You are on page 1of 13
(2) oy os) 0) United States Patent Bladel VALIDATING USER CONTROL OVER CONTACT INFORMATION IN A DOMAIN NAME REGISTRATION DATABASE Inventor: James Bladel, Le Chir, 1A (US) Assignee: Go Daddy Operating Company, LLC Scottsdale, AZ (US) Notice: Subject to any disclaimer, the term ofthis pateat is extended of adjusted under 35 USC. 154(b) by 133 days. Appl. No 131616,570 Filed Sep. 14,2012, Int. € Gor 1700 GosR 1727 (2006.01) (2006.01) GO6F 172278 201301) Field of Classification Search crc (GO 17/30386, GO6E 17/30283;, Go6t 17/30; Gosr 17/30043; Go6e 210; (GO6F 17/00;,GO6F 17/30011;,GO6F 17/301: GOGF 17/30277, GO6F 17/3061; Gost I7/30684;, G06 15/173; GO6E 17/273, usp 707758 See application file for complete search history. References Cited US. PATENT DOCUMENTS eisai BL "7/2002 Call 876997 BI 42005 Rorex et al SS9SI31 BL 52005 Bero T0740 BE 208 Monroe Farateo B2 122008 King etal 7505690 BL 7/2009 Kamar eal 7iss9.458 B2 32010. Heskerman ota. 'US009275040B1 (10) Patent No. 4s) Date of Patent: US 9,275,040 B1 Mar. 1, 2016 7388130 B2 82010 Fecey cl 7808379 BL 92010 Akins lt a 8119339 B2 22012 Admin ta. Soun0026439 AL 22002 Mone 2oiamoise7 AL 72002 Ring etal SO0200783K0 AL 112003 Trbiket a annao64s6t AL 42001 Parsons et Snnawnxiang AL 42004 Glow 200810039017 Al 22008 Delany ‘anns0039019 AL Delany an0s00ss209 AL Caner ta (Continsed) OTHER PUBLICATIONS Inte pin-out of hp webarchive ong web 2000090104224 ip warvidatenne commerce sss’ him, Internet archive of Aate.net. Sep 1, 2000 (Continsed) Primary Examiner (74) Attorney “Truong Vo Agent, or Firm — Quarles & Brady LLP ABSTRACT An example embodiment ofa method and system of validat- nga user's control over contaet information may comprise at Teast one server computer receiving contact information fora ‘user and detemaining whether the contact information forthe ‘user is valid, Ifthe eontaet information for the user i deter ‘mined tobe valid, the server computers) may’store the con- ‘act information in a registered contacts database, monitor a plurality of record updates, including a request © register a ‘domain name, ins domain name registration database forthe ‘conte information and determine whether the contact infor ‘mation appears inthe record updates I the contact informa. tion is determined to appear in the record updates, the server ‘computer(s) may notify the use that the contaet information fppears in the record updates, In some embodiment, the ‘eistration ofthe domain name may be declined the infor ‘mation matches 12 Claims, 4 Drawing Sheets “=> rs US 9,275,040 BI Page 2 66) 200sox7as44 20060011720 aops0os13is 20080101113 donwo101 5s 20080193600 oor ooe7aes 2ooroos4ai aovporeetat 20070298680 20080008312 donwoo0s4 ao0s00n2013 2o0s0027809 doowoosen 0080068974 doowon014 20080813209 doors a00o.01T183 aoooonies7? aonoioasss7> ops 0268415 ao120047577 al A al A A al a References Cited USS. PATENT DOCUMENTS 12005 106 yhoo S06 Sa 2006 32007 4007 2007 1007 i008 1008 18 1008 22008 ‘sou ‘eu 1008 73009 2000 12009 02009 2012 Lecetal ca Fenton etal Lemon eta Damour a. Han Blin ta Mullane Noro Roth etal Boss etal Schncter ‘sian so9)04s Storm Shut Campbet Dim aswel Zimmermann ea ‘immer Killebrew Redlichet a. Hany Comtinky (OTHER PUBLICATIONS {GHG Internet Services, “Domain Name Registration Information, pp Land? [REC 1464, Using the Domain Name System to Store Ashita Sting Abts, My 1993, ial tsk fore report on the purpose of Whois and ofthe Whois conte, Ma 15,2006 ‘Natwork Solutions Launches Enhanced Busines Listings, Nv. 26, 2am usu iuodues Donia Stock Exchange in priate bt, ip Www dominaamenews com domain-sles fusinlroducer-domain-socke xchange-inrivate-betw $85, bese on Seri Impact Analysis. Baia, Marshall How Domain Name. Serves Work [Online), [Retreed fom: pcb archive org Web 20020223 193850 ww towsufivors.com das tpn, Feb. 23, 2002 ‘Ramsay’ Chantal a Scott Rose “Challenges in Song the Domain Name Stem, TEEE Security & Privacy, 2006, pp sar, * cited by examiner U.S, Patent Mar. 1, 2016 Sheet 1 of 4 Receive user contact information 100 Contact Information valid? 110 Store contact information in registered contacts database 120 t Monitor domain name registration database for updates including contact information 130 Updates inciude contact information? 140 Yes Notify user 150 US 9,275,040 BL U.S. Patent Mar. 1, 2016 Sheet 2 of 4 US 9,275,040 B1 Receive domain registration request including prospective registrant contact information 200 Registrant contact information in registered contacts database? 210 Yes Decline domain hel registration 220 END FIG. 2 U.S. Patent Mar. 1, 2016 Sheet 3 of 4 US 9,275,040 B1 Server 300 | Computer-Readable 1 1 1 Media 1 1 0 | 1 Instructions 1 1 20 i Loz E 4 Microprocessor 330 Server Network ‘300 40 Registered Contacts, Domain Name Database Registration Database 350 Bry Validated Revord Cone Updates Information 20 360 FIG. 3 U.S, Patent Mar. 1, 2016 Sheet 4 of 4 US 9,275,040 BL Registered Contacts Database 350 Validated Contact Information 260 Server 300 — -- | Computer-Readable ! Media 310, Tastractons (L“ a Microprocessor 330 Domain Name Registration Database 320 Record Updates 380, FIG. 4 US 9,275,040 BI 1 VALIDATING USER CONTROL OVER CONTACT INFORMATION IN A DOMAIN NAME REGISTRATION DATABASE, FIELD OF THE INVENTION ‘The present inventions generally relate to domain names and, more particularly, methods and systems for validating 2 User's coalrol over contact information stored in a domain ame registration database SUMMARY OF THE INVENTION Anexample embodiment ofamethod of validating user's ‘contol over contact information may’ comprise at least one server computer receiving contact information for user and ‘determining whether the contact information fo the user is valid. [the contact information for the users determined to be valid, the server computer(s) may store the contact infor mation ia «registered contacts database, monitor a plurality ‘of record updates in a domain name registration database for the contact information and determine whether the eoataet formation appears in the recon updates. Ifthe contact information s determined to appear inthe record updates, the server computer(s) may notify the user that the contset infor ‘mation appears in the record updates. The server computer(s) rostered contacts database and domain name registration ‘database may all be communicatively coupled toa network. "Another example embodiment of method of validating & user's control aver contaet information may comprise the at least one server