-08-30 | 2006-11-30 | Parsons Robert R | Systems and methods for domain name registration by proxy |
US20070204168A1 (en) * | 2006-02-24 | 2007-08-30 | Microsoft Corporation | Identity providers in digital identity system |
US20070294431A1 (en) * | 2004-10-29 | 2007-12-20 | The Go Daddy Group, Inc. | Digital identity validation |
US7350229B1 (en) * | 2001-03-07 | 2008-03-25 | Netegrity, Inc. | Authentication and authorization mapping for a computer network |
US7356837B2 (en) * | 2001-08-29 | 2008-04-08 | Nader Asghari-Kamrani | Centralized identification and authentication system and method |
US7437558B2 (en) * | 2004-06-01 | 2008-10-14 | Cisco Technology, Inc. | Method and system for verifying identification of an electronic mail message |
US7475425B2 (en) * | 2003-11-18 | 2009-01-06 | International Business Machines Corporation | Internet site authentication service |
US20090013182A1 (en) * | 2001-08-29 | 2009-01-08 | Nader Asghari-Kamrani | Centralized Identification and Authentication System and Method |
US7516418B2 (en) * | 2006-06-01 | 2009-04-07 | Microsoft Corporation | Automatic tracking of user data and reputation checking |
US7515289B2 (en) * | 2002-06-26 | 2009-04-07 | Casio Computer Co., Ltd. | Network printing system, server, printing machine, and printing method |
US20090094379A1 (en) * | 1999-03-19 | 2009-04-09 | Network Solutions, Llc | Apparatus and Method for Web Forwarding |
US7523310B2 (en) * | 2002-06-28 | 2009-04-21 | Microsoft Corporation | Domain-based trust models for rights management of content |
US7797413B2 (en) * | 2004-10-29 | 2010-09-14 | The Go Daddy Group, Inc. | Digital identity registration |
-
2009
- 2009-06-10 US US12/482,306 patent/US20090248623A1/en not_active Abandoned
- 2009-06-10 US US12/482,297 patent/US20090271428A1/en not_active Abandoned
Patent Citations (91)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5825890A (en) * | 1995-08-25 | 1998-10-20 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
US5657390A (en) * | 1995-08-25 | 1997-08-12 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
US6029192A (en) * | 1996-03-15 | 2000-02-22 | At&T Corp. | System and method for locating resources on a network using resource evaluations derived from electronic messages |
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US5872848A (en) * | 1997-02-18 | 1999-02-16 | Arcanvs | Method and apparatus for witnessed authentication of electronic documents |
US6560634B1 (en) * | 1997-08-15 | 2003-05-06 | Verisign, Inc. | Method of determining unavailability of an internet domain name |
US6263447B1 (en) * | 1998-05-21 | 2001-07-17 | Equifax Inc. | System and method for authentication of network users |
US20030105955A1 (en) * | 1998-06-04 | 2003-06-05 | International Business Machines Corporation | Secure communication system and method of operation for conducting electronic commerce using remote vault agents interacting with a vault controller |
US6332158B1 (en) * | 1998-12-03 | 2001-12-18 | Chris Risley | Domain name system lookup allowing intelligent correction of searches and presentation of auxiliary information |
US6085242A (en) * | 1999-01-05 | 2000-07-04 | Chandra; Rohit | Method for managing a repository of user information using a personalized uniform locator |
US20090094379A1 (en) * | 1999-03-19 | 2009-04-09 | Network Solutions, Llc | Apparatus and Method for Web Forwarding |
US20050102354A1 (en) * | 1999-04-22 | 2005-05-12 | Scott Hollenbeck | Shared registration system for registering domain names |
US6880007B1 (en) * | 1999-06-07 | 2005-04-12 | Register Com, Inc. | Domain manager and method of use |
US7069323B2 (en) * | 1999-06-07 | 2006-06-27 | Register.Com, Inc. | Domain manager and method of use |
US20020129013A1 (en) * | 1999-09-07 | 2002-09-12 | Invention Depot, Inc. | Method and system for monitoring domain name registrations |
