Bluemont, VA, United States
Bluemont, VA, United States

Verisign, Inc. is an American company based in Reston, Virginia, United States that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the .com, .net, and .name generic top-level domains and the .cc and .tv country-code top-level domains, and the back-end systems for the .jobs, .gov, and .edu top-level domains. Verisign also offers a range of security services, including managed DNS, Distributed Denial of Service mitigation and cyber-threat reporting.In 2010, Verisign sold its authentication business unit – which included SSL certificate, PKI, Verisign Trust Seal, and Verisign Identity Protection services – to Symantec for $1.28 billion. The deal capped a multi-year effort by Verisign to narrow its focus to its core infrastructure and security business units.Verisign's former CFO Brian Robins announced in August 2010 that the company would move from its original location of Mountain View, California, to Dulles in Northern Virginia by 2011 due to 95% of the company's business being on the East Coast. Wikipedia.

SEARCH FILTERS
Time filter
Source Type

In one embodiment, a privacy and security engine enables a user to specify a recursive resolver for a domain name service (DNS) resolution process. The privacy and security engine receives default DNS settings that specify a default recursive resolver to be implemented as a recursive resolver for the DNS resolution process. The default DNS settings are provided by an underlying mobile operator network to which the user device is connected. The privacy and security engine causes the user device to disregard the default DNS settings and implement customized DNS settings that specify a preferred recursive resolver to be implemented as the recursive resolver for the DNS resolution process. The customized DNS settings are associated with an activated privacy and security mode. Unlike conventional approaches to overriding DNS settings, the user is able to specify the recursive resolver that implements the DNS resolution process irrespective of the underlying network.


Systems and method for detecting domain name system (DNS) registrar collusion include a collusion detector at a registry. The collusion detector obtains (310) information related to name acquisition requests submitted by DNS registrars attempting to acquire domain names in a drop pool of expired domain names and provides (320) attempt sets containing the domain names targeted by the DNS registrars for acquisition. Each attempt set contains at least one targeted domain name that a respective DNS registrar attempted to acquire via at least one name acquisition request. The collusion detector determines (330) a degree of similarity between two or more attempt sets corresponding to a pair of the DNS registrars, estimates (340) a likelihood of collusion between the pair of DNS registrars based on the degree of similarity, and performs (350) any mitigation action warranted by the likelihood of collusion.


Embodiments relate to systems, devices, and computer-implemented methods for providing secure access to a shared registration system of a domain name registry by generating authorization information associated with a domain name, storing (200) the authorization information in an archive, receiving (210), from a non-registrar service provider, a request for access to functionality of a shared registration system of the domain name registry, where the request is associated with the domain name and includes authorization information, determining (220) whether the received authorization information is valid using the archived authorization information, and allowing (250) the non-registrar service provider access to the functionality of the SRS based on a determination that the second authorization information is valid.


Systems (100) and methods for enhanced monitoring and adaptive management of inter-network Domain Name System (DNS) traffic include an information capture device (140) in a monitored network. The information capture device receives a redirected connection request originated by a client machine in the monitored network (15) in response to a modified DNS answer from a recursive name server outside of the monitored network, captures detailed information associated with the redirected connection request that is inaccessible to the recursive name server, and sends the captured information to a data storage accessible to the recursive name server for storage as augmented DNS data associated with the client machine and/or the redirected connection request. The information capture device further provides, in response to the redirected connection request, an adaptive answer generated based on the augmented DNS data to the client machine.


System, apparatus, methods, and computer-readable medium for generating a verification code related to a registry operation request are provided. A verification process may be performed to determine if a verification request related to a registry operation is to be approved. If the request is to be approved, a verification code is generated that includes identifying information of a verification service provider (102) and a code indicating that the request has been verified.


Provided are methods, devices, and computer-readable media for accessing (304) a domain name; determining (306), via the processor, at least two words in the domain name; determining (308) at least one alternative word for at least one word in the domain name; determining (310) whether the at least one alternative word is contextually relevant; and generating (312) at least one alternative domain name based on a determination that the at least one alternative word is contextually relevant.


Provided is a method, device, and computer-readable medium for converting a string of characters in a first language into a phonetic representation of a second language using a first data structure that maps graphemes in the first language to one or more universal phonetic representations based on an international phonetic alphabet, wherein the first data structure comprises a plurality of first nodes with each first node of the plurality of first nodes having a respective weight assigned that corresponds to a likely pronunciation of a grapheme, and a second data structure that maps the one or more universal phonetic representations to one or more graphemes in the second language, wherein the second data structure comprises a plurality of second nodes with each second node of the plurality of second nodes having a respective weight assigned that corresponds to a likely representation of a grapheme in the second language.


Provided are methods, devices, and computer-readable media for accessing (404) a string of characters; parsing the string of characters into string of graphemes; determining (410) one or more phonetic representations for one or more graphemes in the string of graphemes based on a first data structure; determining (414) at least one grapheme representation for one or more of the one or more phonetic representations based on a second data structure; and constructing (416) the phonetic representation of the string of characters based on the grapheme representation that was determined.


Provided are methods, devices, and computer-readable media for generating (404) a string of characters based on a set of rules; parsing (406) the string of characters into string of graphemes; determining (410) one or more phonetic representations for one or more graphemes in the string of graphemes based on a first data structure; determining (414) at least one grapheme representation for one or more of the one or more phonetic representations based on a second data structure; and constructing (416) the phonetic representation of the string of characters based on the grapheme representation that was determined.


Techniques for electronically signing DNS records stored in a zone file for an internet DNS zone are presented. The techniques include electronically accessing a plurality of DNS resource records of a DNS zone stored on one or more DNS servers of a distributed DNS database; generating a plurality of leaf nodes from the plurality of DNS resource records; constructing a recursive hash tree from the plurality of leaf nodes, where the recursive hash tree includes a plurality of nodes including a root node and the plurality of leaf nodes, where each node of the plurality of nodes includes either a leaf node or a hash of data including child nodes; storing the root node in a DNS key resource record for a zone signing key for the zone; and publishing, in a DNS resource record signature resource record, validation data including path data from the recursive hash tree.

Loading VeriSign collaborators
Loading VeriSign collaborators