comptr receiving a request t register @ domuin name to a prospective repistant and determining ‘whether a pospective registrant contact information, ‘included with the request, matches a contact information for ‘user stored in arepistered contacts database snd determined ‘o be valid. Ihe prospective registrant contaet information is determined to match the contact information for the user stored in the registered contacts database, the server com Prter(s) may notify the user thatthe prospective registrant ‘contact information matches the contaet information Tor the user stored in the registered contacts database or decline to register the domain name to the prospective resistant. "Anexamplcembodiment ofasystem for validating wusers ‘contol over contact information may comprise one oF more server computers, a registered contacts database running on the servers) and a domain name registration database, all ‘communicatively coupled toa network. The server computer ‘ay be configured to receive contact information foe 2 usee ‘and detemnine whether the conact information forthe users valid. I the contaet information for the users determined 10 be valid, the server computer may store the contact informa tion inthe registered contacts database, monitora plurality of record updates in the domain name registration database for the contact information and determine whether the contact ‘information appears in the recon! updates. If the contact ‘information is determinedto appear in the recordupdates, the user may be notified that the contact information appears ia the record updates "Another example embodimeat ofa system for validating 3 user's contol over contact information may comprise the server computer and/or one or more additonal server com- puters communicatively eoupled toa network and ranning the registered contaets database. The registered contacts database may store contact information, determined to be valid, for ‘each of plurality of users, The server(s) may be further ‘configured ta receive a request to register a domain namneto3 prospective registrant and determine whether prospective 0 o 2 registrant contact information, included with the request ‘matehes contact information fora user stored in a registered ‘cntaets database and determine to be valid, I the prospec: tive registrant contact information is determined to match the ‘cnet information forthe user stored inthe registered con- tacts database, the server(s) may be configured to notify the twser that the prospective registrant contact information ‘matehes the contact information forthe user stored in the registered contacts database or to decline to register the ‘domain name tothe prospective registrant. The above features and advantages ofthe present inven ‘ions will be beter understood from the following detailed description taken ia conjunction with the accompanying drawings, BRIBE DESCRIPTION OF THE DRAWINGS. FIG. 1 isaffow diagram illustrating a possibleembodiment ‘ofa method of validating a user's contol over contaet infor ‘mation stored in a domain name registration database FIG. 2isaflow diagram illstatingapossibleembodiment ‘ofa method of validating a user's contol over contect infor ‘mation stored in a domain name registration database TFIG. 3 illustmtes a possible embodiment of a system for validating users eontrol aver contat information stored in ‘domain name registration database FIG. 4 illustrates a possible embodiment of a system for validating a user's eontrol over contact information stored in domain name registration database. DETAILED DESCRIPTION ‘The present inventions will now be discussed in detail with regard to the atiched drawing figures, which were briefly {described above. Inthe following description, numerous spe- eile details are se fo llutrating the Applicant's best mae {or practicing the inventions and enabling one of ordinary sill in the art make and use the inventions. Tt will be obvious, however, to one skilled in the at thatthe present inventions may bo pescticod without many of these specific etal. In other instances, well-known machines, structures, ‘and method steps have not been described in particular detail in order to avoid unnecessarily obscuring the present inven- ‘ions. Unles otherwise indicated, like pars and method steps fare refered to with like reference nuierals, "A network i a collection a Hinks and nodes (eg, multiple ‘computers andr other devices connected together) arranged 0 that information may be passed from one part of the net- ‘work fo another over multiple links and throvgh various nodes. Examples of networks include the Internet, the public switched telephone network, the global Telex network, com- puter networks (eg., an intranet, an extranet, a loeaarea network ora wide-area network), wired networks, and Wine- less networks “The Intemet is a worldwide network of computers and ‘computer networks arranged to allow the easy and robust ‘exchiange of information hetween computer users, Hndreds ‘of millions of people around the world have access to com- puters connected tothe Internet via Internet Service Providers (SPs). Content providers (e.g, website owners or operators) place multimedia information (eg. text, graphies, audio, ideo, animation, and other forms of data) at specific loca. ‘ions on the Internet rfeered to as webpages, Websites com- prise a collection of connected, or otherwise related, ‘webpages. The combination of all the websites and their corresponding webpages on the Intermet i generally known asthe World Wide Web (WWW) or simply the Web. US 9,275,040 BI 3 Prevalent on the Web are multimedia websites, some of which may offer and sell oods and services to individuals ‘and organizations, Wehsites may consist ofa single webpage, but typically consist of multiple interconnected and related webpages. Menus and links may be used to move between different webpages within the website orto move to a differ- ‘ent website as is known in the ae. The intrcomnectvity of webpages enabled by the Inlemet can make it dificult for Interaet users to tll where one website ends and another begins. Websites may be created using FyperText Markup Language (HTML) to generate a standard set of tgs that define how the webpages for the website ure to be displayed, Such websites may comprise a collection of HTML and sub- ‘ordinate documents (.e.flles) stored on the Web that are ‘ppically accessible from the same Uniform Resource Lc tor (URL) and reside onthe same server, although such files may be distributed in numerous