US7680819B1 (en) * | 1999-11-12 | 2010-03-16 | Novell, Inc. | Managing digital identity information |
US20050044423A1 (en) * | 1999-11-12 | 2005-02-24 | Mellmer Joseph Andrew | Managing digital identity information |
US20020065903A1 (en) * | 1999-12-01 | 2002-05-30 | Barry Fellman | Internet domain name registration system |
US6725269B1 (en) * | 1999-12-02 | 2004-04-20 | International Business Machines Corporation | System and method for maintaining multiple identities and reputations for internet interactions |
US20040073691A1 (en) * | 1999-12-31 | 2004-04-15 | Chen Sun | Individuals' URL identity exchange and communications |
US6856963B1 (en) * | 2000-01-11 | 2005-02-15 | Intel Corporation | Facilitating electronic commerce through automated data-based reputation characterization |
US20010025342A1 (en) * | 2000-02-03 | 2001-09-27 | Kaoru Uchida | Biometric identification method and system |
US20010021931A1 (en) * | 2000-03-13 | 2001-09-13 | Vaughan Ian John | Organising information |
US7076541B1 (en) * | 2000-06-05 | 2006-07-11 | Register.Com, Inc. | Method and apparatus providing distributed domain management capabilities |
US20020010795A1 (en) * | 2000-06-09 | 2002-01-24 | Brown Charles P. | Method and system for protecting domain names |
US7467140B2 (en) * | 2000-06-30 | 2008-12-16 | Verisign, Inc. | System, method, and article of manufacture for maintaining and accessing a whois database |
US20020026439A1 (en) * | 2000-06-30 | 2002-02-28 | Monroe Steven C. | System, method, and article of manufacture for maintaining and accessing a whois database |
US20030182573A1 (en) * | 2000-07-07 | 2003-09-25 | Toneguzzo Steve John | Content filtering and management |
US6745248B1 (en) * | 2000-08-02 | 2004-06-01 | Register.Com, Inc. | Method and apparatus for analyzing domain name registrations |
US20020091827A1 (en) * | 2000-11-01 | 2002-07-11 | Raymond King | Domain name acquisition and management system and method |
US7606858B2 (en) * | 2000-11-01 | 2009-10-20 | Snapnames.Com, Inc. | Domain name acquisition and management system and method |
US20020091703A1 (en) * | 2000-11-01 | 2002-07-11 | Bayles Len Albert | Registry-integrated internet domain name acquisition system |
US7039697B2 (en) * | 2000-11-01 | 2006-05-02 | Snapnames.Com Inc. | Registry-integrated internet domain name acquisition system |
US20020069129A1 (en) * | 2000-12-04 | 2002-06-06 | Takeshi Akutsu | Electronic commerce system for using secure user certification |
US20020078152A1 (en) * | 2000-12-19 | 2002-06-20 | Barry Boone | Method and apparatus for providing predefined feedback |
US20020120537A1 (en) * | 2001-02-28 | 2002-08-29 | Dominic Morea | Web based system and method for managing business to business online transactions |
US7350229B1 (en) * | 2001-03-07 | 2008-03-25 | Netegrity, Inc. | Authentication and authorization mapping for a computer network |
US20020198866A1 (en) * | 2001-03-13 | 2002-12-26 | Reiner Kraft | Credibility rating platform |
US20020133365A1 (en) * | 2001-03-19 | 2002-09-19 | William Grey | System and method for aggregating reputational information |
US20020198824A1 (en) * | 2001-06-25 | 2002-12-26 | Cook Scott D. | Collecting and aggregating creditworthiness data |
US20030115475A1 (en) * | 2001-07-12 | 2003-06-19 | Russo Anthony P. | Biometrically enhanced digital certificates and system and method for making and using |
US20030078894A1 (en) * | 2001-08-27 | 2003-04-24 | Masashi Kon | Over-network resource distribution system and mutual authentication system |
US7356837B2 (en) * | 2001-08-29 | 2008-04-08 | Nader Asghari-Kamrani | Centralized identification and authentication system and method |
US20090013182A1 (en) * | 2001-08-29 | 2009-01-08 | Nader Asghari-Kamrani | Centralized Identification and Authentication System and Method |
US20030126431A1 (en) * | 2001-10-12 | 2003-07-03 | Beattie Douglas D. | Methods and systems for automated authentication, processing and issuance of digital certificates |
