Patent application number | Description | Published |
20100153535 | SYSTEMS AND METHODS FOR MANAGING A DOMAIN NAME REGISTRANT'S SOCIAL WEBSITES - Systems and methods of the present invention allow for managing multiple social websites. An exemplary method may comprise the steps of registering a domain name to a Registrant, generating a Social Domain (that corresponds to a social website) by concatenating at least one subdomain to the Registrant's domain name, mapping the Social Domain to a URL for the Registrant's social website webpage, entering the Social Domain in a browser, and displaying the Registrant's social website webpage. | 06-17-2010 |
20100161971 | AUTOMATED PROCESS FOR A WEB SITE TO RECEIVE A SECURE SOCKET LAYER CERTIFICATE - The present invention provides systems and methods for enabling encrypted communication capabilities for a Subscriber's Web Site, thereby allowing Customers to access the Subscriber's Web Site in a secure manner. A Hosting Provider, that hosts the Subscriber's Web Site, and a Certificate Authority (CA), that verifies the identity of the Subscriber, provide the Subscriber's Web Site with Secure Sockets Layer (SSL) encrypted communications capability. The Hosting Provider and CA communicate directly with each other as needed, typically via the Internet, without using the Subscriber as an intermediary in their communications. | 06-24-2010 |
20100174795 | TRACKING DOMAIN NAME RELATED REPUTATION - Disclosed systems and methods provide for tracking of domain name related reputation by a domain name Registering Entity (e.g. Registry, Registrar, Reseller, etc.). The Registering Entity maintains a database with reputation data that can be accessed by the requesters. A domain name may be registered through the Registering Entity or a third party. The reputation data may be tracked on the domain name itself, URLs, domain name purchaser or registrant, or email addresses associated with the domain name. The reputation data may include various categories, such as email practices, website content, privacy policies and practices, fraudulent activities, domain name related complaints, digital certificates associated with the domain name, overall reputation, etc. The reputation data may be digitally signed for authenticity. The requester may decide whether to allow email messages or to visit URLs based on the domain name related reputation. | 07-08-2010 |
20100293371 | GENERATING PKI EMAIL ACCOUNTS ON A WEB-BASED EMAIL SYSTEM - The present invention provides systems and methods for allowing an Email User to create a Public Key Infrastructure (PKI) Email Account and thereafter to digitally sign, send, verify and receive PKI encrypted emails over a computer network, such as the Internet. The systems and methods preferably include a Web-based Email System and a Certificate Authority that coordinate their actions to make the process of creating, maintaining and using the PKI Account as easy as possible for the Email User. In a preferred embodiment, a Keystore System may also be used to enhance the management and use of digital keypairs. | 11-18-2010 |
20110055248 | SEARCH ENGINE BASED DOMAIN NAME CONTROL VALIDATION - Methods of the present inventions allow for validating domain name control. An example embodiment of a search engine based domain name control validation method may comprise the steps of submitting a business name to a search engine, receiving a search result webpage having a plurality of links (that each include a domain name), selecting the most relevant link, extracting the domain name from the most relevant link, and generating a record indicating that the extracted domain name is related to and/or controlled by the business. | 03-03-2011 |
20110055249 | SOCIAL WEBSITE ACCOUNT AUTHENTICATION VIA SEARCH ENGINE BASED DOMAIN NAME CONTROL VALIDATION - Methods of the present inventions allow for social website account authentication. An example embodiment of a domain name control based social website account authentication method may comprise the steps of receiving a request to verify the authenticity a social website account (the request may comprise a business name and a business email address comprising a first domain name), submitting the business name to a search engine, receiving a search result webpage having a plurality of links (that each include a domain name), selecting the most relevant link, extracting a second domain name from the most relevant link, determining whether the first domain name matches the second domain name, and—if so—certifying the authenticity of the social website account. | 03-03-2011 |
20110179275 | TOOLS FOR GENERATING PKI EMAIL ACCOUNTS - The present invention provides systems and methods for allowing an Email User to create a Public Key Infrastructure (PKI) Email Account and thereafter to digitally sign, send, verify and receive PKI encrypted emails over a computer network, such as the Internet. The systems and methods preferably include a Web-based Email System and a Certificate Authority that coordinate their actions to make the process of creating, maintaining and using the PKI Account as easy as possible for the Email User. In a preferred embodiment, a Keystore System may also be used to enhance the management and use of digital keypairs. | 07-21-2011 |
20110185172 | GENERATING PKI EMAIL ACCOUNTS ON A WEB-BASED EMAIL SYSTEM - The present invention provides systems and methods for allowing an Email User to create a Public Key Infrastructure (PKI) Email Account and thereafter to digitally sign, send, verify and receive PKI encrypted emails over a computer network, such as the Internet. The systems and methods preferably include a Web-based Email System and a Certificate Authority that coordinate their actions to make the process of creating, maintaining and using the PKI Account as easy as possible for the Email User. In a preferred embodiment, a Keystore System may also be used to enhance the management and use of digital keypairs. | 07-28-2011 |
