Domain name hijack protection
First Claim
Patent Images
1. A method, executed on one or more computers, comprising the steps of:
- a) registering a domain name to a registrant,b) storing a proxy email address associated with said domain name in a WHOIS database,c) receiving a domain name transfer request emailed to said proxy email address, andd) ignoring said domain name transfer request without forwarding said domain name transfer request to said registrant of said domain name.
4 Assignments
0 Petitions
Accused Products
Abstract
A domain name registering entity (such as a domain registry, registrar, or reseller) or an independent proxy registration service may offer a domain name hijack protection to their actual or potential customers. When a domain name transfer request or notice is received in a proxy email address listed in the domain name'"'"'s WHOIS records, the domain name registering entity or the proxy registration service may ignore or decline it. Customers may be given an ability to turn the domain name hijack protection service on and off, as well as an ability to adjust a variety of settings associated with the service.
56 Citations
13 Claims
-
1. A method, executed on one or more computers, comprising the steps of:
-
a) registering a domain name to a registrant, b) storing a proxy email address associated with said domain name in a WHOIS database, c) receiving a domain name transfer request emailed to said proxy email address, and d) ignoring said domain name transfer request without forwarding said domain name transfer request to said registrant of said domain name. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, executed on one or more computers, comprising the steps of:
-
a) registering a domain name to a registrant, b) receiving a domain name hijack protection service request for said domain name from said registrant, and c) applying said domain name hijack protection service to said domain name by storing a proxy email address associated with said domain name in a WHOIS database. - View Dependent Claims (12)
-
-
13. A method, executed on one or more computers, comprising the steps of:
-
a) offering a domain name private registration service, b) receiving a request from a customer for said domain name private registration service, c) applying said domain name private registration service to a domain name by storing a proxy email address associated with said domain name in a WHOIS database, d) offering a domain name hijack protection service, e) receiving a request from said customer for said domain name hijack protection service for said domain name, f) applying said domain name hijack protection service to said domain name, g) receiving a domain name transfer request for said domain name emailed to said proxy email address, h) ignoring said domain name transfer request, and i) notifying said customer that said domain name transfer request was ignored.
-
Specification