US20030120649A1 (en) * | 2001-11-26 | 2003-06-26 | Fujitsu Limited | Content information analyzing method and apparatus |
US20030177274A1 (en) * | 2002-03-12 | 2003-09-18 | Chen Sun | Virtual subdomain address file suffix |
US20040008374A1 (en) * | 2002-06-25 | 2004-01-15 | Samsung Electronics Co., Ltd. | Method and apparatus for printing image using memory card |
US7515289B2 (en) * | 2002-06-26 | 2009-04-07 | Casio Computer Co., Ltd. | Network printing system, server, printing machine, and printing method |
US7523310B2 (en) * | 2002-06-28 | 2009-04-21 | Microsoft Corporation | Domain-based trust models for rights management of content |
US20060271668A1 (en) * | 2002-08-30 | 2006-11-30 | Parsons Robert R | Systems and methods for domain name registration by proxy |
US20060235824A1 (en) * | 2002-09-13 | 2006-10-19 | Overture Services, Inc. | Automated processing of appropriateness determination of content for search listings in wide area network searches |
US7072944B2 (en) * | 2002-10-07 | 2006-07-04 | Ebay Inc. | Method and apparatus for authenticating electronic mail |
US20060206572A1 (en) * | 2002-10-07 | 2006-09-14 | Ebay Inc. | Authenticating electronic communications |
US7320021B2 (en) * | 2002-10-07 | 2008-01-15 | Ebay Inc. | Authenticating electronic communications |
US20040169678A1 (en) * | 2002-11-27 | 2004-09-02 | Oliver Huw Edward | Obtaining user feedback on displayed items |
US7467206B2 (en) * | 2002-12-23 | 2008-12-16 | Microsoft Corporation | Reputation system for web services |
US20040122926A1 (en) * | 2002-12-23 | 2004-06-24 | Microsoft Corporation, Redmond, Washington. | Reputation system for web services |
US20040162786A1 (en) * | 2003-02-13 | 2004-08-19 | Cross David B. | Digital identity management |
US20040167982A1 (en) * | 2003-02-26 | 2004-08-26 | Cohen Michael A. | Multiple registrars |
US20040177120A1 (en) * | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages |
US20040199520A1 (en) * | 2003-04-04 | 2004-10-07 | Parsons Advanced Holdings, Inc. | Method for checking the availability of a domain name |
US20050060417A1 (en) * | 2003-09-16 | 2005-03-17 | Rose Keith R. | Automated electronic personal preference & proxy network |
US20050071741A1 (en) * | 2003-09-30 | 2005-03-31 | Anurag Acharya | Information retrieval based on historical data |
US20050080855A1 (en) * | 2003-10-09 | 2005-04-14 | Murray David J. | Method for creating a whitelist for processing e-mails |
US7475425B2 (en) * | 2003-11-18 | 2009-01-06 | International Business Machines Corporation | Internet site authentication service |
US20060106793A1 (en) * | 2003-12-29 | 2006-05-18 | Ping Liang | Internet and computer information retrieval and mining with intelligent conceptual filtering, visualization and automation |
US20050193076A1 (en) * | 2004-02-17 | 2005-09-01 | Andrew Flury | Collecting, aggregating, and managing information relating to electronic messages |
US20060069697A1 (en) * | 2004-05-02 | 2006-03-30 | Markmonitor, Inc. | Methods and systems for analyzing data related to possible online fraud |
US20050257261A1 (en) * | 2004-05-02 | 2005-11-17 | Emarkmonitor, Inc. | Online fraud solution |
US20060004784A1 (en) * | 2004-05-27 | 2006-01-05 | Scott Ableman | Certified offer service for domain names |
US20060031314A1 (en) * | 2004-05-28 | 2006-02-09 | Robert Brahms | Techniques for determining the reputation of a message sender |
US20080320591A1 (en) * | 2004-06-01 | 2008-12-25 | Cisco Technology, Inc. | Method and system for verifying identification of an electronic mail message |
US7437558B2 (en) * | 2004-06-01 | 2008-10-14 | Cisco Technology, Inc. | Method and system for verifying identification of an electronic mail message |
US20060004896A1 (en) * | 2004-06-16 | 2006-01-05 | International Business Machines Corporation | Managing unwanted/unsolicited e-mail protection using sender identity |