20120089832 | METHODS OF ISSUING A CREDIT FOR A CERTIFICATE FOR A DOMAIN NAME - The invention provides methods for efficiently registering a domain name and issuing a certificate without a Subscriber submitting a separate request for the certificate. A notice may be provided to the Subscriber after requesting to register the domain name that a credit for a certificate may be issued for the domain name. In other embodiments a credit may be given to the Subscriber for the certificate without receiving a separate request for the credit or certificate. The credit may be saved in a Subscriber's account to enable the Subscriber to use a certificate at a later time. In yet other embodiments, a single vetting process may be used to facilitate one or more of: creating a Subscriber's account; registering a domain name; and issuing a certificate. | 04-12-2012 |
20120113275 | Systems and Methods for Person's Verification Using Portrait Photographs Taken by a Verifier-Controlled Digital Camera - One embodiment of the present invention envisions providing requester with a computer program for a remote computer equipped with a digital photo camera. The computer program controls the camera and prevents alterations to an image taken with the camera. The unaltered image of a portrait photograph of the requester is transmitted from the remote computer to the verifier's server computer. The image of the portrait photograph of the requester may further be used to verify the requester by comparing the image to the photographs from other sources. | 05-10-2012 |
20120114190 | Systems and Methods for Person's Verification Using Photographs on Identification Documents Taken by a Verifier-Controlled Mobile Device - One embodiment of the present invention envisions providing requester with an application for a mobile device equipped with a built-in digital photo camera. The application controls the camera and prevents alterations to an image taken with the camera. The unaltered image of a photo ID is transmitted from the mobile device to the verifier's server computer. The image of the photo ID may further be used to verify the requester by comparing the image to the photographs from other sources. | 05-10-2012 |
20120114191 | Systems and Methods for Person's Verification Using Photographs on Identification Documents Taken by a Verifier-Controlled Digital Camera - One embodiment of the present invention envisions providing requester with a computer program for a remote computer equipped with a digital photo camera. The computer program controls the camera and prevents alterations to an image taken with the camera. The unaltered image of a photo ID is transmitted from the remote computer to the verifier's server computer. The image of the photo ID may further be used to verify the requester by comparing the image to photographs from other sources. | 05-10-2012 |
20120114192 | Systems and Methods for Person's Verification Using Scans of Identification Documents Produced by a Verifier-Controlled Scanning Device - One embodiment of the present invention envisions providing requester with a computer program for a remote computer equipped with a scanning device. The computer program controls the scanning device and prevents alterations to an image produced by the scanning device. The unaltered image of a photo ID is transmitted from the remote computer to the verifier's server computer. The image of the photo ID may further be used to verify the requester by comparing the image to photographs from other sources. | 05-10-2012 |
20120114193 | Systems and Methods for Person's Verification Using Portrait Photographs Taken by a Verifier-Controlled Mobile Device - One embodiment of the present invention envisions providing requester with an application for a mobile device equipped with a built-in digital photo camera. The application controls the camera and prevents alterations to an image taken with the camera. The unaltered image of a portrait photograph of the requester is transmitted from the mobile device to the verifier's server computer. The image of the portrait photograph of the requester may further be used to verify the requester by comparing the image to the photographs from other sources. | 05-10-2012 |
20130073974 | Methods for Verifying Person's Identity through Person's Social Circle Using Person's Photograph - One embodiment of a method of the present invention provides for obtaining an image from a requester, obtaining contact information for vouching people, whom requester identifies as having personal knowledge of the requester, and sending an electronic message to the vouching people, with a link to an image lineup. The image lineup contains the image obtained from the requester and other images. Then receiving a selection choice from the vouching people, identifying whether the image in the image lineup depicts the requester, and calculating a statistical rating of a likelihood that the image obtained from the requester depicts him/her. | 03-21-2013 |
