Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Verisign Inc patents


Recent patent applications related to Verisign Inc. Verisign Inc is listed as an Agent/Assignee. Note: Verisign Inc may have other listings under different names/spellings. We're not affiliated with Verisign Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "V" | Verisign Inc-related inventors


 new patent  Techniques for automatically mitigating denial of service attacks via attack pattern matching

A method for mitigating a denial of service attack includes determining, for a client, a number of requests being transmitted to a server and determining, for the client, that the number of requests for a time period is greater than a top talker threshold. The method includes classifying the client as a top talker based on the number of requests being greater than the top talker threshold and identifying, for the client, additional requests being transmitted to the server. ... Verisign Inc

Method and system for detecting and mitigating denial-of-service attacks

A method of detecting a ddos attack is disclosed. The method includes obtaining, at an authoritative dns server, a plurality of dns query packets from a plurality of dns requestors over a communications network; analyzing, by an electronic processor, a set of the plurality of dns query packets; determining, by an electronic processor, that a subset of the plurality of dns query packets of the set meets a predetermined threshold for a rate of dns queries; filtering the plurality of dns query packets based on the determining to produce a filtered number of dns query packets; and providing, by the authoritative dns server, a dns response for the plurality of dns query packets that were filtered.. ... Verisign Inc

Systems, devices, and methods for improved rdap traffic analysis and mitigation

Improved rdap systems, rdap services, and rdap methods identify users and clients and keep track of their rdap activities. The rdap systems, services, and methods analyze the activities of a user (or a client) and detect or determine whether or not the user is engaging in undesirable, malicious, or otherwise abnormal activities. ... Verisign Inc

Method and system for parallel validation of domain name system security extension records

A parallelized method for authenticating and/or signing a dns query using dnssec is disclosed. The method comprises obtaining, at a validating dnssec-aware dns client, a dns query for a resource record for a fully qualified domain name (fqdn); segmenting the fqdn into more than one specific sub-fqdn; providing, in parallel, a dns query for a dnssec-related resource record for each of the more than one specific sub-fqdn to a respective authoritative name server or recursive resolver; obtaining, in parallel, the dnssec-related resource record for each of the more than one specific sub-fqdn; validating, in parallel, the dnssec-related resource record for each of the more than one specific sub-fqdn; combining each of the dnssec-related resource record for each of the more than one specific sub-fqdn; and verifying a chain-of-trust of the dnssec-related resource records.. ... Verisign Inc

Dns package in a partitioned network

A domain name system (“dns”) package and a method for providing domain name resolution services in a partitioned network are disclosed. The system may include one or more built-in root name servers; one or more built-in top level domain (“tld”) name servers; and a recursive name server. ... Verisign Inc

Anycast-based spoofed traffic detection and mitigation

Systems and methods for detecting spoofed traffic include determining a first hop count of a first data query from a first transmitting device to a first server, determining a second hop count of a second data query from the first transmitting device to a second server, determining a third hop count of a third data query appearing to be from the first transmitting device to the first server, and determining a fourth hop count of a fourth data query appearing to be from the first transmitting device to the second server. The third and fourth hop counts are compared to the first and second hop counts, respectively. ... Verisign Inc

Dynamic allocation of a signal receiver for dissemination of threat information

Various embodiments of the invention disclosed herein provide techniques for dynamically assigning a signaling server for threat mitigation. A ddos detection server transmits a first message to a first signaling server requesting first configuration data. ... Verisign Inc

Determining a top level domain from a domain name

A system includes a processing system of a device including one or more processors. The system also includes a memory system including one or more computer-readable media. ... Verisign Inc

Real-time association of a policy-based firewall with a dynamic dns hostname

Various embodiments of the invention disclosed herein provide techniques for associating a firewall policy with a dynamic domain name system (dns) hostname. A policy configuration portal associates a first hostname with a first network address. ... Verisign Inc

Computer-implemented method, apparatus, and computer-readable medium for processing named entity queries using a cached functionality in a domain name system

The present disclosure relates to a computer-implemented method for responding to a query request from a requester using information supplied by an authoritative name server. The computer-implemented method can include obtaining, by a dns resolution server, a query for a named resource from a requester, wherein the query comprises information comprising contextual information related to the requester. ... Verisign Inc

Profiling domain name system (dns) traffic

In one embodiment, a profiling engine analyzes dns transaction data that is logged by a recursive resolver to generate profiling results that are used to manage network activity. In operation, the profiling engine computes scores based on the dns transaction data and scoring criteria. ... Verisign Inc