US20060031319A1 (en) * | 2004-06-16 | 2006-02-09 | International Business Machines Corporation | Hiearchically verifying the identity of the sender of an e-mail message |
US20060005009A1 (en) * | 2004-06-30 | 2006-01-05 | International Business Machines Corporation | Method, system and program product for verifying an attribute of a computing device |
US20060009994A1 (en) * | 2004-07-07 | 2006-01-12 | Tad Hogg | System and method for reputation rating |
US20060015472A1 (en) * | 2004-07-13 | 2006-01-19 | Ahlander John L | Filtering cached content based on embedded URLs |
US20060015722A1 (en) * | 2004-07-16 | 2006-01-19 | Geotrust | Security systems and services to provide identity and uniform resource identifier verification |
US20060168057A1 (en) * | 2004-10-06 | 2006-07-27 | Habeas, Inc. | Method and system for enhanced electronic mail processing |
US20060095586A1 (en) * | 2004-10-29 | 2006-05-04 | The Go Daddy Group, Inc. | Tracking domain name related reputation |
US20070294431A1 (en) * | 2004-10-29 | 2007-12-20 | The Go Daddy Group, Inc. | Digital identity validation |
US7797413B2 (en) * | 2004-10-29 | 2010-09-14 | The Go Daddy Group, Inc. | Digital identity registration |
US20060230039A1 (en) * | 2005-01-25 | 2006-10-12 | Markmonitor, Inc. | Online identity tracking |
US20060212930A1 (en) * | 2005-03-02 | 2006-09-21 | Markmonitor, Inc. | Distribution of trust data |
US20060212931A1 (en) * | 2005-03-02 | 2006-09-21 | Markmonitor, Inc. | Trust evaluation systems and methods |
US20060253583A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations based on website handling of personal information |
US20060253584A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Reputation of an entity associated with a content item |
US20070204168A1 (en) * | 2006-02-24 | 2007-08-30 | Microsoft Corporation | Identity providers in digital identity system |
US7516418B2 (en) * | 2006-06-01 | 2009-04-07 | Microsoft Corporation | Automatic tracking of user data and reputation checking |
Cited By (106)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9043919B2 (en) | 2008-10-21 | 2015-05-26 | Lookout, Inc. | Crawling multiple markets and correlating |
US8347386B2 (en) | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
US8365252B2 (en) | 2008-10-21 | 2013-01-29 | Lookout, Inc. | Providing access levels to services based on mobile device security state |
US11080407B2 (en) | 2008-10-21 | 2021-08-03 | Lookout, Inc. | Methods and systems for analyzing data after initial analyses by known good and known bad security components |
US8381303B2 (en) | 2008-10-21 | 2013-02-19 | Kevin Patrick Mahaffey | System and method for attack and malware prevention |
US10509910B2 (en) | 2008-10-21 | 2019-12-17 | Lookout, Inc. | Methods and systems for granting access to services based on a security state that varies with the severity of security events |
US10509911B2 (en) | 2008-10-21 | 2019-12-17 | Lookout, Inc. | Methods and systems for conditionally granting access to services based on the security state of the device requesting access |
US10417432B2 (en) | 2008-10-21 | 2019-09-17 | Lookout, Inc. | Methods and systems for blocking potentially harmful communications to improve the functioning of an electronic device |
US9996697B2 (en) | 2008-10-21 | 2018-06-12 | Lookout, Inc. | Methods and systems for blocking the installation of an application to improve the functioning of a mobile communications device |
US8505095B2 (en) | 2008-10-21 | 2013-08-06 | Lookout, Inc. | System and method for monitoring and analyzing multiple interfaces and multiple protocols |
US8510843B2 (en) | 2008-10-21 | 2013-08-13 | Lookout, Inc. | Security status and information display system |
US8533844B2 (en) | 2008-10-21 | 2013-09-10 | Lookout, Inc. | System and method for security data collection and analysis |