20130073975 | Systems for Verifying Person's Identity through Person's Social Circle Using Person's Photograph - One embodiment of a system of present invention includes means for obtaining an image from a requester, means for obtaining contact information for vouching people, whom requester identifies as having personal knowledge of the requester, and means for sending an electronic message to the vouching people, with a link to an image lineup. The image lineup contains the image obtained from the requester and other images. The system further includes means for receiving a selection choice from the vouching people, identifying whether the image in the image lineup depicts the requester, and means for calculating a statistical rating of a likelihood that the image obtained from the requester depicts him/her. | 03-21-2013 |
20140032589 | DOMAIN NAME SEARCHING WITH REPUTATION RATING - A method includes calculating, by at least one server communicatively coupled to a network, a rating for a domain name. The rating is based in part on reputation data for the domain name. The method includes receiving, by the at least one server, a domain name query from a requester, and forming, by the at least one server, a listing of candidate domain names using the domain name query. An inclusion of the domain name into the listing of candidate domain names or an order placement of the domain name within the listing of candidate domain names is a function of the rating for the domain name. The method includes returning, by the at least one server, the listing of candidate domain names to the requester. | 01-30-2014 |
20140136839 | METHODS AND SYSTEMS FOR DYNAMIC UPDATES OF DIGITAL CERTIFICATES - Methods and systems of the present invention allow for dynamic updates of digital certificates. In one system, a server computer is configured to communicate with a certificate authority via a communications network. The server computer is configured to receive a first security certificate from the certificate authority. The first security certificate has a term. The first security certificate is installed onto the server computer, and at least one of a current time and the term of the first security certificate are analyzed to determine whether the first security certificate is to be updated. When the first security certificate is to be updated, a request for update is transmitted to the certificate authority, a second security certificate is received from the certificate authority, and the first security certificate is replaced with the second security certificate on the server computer. | 05-15-2014 |
20140259131 | METHOD FOR CREATING A SECURITY CERTIFICATE - A system and method for creating a security certificate is presented. A request for a security certificate is received from a requester. The request includes an identification of a web site or an entity associated with the web site. An applicant for the security certificate is identified using the request, and information about the applicant for the security certificate is retrieved. The information about the applicant includes a name of the applicant. The information about the applicant is analyzed to determine whether the information about the applicant includes personal information of an individual. When the information about the applicant includes personal information of an individual, the security certificate is generated, wherein the security certificate does not include the personal information of an individual. | 09-11-2014 |
20140259132 | SYSTEM FOR CREATING A SECURITY CERTIFICATE - A system and method for creating a security certificate is presented. A request for a security certificate is received from a requester. The request includes an identification of a web site or an entity associated with the web site. An applicant for the security certificate is identified using the request, and information about the applicant for the security certificate is retrieved. The information about the applicant includes a name of the applicant. The information about the applicant is analyzed to determine whether the information about the applicant includes personal information of an individual. When the information about the applicant includes personal information of an individual, the security certificate is generated, wherein the security certificate does not include the personal information of an individual. | 09-11-2014 |
20140373097 | SYSTEM FOR DOMAIN CONTROL VALIDATION - A system and method for domain control validation is presented. At a certificate authority a request is received. The request includes a certificate signing request and a first Internet protocol address. The certificate signing request identifies a domain and a certificate. A second Internet protocol address for the domain is retrieved from a domain name system. When the first Internet protocol address is the same as the second Internet protocol address, the certificate is signed, and the signed certificate is transmitted to a requester of the request. When the first Internet protocol address is not the same as the second Internet protocol address, the certificate signing request is rejected. | 12-18-2014 |
20140373127 | METHOD FOR DOMAIN CONTROL VALIDATION - A system and method for domain control validation is presented. At a certificate authority a request is received. The request includes a certificate signing request and a first Internet protocol address. The certificate signing request identifies a domain and a certificate. A second Internet protocol address for the domain is retrieved from a domain name system. When the first Internet protocol address is the same as the second Internet protocol address, the certificate is signed, and the signed certificate is transmitted to a requester of the request. When the first Internet protocol address is not the same as the second Internet protocol address, the certificate signing request is rejected. | 12-18-2014 |