Regular expression searching

Methods, systems, and computer program products are provided for optimizing searches of records including text elements. The methods, systems, and computer program perform operations including receiving a regular expression search query from a client. ... Verisign Inc

Automated ddos attack mitigation via bgp messaging

Various embodiments of the invention disclosed herein provide techniques for mitigating a distributed denial of service (ddos) attack on a targeted computer system. A border gateway protocol (bgp) controller receives, via a first router, a bgp message that includes an indicator indicating that a computer system associated with the first router is under a ddos attack. ... Verisign Inc

Gtld domain name registries rdap architecture

Provided is a method for providing registration data access protocol (“rdap”) responses. The method includes obtaining, at a rdap client over a network, a rdap query for rdap data from a user; providing, by the rdap client, the rdap query to one or more thick rdap services; obtaining an answer to the rdap query from the one or more thick rdap services; and providing the answer to the user.. ... Verisign Inc

03/22/18 / #20180083781

Gtld domain name registries rdap architecture

Provided is a method for providing registration data access protocol (“rdap”) responses. The method includes obtaining, at a rdap client over a network, a rdap query for rdap data from a user; providing, by the rdap client, the rdap query and a cryptographic credential to a rdap server, wherein the rdap server communicates with one or more thick rdap servers to provide respective thick rdap answers to the rdap query, wherein at least one the respective thick rdap answers are encrypted using a symmetric or asymmetric cryptographic key associated with the cryptographic credential of the rdap client; obtaining a consolidated thick rdap answer to the rdap query from the rdap server; decrypting the consolidated thick rdap answer using a symmetric or asymmetric cryptographic key associated with the cryptographic credential; and providing the thick rdap answer that is decrypted to the user.. ... Verisign Inc

03/01/18 / #20180063141

Integrated dns service provider services using token-based authentication

Techniques for allowing third-party dns service providers to programmatically initiate changes to dns resource records using an interface provided by a registrar or registry are disclosed. Further, techniques for validating change requests received at such an interface are disclosed. ... Verisign Inc

03/01/18 / #20180063078

Systems, devices, and methods for locality-based domain name registry operation verification

Embodiments relate to systems, devices, and computing-implemented methods for performing and requesting registry operations using reseller profiles. A domain name registry can store or access associations between domain name reseller identifiers and domain name reseller profiles, and, based on receiving a domain name registry operation request from a domain name registrar that includes a domain name reseller identifier, applying domain name registry operation policies associated with the domain name reseller profile when performing registry operations.. ... Verisign Inc

03/01/18 / #20180062856

Integrated dns service provider services using certificate-based authentication

Techniques for allowing third-party dns service providers to programmatically initiate changes to dns resource records using an interface provided by a registrar or registry are disclosed. Further, techniques for validating change requests received at such an interface are disclosed. ... Verisign Inc

02/01/18 / #20180034827

Strengthening integrity assurances for dns data

One or more dns services are provided that are configured to not only tolerate some commonly observed dnssec misconfigurations (while still providing dnssec's security guarantees), but also provide a more intelligent dns resolution process informed by dnssec.. . ... Verisign Inc

01/11/18 / #20180013792

Associating a policy-based firewall with a dynamic dns hostname

Various embodiments of the invention disclosed herein provide techniques for associating a firewall policy with a dynamic domain name system (dns) hostname. A policy configuration portal transmits a first request to a names server to translate a first hostname into a corresponding network address. ... Verisign Inc

01/11/18 / #20180013743

Provisioning for smart navigation services

Techniques for provisioning a smart navigation service are presented. The provisioning can be performed by a name owner, by the smart navigation service itself, or by a third-party keyword service. ... Verisign Inc

01/04/18 / #20180007159

Systems, devices, and methods for protecting access privacy of cached content

Embodiments relate to systems, devices, and computer-implemented methods for preventing determination of previous access of sensitive content by receiving, from a user, a request for content at a device in an information centric network, where a cached version of the content is locally stored at the device; initiating a time delay based on a determination that the user has not previously requested the content; and transmitting the cached version of the content to the user after the time delay.. . ... Verisign Inc

12/28/17 / #20170374042

Registering, managing, and communicating with iot devices using domain name system processes