serves. ‘Users of the Internet may aeeess content providers” webs sites using software known as an Intemet browser, such as MICROSOFT INTERNET EXPLORER or MOZILLA FIREFOX. After the browser has located the desired ‘webpage, it roquests and receives information tom the webpage typically in the form of an HTTML document, and then cispiay’ the webpage content forthe user. The wer then may view other webpages at the same Website or move to a ‘entirely different website using the browser Browsers are able to locate specific websites because exch website, resource, and computer nthe Intemet has a unique Interaet Protocol (P) adress, Presently, there ae two stan- dards for IP addresses. The older IP address standard, often ‘called IP Version 4 (IP), isa 32-bit inary number, which is typically shown in dotted decimal notation, sere four 8-bit bytes are separated by a dot fom each other (ex. (64.202.167.32). The notation is used to improve hurman read bility The newer IP aldrss standard, oltenealled IP Version 6 (IPv6) or Next Generation Internet Protocol (IPng), is @ 128-bit binary number. The standaed human readable nota tion for IPvé addresses presents the addres as eight 16-bit hexadecimal words, exch separated by a colon (eg, 2EDC: [BAOK:0332:0000:CPSA:000C:2154:7313), IP addkesses, however, even in human readable notation, are difficult for poople to remember and use, A URL is mach ‘esier(o remember and may be used to point to any computer, “rectory, or file on the Internet. browser is able 1 access ‘website nthe Internet through the se ofa URL. The URL may include @ Hypestext Transfer Protocol (HTTP) request ‘combines withthe website's Intemet addres, also known as seni a coeeleot URL WIR EETE stand domain is: hiip:/www.companyname.com. In, thisexample,the“hp” dents te URL apa HTTP request and the “companyname.com" is the domain. ‘Websites, unless extremely large and complex or have ‘unustal trafic demands, typically reside on a single server ‘andl are prepared and maintained by a single individual oF ‘entity. Some Internet users, typically those that are lager and ‘more sophisticated, may provide ther own hardware sof- ‘ware, and connections othe Internet, But many Internet users either do not have the resources available or do not Wat 10 ‘reate and maintain the infastructure necessary to host tele ‘own websites. To assist such individuals (r entities), hosting ‘companies exist that offer website hosting services. These hosting service providers typically provide the hardware, software, and electronic communication means necessary #0 ‘connect multiple websites tothe Intemet. A single hosting service provider may literally host thousands of websites on ‘one oF more hosting servers 0 o 4 The domain name system (DNS) is the world’s largest istrbuted computing system that enables access 10 any resource in the Internet by (onslating user-friendly domain names to IP Addresses. The process of translating domain ‘ames 10 IP Addresses is called Name Resolion, A DNS fname resolution isthe fit step in the majority of Internet transactions. The DNS isin fata client-server system that provides this name resolution service through a family of servers called Domain Name Servers. The hierarchical domain space is divided into administrative units called ‘ones. A zone usually consists of a domain (eg, example- ‘com) and possibly one or more sub domains (eg. project- sexample-com, services.example.com). The authoritative data needed for performing the name resolution service is ccntained ina file called the zone file and the DNS servers hosting thi ile ate called the authoritative name servers Tor that zone ‘The DNS infrastructure consists of many different types of | DNS servers, DNS clients, and transactions between these cnlties. The most important truasaction in DNS isthe one that provides the core service of DNS (i, namie resolution service) and is called the DNS. Query/Response. DNS ‘Query’ Response transactions madeupotsquery originating {rom a DNS client (generically called a DNS resolver) and response from DNS name server. In this way, the DNS serves as a global, dsteibuted database. Name servers (serv= ing zone files) each contain a small portion of the global ‘domain space, and clients issue queries using a domain name. WHOIS is a TCP (Transmission Control Protocol) based ‘ransgetion-oriented querytesponse provoco that is used 10 provide information services to Intemet users. While origi- nally used to provide “white pages” services and information bout registered domain names, current deployments cover a ‘much broader range of information services. The protocol livers its content in «human-readable format A WHOIS server listens or requests rom WHOIS clients ‘The WHOIS client makes a text roquest tothe WHOIS server, ‘thea the WHOIS server replies with text content, The WHOIS server closes its connection as soon asthe output is finishes The closed TCP connections the indication tothe client that the response has heen received ‘WHOIS information may be stored and/or transmitted in the form ofacontact object. For example, contact information ora registant ofadomain name may be stored ina registrant ccntael object. The registrant contact abject may be used to {determine legal esponsibility for domain name registrations A contact object may comprise an XML. document which ‘stores contact information in a series of filds/parameters identified by XMI. taps. Non-limiting examples of such fieklsparameterstags may include: contactid—used 10 identity a “handle” for the userrepstrant; contact:name— used 10 identify the userfreistant, contactvoice—used 10 identify a phone number for contacting the userepistrant: contaetfax used to identify a fix number for contacting the userfepistrant, contactemail—used to identify an email address for contacting the useriegistrant; contactpost allnfo—a series of felds/parameters/ags nested within the ‘contact:postal Info (andor possibly contacted) filds/pa- ramelerstas including contact street, contactcity, contact: e (postal code) and contact:ce (county code) use 0 iden- ‘ily a plyscal address forthe wer/egistrant contactor ‘used t0 identify a legal business entity with which the user! registrant is afilate. In some contaet objects, legal entities ‘may be distinguished from private persons by the presence or absence of contactorg being nested within the cotact-postal Info fieldparametertag (or exsting anywhere else in the contaet object). These examples are non-limiting. Any infor US 9,275,040 BI 5 mation used