US9860263B2 (en) | 2008-10-21 | 2018-01-02 | Lookout, Inc. | System and method for assessing data objects on mobile communications devices |
US8561144B2 (en) | 2008-10-21 | 2013-10-15 | Lookout, Inc. | Enforcing security based on a security state assessment of a mobile device |
US9781148B2 (en) | 2008-10-21 | 2017-10-03 | Lookout, Inc. | Methods and systems for sharing risk responses between collections of mobile communications devices |
US9779253B2 (en) | 2008-10-21 | 2017-10-03 | Lookout, Inc. | Methods and systems for sharing risk responses to improve the functioning of mobile communications devices |
US9740852B2 (en) | 2008-10-21 | 2017-08-22 | Lookout, Inc. | System and method for assessing an application to be installed on a mobile communications device |
US8683593B2 (en) | 2008-10-21 | 2014-03-25 | Lookout, Inc. | Server-assisted analysis of data for a mobile device |
US9407640B2 (en) | 2008-10-21 | 2016-08-02 | Lookout, Inc. | Assessing a security state of a mobile communications device to determine access to specific tasks |
US9367680B2 (en) | 2008-10-21 | 2016-06-14 | Lookout, Inc. | System and method for mobile communication device application advisement |
US8745739B2 (en) | 2008-10-21 | 2014-06-03 | Lookout, Inc. | System and method for server-coupled application re-analysis to obtain characterization assessment |
US8752176B2 (en) | 2008-10-21 | 2014-06-10 | Lookout, Inc. | System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment |
US9344431B2 (en) | 2008-10-21 | 2016-05-17 | Lookout, Inc. | System and method for assessing an application based on data from multiple devices |
US9294500B2 (en) | 2008-10-21 | 2016-03-22 | Lookout, Inc. | System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects |
US9245119B2 (en) | 2008-10-21 | 2016-01-26 | Lookout, Inc. | Security status assessment using mobile device security information database |
US8826441B2 (en) | 2008-10-21 | 2014-09-02 | Lookout, Inc. | Event-based security state assessment and display for mobile devices |
US9235704B2 (en) | 2008-10-21 | 2016-01-12 | Lookout, Inc. | System and method for a scanning API |
US9223973B2 (en) | 2008-10-21 | 2015-12-29 | Lookout, Inc. | System and method for attack and malware prevention |
US8875289B2 (en) | 2008-10-21 | 2014-10-28 | Lookout, Inc. | System and method for preventing malware on a mobile communication device |
US8881292B2 (en) | 2008-10-21 | 2014-11-04 | Lookout, Inc. | Evaluating whether data is safe or malicious |
US9100389B2 (en) | 2008-10-21 | 2015-08-04 | Lookout, Inc. | Assessing an application based on application data associated with the application |
US8984628B2 (en) | 2008-10-21 | 2015-03-17 | Lookout, Inc. | System and method for adverse mobile application identification |
US8997181B2 (en) | 2008-10-21 | 2015-03-31 | Lookout, Inc. | Assessing the security state of a mobile communications device |
US9065846B2 (en) | 2008-10-21 | 2015-06-23 | Lookout, Inc. | Analyzing data gathered through different protocols |
US8855601B2 (en) | 2009-02-17 | 2014-10-07 | Lookout, Inc. | System and method for remotely-initiated audio communication |
US8774788B2 (en) | 2009-02-17 | 2014-07-08 | Lookout, Inc. | Systems and methods for transmitting a communication based on a device leaving or entering an area |
US9100925B2 (en) | 2009-02-17 | 2015-08-04 | Lookout, Inc. | Systems and methods for displaying location information of a device |
US8929874B2 (en) | 2009-02-17 | 2015-01-06 | Lookout, Inc. | Systems and methods for remotely controlling a lost mobile communications device |
US9167550B2 (en) | 2009-02-17 | 2015-10-20 | Lookout, Inc. | Systems and methods for applying a security policy to a device based on location |
US9179434B2 (en) | 2009-02-17 | 2015-11-03 | Lookout, Inc. | Systems and methods for locking and disabling a device in response to a request |