Provided herein is a method for registering an iot device with a dns registry. The method can include obtaining, at a dns server, an identifier, ip address, and a public key of an asymmetric key pair associated with the iot device from a network gateway device that is in communication with the iot device, wherein the asymmetric key pair is provisioned onto the iot device and an associated private key stored within a memory of the iot device at a time that iot device is manufactured or during a predetermined time window after manufacturing; creating at least one dns record for the iot device; assigning a domain name associated with the internet protocol (“ip”) address to the iot device; storing the identifier, ip address, the domain name, and the public key in the at least one dns record; and providing confirmation of the registration to the iot device.. ... Verisign Inc

12/07/17 / #20170351953

Systems, devices, and methods for improved affix-based domain name suggestion

Embodiments relate to systems, devices, and computing-implemented methods for generating domain name suggestions by obtaining a domain name suggestion input that includes textual data, segmenting the textual data into tokens, obtaining a list of possible affixes to the textual data, determining conditional probabilities for the possible affixes using a language model, ranking the list of possible affixes based on the conditional probabilities to generate a ranked list of affixes, and generating domain name suggestions based on the ranked list of affixes.. . ... Verisign Inc

11/23/17 / #20170337289

Multi-mode barcode resolution system

Methods and systems for generating and resolving multi-mode barcodes include a device scanning and translating graphical data representing a barcode pattern into barcode information. The device detects distinct data items in the barcode information that each specifies an action to be taken by the device, and then transmits a request for a preference order to a remote server. ... Verisign Inc

11/09/17 / #20170324724

Dnssec signing server

Systems and methods for performing dnssec signing are described in which digital signature operations may be performed by a network accessible signing server that is configured to interact with a separate client application. Exemplary methods may include receiving a signing request at the signing server from the client application to sign first data. ... Verisign Inc

11/09/17 / #20170322953

Bulk management of registry objects

A system and method for modifying a bulk set of domain names through bulk operations. A request to modify a bulk set of data associated with domain names is received by a registry. ... Verisign Inc

10/26/17 / #20170310484

Extending dnssec trust chains to objects outside the dns

The present invention generally relates to systems and methods for extending a chain of trust beyond the dns. Some embodiments provide a verifier with the ability to validate a chain of trust starting with the trust anchor at the dns root all the way to a service or object of interest outside the dns.. ... Verisign Inc

09/28/17 / #20170279846

Detecting and remediating highly vulnerable domain names using passive dns measurements

Some embodiments provide a technique for detecting highly-vulnerable domain names and remediating associated problems. The technique can include collecting dns data representing a requests to the dns over a period of time and determining a subset of the dns data representing dns-based service discovery requests to unregistered domains over the period of time. ... Verisign Inc

09/28/17 / #20170279762

Systems and methods for preserving privacy of a registrant in a domain name system ("dns")

Provided is a method of provisioning a named resource in a domain name system (“dns”) with a registrar while preserving privacy of a registrant. The method includes obtaining, by a server of the registrar over a network, a request, from the registrant, to provision the named resource; determining, by at least one hardware processor of the server of the registrar, that the request requires additional handling by a privacy provider based on information in the request or information from the registrar; determining, by at least one hardware processor of the server of the registrar, a privacy provider from one or more privacy providers located in different geographic locations to service the request based on a location of the registrant; forwarding the request to the privacy provider; obtaining a cloaked identifier from the privacy provider; and provisioning the named resource in a database of a dns registry using the cloaked identifier.. ... Verisign Inc

09/21/17 / #20170272467

Systems and methods for automating client-side discovery of public keys of external contacts that are secured by dane using dnssec

Provided is a method of digitally securing a digital object from a first user in a first domain to a second user in a second domain using a dns provider. The method includes accessing, at a client device of the first user, a client-side local policy, wherein the local policy comprises one or more zones managed by one or more dns providers and secured by dane using dnssec; constructing a dns query for a cryptographic credential for the second user based, at least in part, on a zone of the one or more zones in the local policy; providing a request for the cryptographic credential for the second user; obtaining the cryptographic credential for the second user from a dns provider of the one or more dns providers; digitally securing the digital object using the cryptographic credential; and providing the digital object to the second user.. ... Verisign Inc

09/21/17 / #20170272250

Hash-based digital signatures for hierarchical internet public key infrastructure

Techniques for signing internet data are disclosed. The techniques include accessing a plurality of internet data records. ... Verisign Inc