to dently a means of contact fora userfregis- teant may be included in the coataet object for that user! registrant. AS non-limiting examples, a contact object may fnclude contact information inchuding an administrative cone wet or a technical contaet for the userregistrant s “The WHOIS protocol has no provisions for strong security. WHOIS lacks mechanisms for access contro, integrity, and ‘confidentiality: Accordingly, WHOIS-based services are used for information which is non-sensitive and intended to be accessible to everyone. This may be exploited by unserupu- Jous Intemet users who may register domain names whieh infFinge famous trademarks These users may copy the contact information fom WHOIS information associated witha domain name(website ‘hich ses the legitimate trdemat, den lst the legitimate ‘contact information as the contact information in WHOIS, information for a domain name/website that legitimate famous trademark, theeoby "spoofs mate trademark, domain name andlor website, «non-limiting example, website creator may create & bogus website, found athe URL bitp:/Wwww-goodaddy.com, using the “goodacy.com” domain name to “spoof” le mate website such as htp:/www-godaddy.com. In other ‘words, this individual or group may create a website forthe purposes of convincing e-commerce customers that the ‘oodladdy.com websites the legitimate website for GODAD- DY.COM goods and services. ‘Although the terms of service for registering « domain ame may rogue valid data, unscrupulous Tnlemet users ‘may attempt oad farther legitimacy to their bogus websi by copying contact information froma valid Website ito the WIOIS information and/or contact object, inserting that information into the WHOIS information andor contact ‘object for the domain name associated withthe bogus web- site then changing only afew ofthe parameters, ste as an ‘email adress ora fax number. Consequently, the response received from & WHOIS information request may appear 10 be legitimate, but may in fect helong to the unseroplous Internet users spoofing legitimate website Currently, the contact infomation that a domsin name registrant enters into WHOIS information is unsupervised tnd unregulated. This means that anyone can assign any ‘domain name 1 a new or existing registrant eoataet without prior approval, permission or even knowledge of the cont. ‘Thisalso means thatthe contact may be unaware tat they are responsible for online conduct assoeiated with the domain A similar problem exists with contact information asoci- sted with name servers. When registering a domain name, & tier may be required to enter primary and secondary name server usod 1 resolve the domain name. Like WHOIS infor ‘mation, the information entered by a user forthe primary or secondary name servers is unsupervised and unregulated, In this case, unscrupulous users may falsify the name server ‘information, while other users may be unfamiliar with pri- mary and secondary name servers, so may enter inaccurate information. ‘Asa non-niting example, a user may enter example net as their primary name serve, but may beunsureof thecorrest Secondary name server, so may enter secondary.net simply 10 ‘complete the registration process. Doing so may ease 3 ‘website’server where the actual socondary.net damain name resolves to get overwhelmed by Internet rfc Its therefore jn all users’ best interests to be sure that the information for the primary and secondary name servers are capable of being validated 0 o 6 The sheer Volume of websites, domain names and Interet trallic makes it impossible for domain name registrars to ‘monitor and validateall WHOIS, contact objects andorname servers in realtime. Applicant has therefore determined that presently-existng systems and methaxls do not provide opt- ‘mal means for monitoring. detecting and alerting a domain ‘ame owner if the WHOIS, contact object, name servers andor other registrant information is inaccurate and if any websites related t0 the spoofed domain names is being exploited, Numerous methods may be used with the systems described below. As a non-limiting example, the method illustrated in FIG. 1 (and all methods deseribed herein) may be performed by (atleast) any central processing unit (CPU) jn one or more computing devices or systems, such as & eroprocessor running on a server communicatively coupled to a network (eq, the Intemet) and executing instructions stoned (perhaps as scripts and/or software) in computer-resdable media accessible to the CPU, such 38 a hard disk drive or solid-state memory on a server. Fxample systems thal may be used o perform the methods desribed herein are ilusiated in FIGS. 3-4 and deseribed in detail below PIG. illustrates an embodiment ofa method of validating user's eantol over contaet information thatmay comprise at Teast one server computer receiving contact infomation fora user (Step 100) and detemnining whether the contact infor ‘mation forthe user is valid (Step 110). IF the contact infor ‘mation for the user is determined to be vali (Step 110), the servers) may store the contact information in a registered contacts database (Step 120), monitor a plurality of record updates in domain name registration database forthe eon- ‘aet information (Step 130) and determine whether the eon- ‘act information appears inthe record updates (Step 140). If the contact information i determined to appear in the record updates (Step 140), the server(s) may notly the user hat che ‘sone information appears inthe record updates (Step 150) ‘The server(s), registered contacts database and domain name epstation database may all be communicatively coupled to a network, ‘As a non-limiting example, Steps 100-150 may be ccom- plished by’at least one server computer, which may be con- figured to receive the user contact information (Step 100), {determine if the conte information s valid (Step 110), store the contact information in a registered contacts database (Step 120), monitor a domain name registration database for updates which include the contact information (Step 130), determine whether the updates include the contact informa tion (Step 140) and notify the user that the contact informa tion appears in the record updates (Step 150). Altemativey, Steps 100-180 may be accomplished by any software, scrips ‘or code, perhaps runing onthe servers) Asanotheraoa-limiting example, Sep 120 may beaovom- plished by a registered contacts database ranning on at last ‘one sever by receiving and storing the contact information froma client compte or from