Agile network protocol for secure communications using secure domain names
First Claim
1. A non-transitory computer-readable storage medium storing instructions that, when executed by a computer, cause the computer to perform a method for registering a secure domain name, the method comprising steps of:
- receiving a request for registering a first domain name used for establishing an encrypted communication link;
verifying ownership information for an equivalent second domain name, corresponding to the first domain name, that is not used for establishing the encrypted communication link;
registering the first domain name in a domain name service configured to support establishment of encrypted communication links when the ownership information for the second domain name is consistent with ownership information for the first domain name.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure domain name service for a computer network is disclosed that includes a portal connected to a computer network, such as the Internet, and a domain name database connected to the computer network through the portal. The portal authenticates a query for a secure computer network address, and the domain name database stores secure computer network addresses for the computer network. Each secure computer network address is based on a non-standard top-level domain name, such as .scom, .sorg, .snet, .snet, .sedu, .smil and .sint.
-
Citations
28 Claims
-
1. A non-transitory computer-readable storage medium storing instructions that, when executed by a computer, cause the computer to perform a method for registering a secure domain name, the method comprising steps of:
-
receiving a request for registering a first domain name used for establishing an encrypted communication link; verifying ownership information for an equivalent second domain name, corresponding to the first domain name, that is not used for establishing the encrypted communication link; registering the first domain name in a domain name service configured to support establishment of encrypted communication links when the ownership information for the second domain name is consistent with ownership information for the first domain name. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for registering a domain name, comprising steps of:
-
(i) receiving a request for registering a first domain name used for establishing an encrypted communication link; (ii) verifying ownership information for a second domain name corresponding to the first domain name, wherein the second domain name is not used for establishing the encrypted communication link; and (ii) registering the first domain name when the ownership information for the second domain name is consistent with ownership information for the first domain name. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium, comprising computer-readable instructions that, when executed by a computer, cause the computer to perform a method for registering a domain name, the method comprising steps of:
-
receiving a request for registering a first domain name used for establishing an encrypted communication link; verifying ownership information for a second domain name corresponding to the first domain name, wherein the second domain name is not used for establishing the encrypted communication link; and registering the first domain name when the ownership information for the second domain name is consistent with ownership information for the first domain name. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A system comprising:
-
memory; and one or more processors configured to execute instructions to; receive a request for registering a first domain name used for establishing an encrypted communication link; verify ownership information for an equivalent second domain name, corresponding to the first domain name, that is not used for establishing the encrypted communication link; register the second domain name in a domain name service configured to support establishment of encrypted communication links when the ownership information for the second domain name is consistent with ownership information for the first domain name. - View Dependent Claims (22, 23)
-
-
24. A system comprising:
-
memory; and one or more processors configured to execute instructions to; (i) receive a request for registering a first domain name used for establishing an encrypted communication link; (ii) verify ownership information for a second domain name corresponding to the first domain name, wherein the second domain name is not used for establishing the encrypted communication link; and (ii) register the first domain name when the ownership information for the second domain name is consistent with ownership information for the first domain name. - View Dependent Claims (25, 26, 27, 28)
-
Specification