09/14/17 / #20170262651

Privacy - preserving data querying with authenticated denial of existence

In one embodiment, a tokenized list holder enables privacy-preserving querying with denial of existence functionality. Both an information requester and the tokenized list holder access related (or identical) tokenizing algorithms to generate tokenized terms based on original terms. ... Verisign Inc

08/24/17 / #20170244799

Feeding networks of message brokers with compound data elaborated by dynamic sources

Various embodiments of the invention disclosed herein provide techniques for transforming and distributing data in a distributed computing system. New data types are created on-demand by deriving, transforming, and aggregating data from already existing data sources. ... Verisign Inc

08/24/17 / #20170244783

Federating geographically distributed networks of message brokers into a scalable content delivery network

One embodiment of the invention disclosed herein provides techniques for managing data access in a distributed computing system. A site engine detects a first subscription request from a first subscriber for a first data object included in a plurality of data objects. ... Verisign Inc

08/24/17 / #20170244668

Systems, devices, and methods for dynamic allocation of domain name acquisition resources

Embodiments relate to systems, devices, and computing-implemented methods for dynamically allocating domain name acquisition resources by receiving indications of available domain name acquisition resources and available time windows from registrars, receiving, from devices, requests for available domain name acquisition resources during requested time windows, determining lists of domain name acquisition resources available during the requested time window, transmitting, to the devices, the lists of available domain name acquisition resources, receiving, from the devices, selections of the available domain name acquisition resources, specified time windows, and indications of domain names to request during the specified time windows, generating and transmitting communications to the registrars, where the communications result in the registrars sending a plurality of requests for the domain names to a domain name registry during the specified time windows.. . ... Verisign Inc

08/24/17 / #20170244664

Systems and methods for determining character entry dynamics for text segmentation

A method can include receiving a string of characters. The method can include determining one or more possible word boundaries for words in the string of characters based at least partially on a segmentation process. ... Verisign Inc

08/10/17 / #20170230413

Techniques for detecting attacks in a publish-subscribe network

A publish-subscribe network includes a network infrastructure configured to support the exchange of data. An intrusion detection system is coupled to the network infrastructure and configured to process signals received from that infrastructure in order to detect malicious attacks on the network infrastructure. ... Verisign Inc

08/10/17 / #20170230254

Systems and methods for configuring a probe server network using a reliability model

Implementations relate to systems and methods for configuring a probe server network using a reliability model. A company, customer, or organization may wish to outsource the management of a set of name servers used to operate a domain name, such as a domain name associated with a web site. ... Verisign Inc

08/03/17 / #20170222978

Systems, devices, and methods for improved domain name system firewall protection

Embodiments relate to systems, devices, and computing-implemented methods for resolving dns requests by sending, from a device, a first dns request for a domain name associated with a local service device to a dns firewall server. The dns firewall server can send a response that includes a status indicating a server failure in response to determining that the first dns request is associated with a customer of a dns firewall service and determining that a record associated with the domain name cannot be found. ... Verisign Inc

08/03/17 / #20170222974

Domain name resolution

A method, system, apparatus, and computer-readable memory containing instructions include receiving, at an agent operating on a client device, a (domain name system) dns resolution request for a domain name. The dns resolution request is transmitted to a first dns server including a firewall service and a second dns server within a local network to the client device. ... Verisign Inc

07/20/17 / #20170206252

Nxd query monitor

Non-existent domain (nxd) queries may be monitored to determine if a keyword is included in nxd queries for a brand top level domain (tld). When a predetermined number of nxd queries have been received for a brand domain that include the keyword, an action may be initiated. ... Verisign Inc

07/06/17 / #20170195345

Detection, prevention, and/or mitigation of dos attacks in publish/subscribe infrastructure

Methods, apparatus, systems, and computer-readable media for detecting denial-of-service (“dos”) attacks include analyzing signals between a publisher and a plurality of subscribers; determining a probability that the signals are a dos attack based on sampled variables; driving, via the processor, a probabilistic finite state machine having a plurality of states in which state transitions are based on computed probability; performing preventative processing based on state transitions determined by the probability exceeding at least a first threshold in the probabilistic finite state machine; and performing mitigating processing based on state transitions determined by the probability exceeding an alert threshold in the probabilistic finite state machine.. . ... Verisign Inc

07/06/17 / #20170195299

Systems and methods for automating client-side synchronization of public keys of external contacts