one or more server computers. In various embodiments, in addition t running the rey ‘ered contacts database, the server(s) may also host a registrar ‘website configured to register one or more domain names to ‘one or more registrants. The domain name may be registered ‘o the registrant by any means known in the at, including, but ‘ot limited to, searching foran available domain name using ‘one of more contol panels ona rgistear website selecting an ‘available domain name and registering the domain name ‘according to known domain name registration practices, “The server(s) may also host one or more contol panels the astrctions for which may be transmitted to, and displayed, US 9,275,040 BI 1 possibly viaan Internet browser, on each ofone or more client ‘Computers communicatively coupled wo the network. Various ‘combinations of these contol panels may be utilized by the tuserregisran to register a domain name, add contac infor mation t© the WHOIS information andior contact abject, prchase the “registered contacts" service as described herein And/or accomplish any other method steps disclosed herein ‘Oncor moreof the control panels displayed on the client(s) may’ receive contact information for 8 useefegistrant. The contact information may include any of the contact object, fiekdsparameterstaps disclosed herein, Specifically, the con- ‘wet information may include any combination of name, un adress, phone number, fax number, an email adress, an ‘administrative contact, technical contact, name server infor- mation and any other contact information forthe wser/regis- teant, The server(s) may then receive the contact information forthe wseregisirant (Step 100), possibly via an electronic transiission from the cleat ‘In embodiments where the user/egistrant has velected an ‘option rom the one or more control panels to purchase & registered contacts service andor ereate a registered contact, the servers) may determine whether the received contact information forthe user is vali (Step 110). If the eceived ‘contact information is not valid, the process may end. The step of determining whether the contact information for the user is valid may be accomplished by detemining ‘whether the user registrant has control over the contact infor ration, and verifying the userrepistraat’s contol over the ‘contact information. This may be accomplished by various means according to one oF more meth of contact, “The uscrrepstrant may demonstrate contol over the con= ‘wet information by submiting documentation which verifies the identity ofthe individual or entity which registered the ‘dons name, and Which could aot be produced by’a regis tront of bogus domain name and/or website. As noa-limiting ‘examples, a Ieitimate user/rgistrant could submit docu- rents such as a copy ofa busines license, documentation verifying repistered trademark, phone records, fax tans sion receipts, a tile to or lease agreement fora property particular address a driver's license, documentation demon- ‘tring control ofa primary andlor sccondary name server, ‘ten some embodiments, copies ofthis documentation may be uploaded as electronic dacuents or images via the on o ‘more control panels ‘As another toa-limiting example, after receiving a request ‘rom the userrepstrant forthe registered contacts service, the server(s) may generatea code which requires response from the registrant. This code may be delivered ether physically or ‘electronically (eg. via the postal address, emi address ele phone mimber, fax number ete. provided by the useriregis- tront and inluded in the provided contact information) and responded to by the usertopistrant. In these embodiments, ‘once the registrant has responded with the code, they verifying that they have control of the contact information, the contact information may be considered a registered con- ‘The step of verfVing the useriregstran’s control over ‘contact infomation may also be accomplished by determin= Jing whesher the contact information matehes 8 third party recocd forthe usertepistrant. Asa nos-limiting example, if third party maintained records of the documentation is- ‘closed above which verifies the identity ofthe individual oF ‘entity which registred the domain name (0.2. hosting pro- vider maintaining records that a particular name server is ‘controlled hy a particular individdaUbusiness entity), these records could be used to verify that a userinegstaat has ‘control over the contact information, 0 o 8 In various embodiments, ifthe registered domain name is the first domain name registered by the reustaat, one ofthe ‘control panels may be automatically displayed to offer the repstered contacts service tothe userlregstrant, Such a cone {aol panel may also he displayed any time during or aller @ epstrant has repstered thie frst domain name. ‘Once the validity of the contact information forthe user! reystrant has been confirmed (Step 110), the server(s) may sore the contact information (the “registered contact”) in a registered contacts database (Step 120), The registered eon- ‘et may be stored in association witha particular users ‘rant. IFone or more repstered contacts already exist in the epstered contacts database forthe userlegistrant, the reis- {ered contact be added may be associated inthe registered contacts database with smilatly guarded identities, as long as the registered contact to be aided has been verified. Put nother way, the servers) may compile the registered eon- ‘aets fora userregistrant to generate an object containing all of the registered contacts for a useriegistant, This object may beatalogousto. contact object and/or registrant contact object. ‘The servers) may monitor updates to any of plurality of records in a domain name registration database (Step 130) The domain name registration database may’ be, a8 2 non Jimiting example, a WHOIS database containing a plurality ‘of WHOIS, contact object and/or other contact records. Bach of the plurality of records, in tum, may contain, WHOIS lndior other contact information for each of a plurality of domain name registrants ‘The plurality of records may be monitored. for updates whieh inelude the contact informatio stored inthe registered ‘contacts database (Step 130), In various embodiments, these record updates may include record updates caused by domain name registration, a domain name transle, a record ‘modification or any other update capable of changing andor taking advantage of the contact information in the domain ame regisiration database. ‘The server(s) may