US8538815B2 (en) | 2009-02-17 | 2013-09-17 | Lookout, Inc. | System and method for mobile device replacement |
US8635109B2 (en) | 2009-02-17 | 2014-01-21 | Lookout, Inc. | System and method for providing offers for mobile devices |
US9955352B2 (en) | 2009-02-17 | 2018-04-24 | Lookout, Inc. | Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such |
US9232491B2 (en) | 2009-02-17 | 2016-01-05 | Lookout, Inc. | Mobile device geolocation |
US8467768B2 (en) | 2009-02-17 | 2013-06-18 | Lookout, Inc. | System and method for remotely securing or recovering a mobile device |
US10419936B2 (en) | 2009-02-17 | 2019-09-17 | Lookout, Inc. | Methods and systems for causing mobile communications devices to emit sounds with encoded information |
US8825007B2 (en) | 2009-02-17 | 2014-09-02 | Lookout, Inc. | Systems and methods for applying a security policy to a device based on a comparison of locations |
US8682400B2 (en) | 2009-02-17 | 2014-03-25 | Lookout, Inc. | Systems and methods for device broadcast of location information when battery is low |
US10623960B2 (en) | 2009-02-17 | 2020-04-14 | Lookout, Inc. | Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices |
US9042876B2 (en) | 2009-02-17 | 2015-05-26 | Lookout, Inc. | System and method for uploading location information based on device movement |
US8423791B1 (en) | 2009-08-07 | 2013-04-16 | Google Inc. | Location data quarantine system |
US11818622B1 (en) | 2009-08-07 | 2023-11-14 | Google Llc | System and method of using spatial and temporal signals to identify and prevent attacks |
US9936339B1 (en) | 2009-08-07 | 2018-04-03 | Google Llc | System and method of using spatial and temporal signals to identify and prevent attacks |
US8370340B1 (en) * | 2009-08-07 | 2013-02-05 | Google Inc. | User location reputation system |
US10834521B1 (en) | 2009-08-07 | 2020-11-10 | Google Llc | System and method of using spatial and temporal signals to identify and prevent attacks |
US8255393B1 (en) * | 2009-08-07 | 2012-08-28 | Google Inc. | User location reputation system |
US8489732B1 (en) | 2009-08-07 | 2013-07-16 | Google Inc. | System and method of using spatial and temporal signals to identify and prevent attacks |
US10349202B1 (en) | 2009-08-07 | 2019-07-09 | Google Llc | System and method of using spatial and temporal signals to identify and prevent attacks |
US9239929B1 (en) | 2009-08-07 | 2016-01-19 | Google Inc. | Location data quarantine system |
US8397301B2 (en) | 2009-11-18 | 2013-03-12 | Lookout, Inc. | System and method for identifying and assessing vulnerabilities on a mobile communication device |
USRE47757E1 (en) | 2009-11-18 | 2019-12-03 | Lookout, Inc. | System and method for identifying and assessing vulnerabilities on a mobile communications device |
USRE46768E1 (en) | 2009-11-18 | 2018-03-27 | Lookout, Inc. | System and method for identifying and assessing vulnerabilities on a mobile communications device |
USRE49634E1 (en) | 2009-11-18 | 2023-08-29 | Lookout, Inc. | System and method for determining the risk of vulnerabilities on a mobile communications device |
USRE48669E1 (en) | 2009-11-18 | 2021-08-03 | Lookout, Inc. | System and method for identifying and [assessing] remediating vulnerabilities on a mobile communications device |
US12164466B2 (en) | 2010-03-29 | 2024-12-10 | Open Text Inc. | Log file management |
US12210479B2 (en) | 2010-03-29 | 2025-01-28 | Open Text Inc. | Log file management |
US8738765B2 (en) | 2011-06-14 | 2014-05-27 | Lookout, Inc. | Mobile device DNS optimization |
US9319292B2 (en) | 2011-06-14 | 2016-04-19 | Lookout, Inc. | Client activity DNS optimization |
US10181118B2 (en) | 2011-08-17 | 2019-01-15 | Lookout, Inc. | Mobile communications device payment method utilizing location information |
US8788881B2 (en) | 2011-08-17 | 2014-07-22 | Lookout, Inc. | System and method for mobile device push communications |