Systems and methods for automating client-side synchronization and discovery of public keys and certificates of external contacts include a key synchronizer at a client device. The key synchronizer obtains, from the client device, an external contact associated with an external domain outside of a local domain of the client device and then identifies, based on the external domain, a public key registry outside of the local domain. ... Verisign Inc

07/06/17 / #20170195285

Detecting and mitigating registrar collusion in drop-add acquisitions of domain names

Systems and method for detecting domain name system (dns) registrar collusion include a collusion detector at a registry. The collusion detector obtains information related to name acquisition requests submitted by dns registrars attempting to acquire domain names in a drop pool of expired domain names and provides attempt sets containing the domain names targeted by the dns registrars for acquisition. ... Verisign Inc

06/29/17 / #20170187673

Shared registration system

Systems and methods for updating a domain name system (dns) registry are disclosed. Embodiments perform operations including maintaining a domain name record of a dns registrant recorded in a database of the dns registry by a primary dns interface. ... Verisign Inc

06/22/17 / #20170178621

Systems and methods for automatic phonetization of domain names

A method can include receiving, from a user, a string of characters. The method can also include determining components of the string of characters. ... Verisign Inc

06/22/17 / #20170177569

Method for writing a foreign language in a pseudo language phonetically resembling native language of the speaker

Provided is a method, device, and computer-readable medium for converting a string of characters in a first language into a phonetic representation of a second language using a first data structure that maps graphemes in the first language to one or more universal phonetic representations based on an international phonetic alphabet, wherein the first data structure comprises a plurality of first nodes with each first node of the plurality of first nodes having a respective weight assigned that corresponds to a likely pronunciation of a grapheme, and a second data structure that maps the one or more universal phonetic representations to one or more graphemes in the second language, wherein the second data structure comprises a plurality of second nodes with each second node of the plurality of second nodes having a respective weight assigned that corresponds to a likely representation of a grapheme in the second language.. . ... Verisign Inc

06/22/17 / #20170177551

Construction of a phonetic representation of a generated string of characters

Provided are methods, devices, and computer-readable media for generating a string of characters based on a set of rules; parsing the string of characters into string of graphemes; determining one or more phonetic representations for one or more graphemes in the string of graphemes based on a first data structure; determining at least one grapheme representation for one or more of the one or more phonetic representations based on a second data structure; and constructing the phonetic representation of the string of characters based on the grapheme representation that was determined.. . ... Verisign Inc

06/22/17 / #20170177550

Construction of phonetic representation of a string of characters

Provided are methods, devices, and computer-readable media for accessing a string of characters; parsing the string of characters into string of graphemes; determining one or more phonetic representations for one or more graphemes in the string of graphemes based on a first data structure; determining at least one grapheme representation for one or more of the one or more phonetic representations based on a second data structure; and constructing the phonetic representation of the string of characters based on the grapheme representation that was determined.. . ... Verisign Inc

06/15/17 / #20170171151

Syntactically and/or semantically relevant alternative domain name generation

Provided are methods, devices, and computer-readable media for accessing a domain name; determining, via the processor, at least two words in the domain name; determining at least one alternative word for at least one word in the domain name; determining whether the at least one alternative word is contextually relevant; and generating at least one alternative domain name based on a determination that the at least one alternative word is contextually relevant.. . ... Verisign Inc

06/08/17 / #20170163425

Hash-based electronic signatures for data sets such as dnssec

Techniques for electronically signing dns records stored in a zone file for an internet dns zone are presented. The techniques include electronically accessing a plurality of dns resource records of a dns zone stored on one or more dns servers of a distributed dns database; generating a plurality of leaf nodes from the plurality of dns resource records; constructing a recursive hash tree from the plurality of leaf nodes, where the recursive hash tree includes a plurality of nodes including a root node and the plurality of leaf nodes, where each node of the plurality of nodes includes either a leaf node or a hash of data including child nodes; storing the root node in a dns key resource record for a zone signing key for the zone; and publishing, in a dns resource record signature resource record, validation data including path data from the recursive hash tree.. ... Verisign Inc

05/18/17 / #20170142060

Techniques for directing a domain name service (dns) resolution process

In one embodiment, a privacy and security engine enables a user to specify a recursive resolver for a domain name service (dns) resolution process. The privacy and security engine receives default dns settings that specify a default recursive resolver to be implemented as a recursive resolver for the dns resolution process. ... Verisign Inc

04/27/17 / #20170118250

Method for minimizing the risk and exposure duration of improper or hijacked dns records