determine whether the contact informa- ‘ion is found in any of the updates made tothe plurality of records inthe domain name registration database (Step 140) Inother words, if domain name is registered, transfered oF ‘modified, andor any other updates are made to the informa- ‘ion nthe plurality of records inthe domain nameregstation atabase such as changes to domain name information, WHOIS information, name server information andor one oF mon’ contact objects, the server(s) may determine ifthe infor- ‘mation, such as contact iaformation, matches any ofthe reg- fstered contacts associated with a user/rgisiznt and stored in the registered contacts database (Step 140) "To make the determination of such a match, the server(s) ‘may compare the repstered contact foreach wseregistrant with the contact information being updated in the domaia fame registration database, If the server(s) find an exact ‘mateh ora match with high degree of similarity eg only 1 reistered contact notin common withthe contact informa- tion), this would count as a “match” ora “hit” the server(s) determine thatthe records being updated in the domain names reyistration database include a match ora hit with the registered contact information fo the useriregis ‘rant which created the registered contact, then this us ‘eistrant may be notified ofthe update (Step 150), The not fication received by the useriegistrant may inelude ‘information identifying the domain name that caused the ‘mateh or hit. Using this and other information, the user! ‘epstrant may then become aware that another entity is trying to spoof their domain nate andlor website (or other ile US 9,275,040 BI 9 ‘mate online conduct) and can recognize and take action on ‘any legal or other responsibility to, for example, report the “uneshical conduct. FIG, 2 illustrates an embodiment of a method of validating ‘auser'seontrolover one information that may comprise al least one server compitcr receiving a request t register @ ‘domai name toa prospective rogistrant (Step 200) anddeter- mining whether a prospective registrant contset information, Included with the request, matches a contact information for user stored ina registered contacts database and determined to be valid (Step 240). I the prospective registrant contact ‘information is determined to match the contac information for the wser stored in the registered contacts database, the server computer(s) may aotly the user thatthe prospective registrant contac information matches the contact informa- tion for the user stored in the registered contacts database (Step 180) or decline w register the domain name to the prospective registrant (sep 220). The server computers) and registered contacts database may be communicatively ‘coupled 1 a network, As anon-limiting example, Steps 200-220 (including step 150) may be accomplished by atleast one server computer which may be configured to receive a domain name regista- tion request (Step 200), determine whether the contact infor mation include in the domain registration requests in the roistered contacts database (Step 210), notify the user that the registrant contact information isin he registered coniacts database (Step 180) andr decline domain name registration (Step 220) Altematively, Steps 200-220 (including step 150) may be accomplished by any software, scripts, or code, per= haps running on the server “As another non-limiting example, Step 210 may beaccom- plished by the registered contacts database running on the Server by receiving a database query from the server and determining if the repstered contact information isin the registered contacts databose. TInvarious embodiments, the request o register the domain ame tothe prospective registrant, as well as contact infor- mation for the prospective registrant, may be received (Step 200) via the previously disclosed repistrar website, possibly via one of more of the previously disclosed one or more ‘control panels displayed on a client computer ‘Upon receiving the request to register domain name wo 3 prospective registrant (Slop 200), theserverfs)may determine ‘whether the received prospective registrant contact informa tion matches contact information for a user registrant stored Inthe registered coniaets database (Step 210) and determined to he valid. Inthese example embodiments, the contoet infor mation stored inthe registered contacts database has already boen determined to be valid according to any steps of vali ing contacts in the registered database disclosed herein. A ‘match orhit between the received prospective registrant con- tact information and the contact information forthe wer) registrant stored in the registered contact database may be determined according to any steps of determining a match oF hit disclosed herein I the prospective registant contact information is deter- mined to mateh the contact information forthe user/egistant stored in the registered contacts database (Step 210), the servers(s) may be configured to oot the user/egisrant ‘which originally entered the registered contact(s) of the request to rezster the domain name (Step 150) according t0 any steps of notifying the userregstrant of a match or hit disclosed herein, The notification may also include the ‘domain namie which eased the hit and may inform the ws registrant thatthe prospective reyistrant contact information 0 o 10 niches th contact information fr the useregieant tored inthe reistered contacts database Inanaltemate embodiment, te server(s) andor the eis trar website moy be configured to dctne the domainname reaisation (Step 220) by canesting the transaction which Created the hit In ther words if the prospective registrant Contact information ince in « domain name royst trates contact infomation stored in Ie registered cons database, the server andlor reisrant website may be confge ted to cance the ansacton fo register the domainname ‘aquest bythe prospective reais TG. lisse an embodiment system for viding user's contol over contact information that may comprise ne oF more sewers) 00 corimbncatvely coupled to network M0 running existred eontct database 350 and ES renaton dane 370 The one of more servers 300 maybe confited to receive contact information for vce (Step 100) and detemsine ‘sheer the contact information forthe oser i valid (Step 110). Ihe ent afro forthe were determined 6 bel (Step 110), the sere compote) 300 my forher Soe the valdated contact information 360 in reseed Contacts database 350 (Sion 120) sumior platy of ‘cord updites 80 in a dontuin