US9992025B2 (en) | 2012-06-05 | 2018-06-05 | Lookout, Inc. | Monitoring installed applications on user devices |
US9407443B2 (en) | 2012-06-05 | 2016-08-02 | Lookout, Inc. | Component analysis of software applications on computing devices |
US11336458B2 (en) | 2012-06-05 | 2022-05-17 | Lookout, Inc. | Evaluating authenticity of applications based on assessing user device context for increased security |
US10256979B2 (en) | 2012-06-05 | 2019-04-09 | Lookout, Inc. | Assessing application authenticity and performing an action in response to an evaluation result |
US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
US10419222B2 (en) | 2012-06-05 | 2019-09-17 | Lookout, Inc. | Monitoring for fraudulent or harmful behavior in applications being installed on user devices |
US9215074B2 (en) | 2012-06-05 | 2015-12-15 | Lookout, Inc. | Expressing intent to control behavior of application components |
US9940454B2 (en) | 2012-06-05 | 2018-04-10 | Lookout, Inc. | Determining source of side-loaded software using signature of authorship |
US20130339447A1 (en) * | 2012-06-19 | 2013-12-19 | IPA (Cayman) Limited | Secure Digital Remediation Systems and Methods for Managing an Online Reputation |
US9258340B2 (en) * | 2012-06-19 | 2016-02-09 | IPA (Cayman) Limited | Secure digital remediation systems and methods for managing an online reputation |
US12131294B2 (en) | 2012-06-21 | 2024-10-29 | Open Text Corporation | Activity stream based interaction |
US9258377B2 (en) | 2012-08-02 | 2016-02-09 | Alibaba Group Holding Limited | Publish information on website |
US8655307B1 (en) | 2012-10-26 | 2014-02-18 | Lookout, Inc. | System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security |
US9408143B2 (en) | 2012-10-26 | 2016-08-02 | Lookout, Inc. | System and method for using context models to control operation of a mobile communications device |
US9769749B2 (en) | 2012-10-26 | 2017-09-19 | Lookout, Inc. | Modifying mobile device settings for resource conservation |
US9208215B2 (en) | 2012-12-27 | 2015-12-08 | Lookout, Inc. | User classification based on data gathered from a computing device |
US9374369B2 (en) | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US8855599B2 (en) | 2012-12-31 | 2014-10-07 | Lookout, Inc. | Method and apparatus for auxiliary communications with mobile communications device |
US9424409B2 (en) | 2013-01-10 | 2016-08-23 | Lookout, Inc. | Method and system for protecting privacy and enhancing security on an electronic device |
US10990696B2 (en) | 2013-10-25 | 2021-04-27 | Lookout, Inc. | Methods and systems for detecting attempts to access personal information on mobile communications devices |
US10452862B2 (en) | 2013-10-25 | 2019-10-22 | Lookout, Inc. | System and method for creating a policy for managing personal data on a mobile communications device |
US9642008B2 (en) | 2013-10-25 | 2017-05-02 | Lookout, Inc. | System and method for creating and assigning a policy for a mobile communications device based on personal data |
US10742676B2 (en) | 2013-12-06 | 2020-08-11 | Lookout, Inc. | Distributed monitoring and evaluation of multiple devices |
US9753796B2 (en) | 2013-12-06 | 2017-09-05 | Lookout, Inc. | Distributed monitoring, evaluation, and response for multiple devices |
US10122747B2 (en) | 2013-12-06 | 2018-11-06 | Lookout, Inc. | Response generation after distributed monitoring and evaluation of multiple devices |
US12261822B2 (en) | 2014-06-22 | 2025-03-25 | Open Text Inc. | Network threat prediction and blocking |
US12120519B2 (en) | 2015-05-01 | 2024-10-15 | Lookout, Inc. | Determining a security state based on communication with an authenticity server |
US11259183B2 (en) | 2015-05-01 | 2022-02-22 | Lookout, Inc. | Determining a security state designation for a computing device based on a source of software |
US10540494B2 (en) | 2015-05-01 | 2020-01-21 | Lookout, Inc. | Determining source of side-loaded software using an administrator server |