Provided is a method for assigning a time-to-live (“ttl”) value for a domain name system (“dns”) record at a recursive dns server. The method comprises obtaining, from a client, the ttl value for the dns record; and storing, in a memory of the recursive dns server, the tll value, an identifier of the client, and the dns record.. ... Verisign Inc

04/13/17 / #20170104715

Reconciling internet dns zone file changes with origin change requests

Techniques for monitoring zone file changes are presented. The techniques may include obtaining at least one zone change request and parsing the at least one zone change request to obtain at least one change request unit. ... Verisign Inc

03/30/17 / #20170093793

Domain name operation verification code generation and/or verification

System, apparatus, methods, and computer-readable medium for generating a verification code related to a registry operation request are provided. A verification process may be performed to determine if a verification request related to a registry operation is to be approved. ... Verisign Inc

03/30/17 / #20170093752

Access control for named domain networking

The disclosure is directed to providing content access control in information centric networking (icn) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an icn network an access request for content in response to receiving a first content request from a client. ... Verisign Inc

03/23/17 / #20170085380

Methods and systems for bootstrapping

The disclosure is directed to securely bootstrapping devices in a network environment. Methods and systems include hardware and/or operations for receiving, based on an identifier provisioned at a relying entity, instances of a security credential of an information system, wherein the instances are associated with respective certifying entities. ... Verisign Inc

03/09/17 / #20170070595

Systems and methods for providing secure access to shared registration systems

Embodiments relate to systems, devices, and computer-implemented methods for providing secure access to a shared registration system of a domain name registry by generating authorization information associated with a domain name, storing the authorization information in an archive, receiving, from a non-registrar service provider, a request for access to functionality of a shared registration system of the domain name registry, where the request is associated with the domain name and includes authorization information, determining whether the received authorization information is valid using the archived authorization information, and allowing the non-registrar service provider access to the functionality of the srs based on a determination that the second authorization information is valid.. . ... Verisign Inc

02/23/17 / #20170053119

Classifying malware by order of network behavior artifacts

The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize temporally-ordered network behavioral artifacts together with machine learning techniques to perform the classification. ... Verisign Inc

02/02/17 / #20170034212

Systems and methods for incubating malware in a virtual organization

Systems and methods for tracking malware operator behavior patterns in a network environment simulated for an extended period of time include a processor that causes the system to receive organizational data that describes a virtual organization, obtain additional data related to the organizational data, and provide a simulated computer network of the virtual organization based on the organizational data. The process can further cause the system to install at least one malware on the simulated computer network, monitor one or more interactions between the simulated computer network and an operator of the malware, and build a malware operator profile that characterizes the operator of the malware based on the one or more interactions, with which the operator of the malware can be identified in subsequent interactions.. ... Verisign Inc

02/02/17 / #20170034209

Client-side active validation for mitigating ddos attacks

Methods and systems for mitigating denial-of-service attacks include a proxy server that monitors a set of application servers configured to receive and service requests from clients. The proxy server intercepts the requests, and in response, provides the clients with customized client-side scripts embedded in markup language. ... Verisign Inc

02/02/17 / #20170034126

Data plane packet processing tool chain

This present disclosure relates to systems and methods for providing a data plane processing tool chain for processing packets that can use osi layers 4 and above in the data plane without using a hypervisor. The disclosure has multiple processing capabilities, including: packet filtering, resolving dns packets, generating packets, packet forwarding, performing dns look up, time-stamping dns packets, writing packets to disk, load-balancing, and protecting against ddos attacks.. ... Verisign Inc

01/19/17 / #20170019371

Methods and systems for domain name data networking

Systems, devices and methods for a domain name data networking (dndn) content delivery system are disclosed. Embodiments perform operations including obtaining a content object having a unique identifier. ... Verisign Inc

01/12/17 / #20170012943

Extending dnssec trust chains to objects outside the dns

The present invention generally relates to systems and methods for extending a chain of trust beyond the dns. Some embodiments provide a verifier with the ability to validate a chain of trust starting with the trust anchor at the dns root all the way to a service or object of interest outside the dns.. ... Verisign Inc

01/12/17 / #20170012780

Extending dnssec trust chains to objects outside the dns

The present invention generally relates to systems and methods for extending a chain of trust beyond the dns. Some embodiments provide a verifier with the ability to validate a chain of trust starting with the trust anchor at the dns root all the way to a service or object of interest outside the dns.. ... Verisign Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Verisign Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Verisign Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###