name registration database 570 forthe contact information (Step 180) and terse ther th validated contact infomation 360 appears inthe ‘evord utes 380 (Step 140 Ifthe validated ent infor "ation 360i etemined to appear in the record updates 380 {Stcp 10), she server computers) 800may not the user thatthe vliated contact information 360 appears in the ‘Reorupdates380 Step 180) The serets) 30bmny accom Dish thse method steps acorting to any of the dae Eclonres of the method steps heen The example enbodimentsilstated herein place noi ttn on network 340 configuration or connectivity. Ths as non-fiiting examples the network 340 coud eomneiae the Inter, the pobie switched elephone network, th obs ‘eleenerwork computer network (eg nant next ct Ioelare network, or 9 wideaen network), wie networks, wireless networks, or ny combination thee. ‘System components may be communiatvely couple 0 the network 340 via any meth of network connection Known inthe arto developed inthe tre ncn, bat not Tinted to wine, wireless node, dilup ait, cable ‘modem, Digital Subseber Line (DSL), Assinmetric Dig Subscribers Line (ASDI}. Vimo Private Nework (VPN), Intogrte Services Digital Network (ISDN), X25, Ftbemet token rng Fiber Dstbuted Date Interface DDD, IP over Asynchronous Taster Mode (ATM) Infrared Data Assoia- tion (rDA), wireless, WAN technologies (Tame Rely Point-to-Point Protol over Ether (PPPOE), andor any conbiston there Sewers) 300 (andlor any’ ther sever deseibed herein) ray comprise any computer or program that provides s~ ‘ses to ather computers progr, or er ithe in the Same computer or over computer network 340. As none Timing examples, the one of more servers $00 could be anplication,commoniaton mail database, pony fa, Hi, nea, woh poero-per, salon, stare, o hardware Servers (ie, servercompiters)animay use any Server font Koonin th at or developed inthe fata (possibly a shared hosting server, vil dedi hosting seve, ia ‘hosting server, or any combination thereof), Servers) 300 may comprise a computer readable storage sven 0 slring instctns 320 tht, when exceed by 8 Seropmcessr 380 canethe serve 30 to perforntse stops forwbichitisconfigired Sich compute-retdable media 310 US 9,275,040 BI u may comprise any data storage medium capable of storing instructions 320 for execution by a computing device. Itmay ‘comprises non-limiting examples, magnetic, opti, semi ‘conductor, paper, or anyother data storage media, a database 350, 370 or other network storage devieo, ard disk drives, portable disks, CD-ROM, DVD, RAM, ROM, lash memory, and/or holographic data stoage. The instructions 320 may, as non-limiting examples, comprise software andlor scripts sored inthe computer-readable media 310 that may be stored locally inthe server 300 or, altematively, in a highly-distib- uted format in a plurality of computer readable media M0 ‘accesible via the network 340, perhaps via a grid or cloud ‘computing environment. ‘Such instructions 320 may be implemented inthe form of software modules. Each module deeribed herein may com- prise a self-contained software component that may interact ‘withthe larger system andr other modules. A module may ‘comprise an individual (or plurality of) file(s) and may ‘execute a spevific task within a larger software andor hard are system. Asa non-limiting example, module may com- prise any software andor sripts inning on one of more fervers 300 containing insiructions 320 (perhaps stored a ‘compirierrcadable moda 310 accessible by the server com= puter’s 300 computer processor 330) thal, When executed by the computer processor 30, cause the sever computer 3000 perform the steps for which iis configured ‘he registered contacts database 350, the domain name registration database 370 and orany other database described herein may comprise local database online database, desk- top database, server-side database, relational database, hie archical database, network database, object database, object- relational database, associative database, concept-oriented database, enity-atibute-value database, multidimensional database, semi-structured database, slar schema database, XML database ile, collection o files, spreadsheet, or other means of data storage located on computer client, server, oF any other storage device known inthe ar or developed in the fntwo, Tn some embodiments, the domain name registration datahase may comprise a WHOIS database FIG. 3 also illustrates an embodiment of a. system for validating a ser’ contol aver contact information wherein the server(s) 300 may be configured to receive a roquest 10 reister a domain namie toa prospective registrant (Step 200) and determine whether a prospective repstrant contact infor. mation, included with the request, mutches a contact infor- ‘mation 360 fora use stored ina mepistered contacts database 380d determined tobe valid (Step 210). Ifthe prospective registrant contact information is determined to mateh the ‘contact information 360 forthe user stored in the registered ‘contacts database 350 (Step 210), the server computers) 300, ray notify the usr thatthe prospective registrant contact information matches the contac information 360 forsaid user sored in said registered contacts database 380 (Step 150) oF ‘decline to register the domain name to the prospective regis= teant (Step 220), The server computer(s) 300 and registered ‘contacts database 380 may al be communicatively coupledto the network 340. The seever(s) 300 may accomplish these method steps according to any ofthe detailed disclosures of the method steps herein, FIG. illustrates analtemate, consolidated embodiment of system for validating a user's control over contaet informa tion wherein a single server 300 comprises the computer readable media 310, instrctions 320 microprocessor 330, registered contacts database 350 and domain name regis tion database 370, Ina non-limiting example embodiment the server(s) 300 may be a server or cluster of servers con= tolled by a domain name registrar, In such a consolidated 0 o 12 cavironment the registrar may contols all elements of the system, inluding the disclosed registrar website (not shown) ‘Becaue of this, the repstrant may have complete aecess 0 thedomain names that it registers and any associated WHOIS ata, thereby allowing the single registrar 1o compare the validated contact information 360 stored within the registered contacts database within its server(s) 300 with the record ‘updates 380 stored inthe domain name registration database 370 also witha its own servers, thereby