US12197383B2 (en) | 2015-06-30 | 2025-01-14 | Open Text Corporation | Method and system for using dynamic content types |
US11854011B1 (en) * | 2016-07-11 | 2023-12-26 | United Services Automobile Association (Usaa) | Identity management framework |
US12081540B2 (en) | 2017-06-09 | 2024-09-03 | Lookout, Inc. | Configuring access to a network service based on a security state of a mobile device |
US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US11038876B2 (en) | 2017-06-09 | 2021-06-15 | Lookout, Inc. | Managing access to services based on fingerprint matching |
US12149623B2 (en) | 2018-02-23 | 2024-11-19 | Open Text Inc. | Security privilege escalation exploit detection and mitigation |
US12235960B2 (en) | 2019-03-27 | 2025-02-25 | Open Text Inc. | Behavioral threat detection definition and compilation |
Also Published As
Publication number | Publication date |
---|---|
US20090271428A1 (en) | 2009-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7996512B2 (en) | Digital identity registration | |
US8904040B2 (en) | Digital identity validation | |
US20090248623A1 (en) | Accessing digital identity related reputation data | |
US20070208940A1 (en) | Digital identity related reputation tracking and publishing | |
US9015263B2 (en) | Domain name searching with reputation rating | |
US7970858B2 (en) | Presenting search engine results based on domain name related reputation | |
US8005970B2 (en) | Systems and methods for managing a domain name registrant's social websites | |
US7761565B2 (en) | System for tracking domain name related reputation | |
US7747746B2 (en) | Providing authenticated access to multiple social websites | |
US7698425B2 (en) | Systems for managing a domain name registrant's social websites | |
US20150213131A1 (en) | Domain name searching with reputation rating | |
US7698426B2 (en) | Using social domains to manage a domain name registrant's social websites | |
US20080028443A1 (en) | Domain name related reputation and secure certificates | |
US20060200487A1 (en) | Domain name related reputation and secure certificates | |
US20080028100A1 (en) | Tracking domain name related reputation | |
US20080022013A1 (en) | Publishing domain name related reputation in whois records | |
US20060095459A1 (en) | Publishing domain name related reputation in whois records | |
US20060095404A1 (en) | Presenting search engine results based on domain name related reputation | |
US20110055331A1 (en) | Domain name control based social website account authentication | |
US20190268323A1 (en) | On demand multifactor authentication | |
US8505079B2 (en) | Authentication system and related method | |
US20180189465A1 (en) | Message providing and assessment system | |
US10764283B1 (en) | Monitoring to trigger on demand multifactor authentication | |
US10645067B2 (en) | Search engine for authenticated network resources | |
US20250013770A1 (en) | Computing system supporting reliable access to a website |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: THE GO DADDY GROUP, INC., ARIZONA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ADELMAN, WARREN;CHADWICK, MICHAEL;REEL/FRAME:022809/0327 Effective date: 20070508 |
|
AS | Assignment |
Owner name: GO DADDY OPERATING COMPANY, LLC, ARIZONA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THE GO DADDY GROUP, INC.;REEL/FRAME:027363/0423 Effective date: 20111212 |
|
AS | Assignment |
Owner name: BARCLAYS BANK PLC, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNOR:GO DADDY OPERATING COMPANY, LLC;REEL/FRAME:027416/0080 Effective date: 20111216 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: ROYAL BANK OF CANADA, CANADA Free format text: NOTICE OF SUCCESSION FOR SECURITY AGREEMENT RECORDED AT REEL/FRAME 027416/0080;ASSIGNOR:BARCLAYS BANK PLC;REEL/FRAME:062780/0514 Effective date: 20230215 |