providing a simpler land more ellicient environment. Tnother embodiments, such as thatillusteted in FIG. 3,the servers) 300, registered contacts database 380 and domaia ‘ame rogisteation database 470 may exist ina highly distib- ‘uted environment. Ia sich an environment, a consortium of registrars may exist which share WHOIS and/or contact ‘object iaformation and domain name data so that ll registra ‘ion information suchas contact information and subscription information may be eros checked against other registra. ln suel an enviroument,a central repository of information may exist which each ofthe registrars may all nto, hereby mak- ‘ng all information available to al registrars within the con- ‘Other embostiments and uses of the above inventions will be apparent to those having ordinary skill inthe art upon consideration of the specification and practice ofthe iven tions disclosed herein, The specification and examples given shouldbe considered exemplary only, andi is contemplated that the appended claims will cover any other such embod ‘ments or modifications as fall within the true scope of the inventions, "The Abstract accompanying this specification is provides toenahle the United States Patent and Trademark Office and the public generally to determine quickly from a cursory inspection the nature and gist of te technical disclosure and inno way intended for defining, determining, or limiting the ‘resent inventions or any ots embodiments ‘The inventions claimed aro: 1A micthod, comprising _A) receiving bya least one server compnter communica tively coupled to a network, « contact information fora 1B) determining, by said at least one server computer, ‘whether said contact information for said user is Valid: ©) upon determination that said contat information for said user is valid then performing the steps of: 1) storing, by suid at least one server computer, said ‘contaet information ina registered contacts database; ‘monitoring, by said at Teast one server computer, plurality of record updates in a domain name regi tration database for said contact information; j) determining, by said at least one server computer, whether said contact information appear in said plu tality of rscord updates; and jv) upon determination that ssid contact information ‘appears in sid plurality of record updates, then not {ing By sid at Teast one server computer, said user that said contact information appears in said plurality ‘of record updates; and 'D) upon determination that said contact information for said user i not valid then no performing the steps of i) storing, by said at least one server computer, said ‘contact information in sid registered contacts data base: monitoring, by said at least one server computer, said Dlulity of record updates in said domain name eg dltabase for said contact US 9,275,040 BI 13 ili) determining, by suid at least one server computer, ‘whether sid contact information appears in sai pli- rality of record updates; and jv) upon determination that sid contact information appears in sid plurality of record updates, then noti- fying by sid atleast one server computer, said user that said contact information appears in said plurality ‘of record updates 2. Themethod of claim 1, wherein ssid contact information ‘comprises a name, an address, phone number, fix number ‘an emnil addeess, an administrative contact, or a technical ‘contact for said ser. ‘3. Themethod of claim 1, wherein sid determining step B) ‘saccomplished by determining whether said user has control ‘over sad contact information, 44. Themethod of claim 1, wherein said determining step B) js accomplished by determining whether ssid contact infor ‘ation matches third party record for sad user '8. The method of ela 1, wherein said domsin name registration datbase comprises a WHOIS database “6. The method of claim 1, wherein sui plurality of record ‘updates comprise a record update caused by a new domain fname registration,» domain name transfer, ora record modi- feation 7.A system, comprising:a server computer communica tively coupled to a network configured to: ‘A) receive a contact information fora user; 'B) determine whether said coataet information For sid ‘user is valid © upon determination that said eontact information for ‘said user is valid then perfonming the steps of 1) store said contact information in a registered contacts database running on a server compitercommnica- tively coupled to sad network ii) monitor, for said contact information, a plurality of record updates in a domain name eegisttation data- ‘base communicatively coupled to said network ii) determine whether sid contaet information appears in sid plorality of rosord updates; acd 14 iv) upon determination that seid contact information “appears in said plurality of ecord updates, then notify ‘aid user that sid eonaet information appears in said plurality of record updates: and D) upon determination that sad contat information for ‘user isnot valid then not performing the stops of i) store said contaet information in said registered con- tacts database running on sai server computer com- municatively coupled to said network; ) monitor, fr said eontactinformation, sid plurality of record updates ia said domain name registration data base communicatively coupled to said network: i determine whether suid contact information appears in sid plurality of record updates ad jv) upon determination that said contact information appears in said plurality of record updates then notify said user that sid contact information appears in said plurality of record updates. 8. Thesystem of claim 7, wherein sad contact information ‘comprises a name, anraddres, a phone number fax number, ‘an email address, an adasnistrative contact, oF a technical ‘ntact for said user 9. The system of claim 7, wherein said server computers configured to detemine whether said contact information for ssid user is valid by determining whether said userhas comrol ‘over said contact information. 10, The system of claim 7, wherein said server computer is configured to detemnine whether said contact information for suid user is valid by determining whether said eontoet infor ‘mation motches a thind party record for said user 11, The system of claim 7, wherein suid domain name repstration database comprises a WHOIS database 12. Thesystem of claim 7, wherein said plurality of record ‘updates comprise a record update caused by a new domain ‘ame registration, « damsin name transfer ora rocont modi- fication

You might also like