GTLD domain name registries RDAP architecture

ABSTRACT

Provided is a method for providing a response to a user query for domain-related information of a domain. The method can include obtaining, at a client over a network, the user query for the domain-related information, and identifying one or more thick services based on thin data for the domain. The method can also include providing, by the client, the user query to the identified one or more thick services and obtaining a first answer to the user query from the one or more thick services. Furthermore, the method can include providing a second answer to a user based on the first answer.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 15/269,698, filed on Sep. 19, 2016, which is hereby incorporated by reference in its entirety.

FIELD

The present disclosure relates generally to registration data access protocol (“RDAP”) for domain name registries (“DNR”).

BACKGROUND

RDAP is a replacement for WHOIS and defines a representational state transfer (“REST”) protocol for retrieving domain-related information. Internet Corporation for Assigned Names and Numbers (“ICANN”) has indicated to registrars and registries that they are to provide RDAP with implementation beginning in 2017. An RDAP Service is a service that conforms to the RDAP protocol and provides access to a well-defined subset of domains, such as all second-level domains under a top level domain (“TLD”) or all domains registered by a registrar.

SUMMARY

According to examples of the present disclosure, a method for providing a response to a user query for domain-related information of a domain can include obtaining, at a client over a network, the user query for the domain-related information and identifying one or more thick services based on thin data for the domain. The method can also include providing, by the client, the user query to the identified one or more thick services and obtaining a first answer to the user query from the one or more thick services. Furthermore, the method can include providing a second answer to a user based on the first answer.

In some embodiments, the thin data is locally stored thin data at the client. In some examples, the method can also include determining, by the client, that the domain-related information cannot be retrieved from a local storage of the client. Additionally, in some implementations, the client is not authoritative for the domain-related information.

In some examples, the client comprises an RDAP client, the domain-related information comprises RDAP data, the one or more thick services comprise one or more thick RDAP services, and the thin data comprises thin RDAP data.

In some embodiments, the one or more thick RDAP services comprise a RDAP bootstrap service, a registry RDAP service, a registrar information RDAP service, and a registrar RDAP service. In some examples, the method also includes authorizing the user prior to providing the second answer.

In various implementations, the authorizing the user is based on an identified jurisdiction. In some embodiments, the authorizing the user comprises determining at least one or more of a locality of the user, a nationality of the user, and/or a location of the one or more thick services. In some examples, the authorizing the user is based on authenticating the user.

In some embodiments, a type of information provided in the second answer is based on the authorizing the user and a jurisdiction policy. In some implementations, a token is received from an authorization service or an authentication service to authorize the user to receive the answer or authenticate the user. In some examples, the second answer provided to the user comprises first answers consolidated from the one or more thick services.

In another embodiment, one or more non-transitory computer-readable media for providing a response to a user query for domain-related information of a domain can include instructions, that in response to execution by a processor, cause the processor to perform operations comprising obtaining, at a client over a network, the user query for the domain-related information and identifying one or more thick services based on thin data for the domain. The operations can also include providing, by the client, the user query to the identified one or more thick services and obtaining a first answer to the user query from the one or more thick services. Furthermore, the operations can include providing a second answer to a user based on the first answer.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the implementations, as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a generic top level domain (“gTLD”) DNR RDAP component diagram for the components that makeup the gTLD DNR RDAP architecture model, according to examples of the present disclosure.

FIG. 2 shows a public (non-authentication) RDAP method of satisfying a domain lookup for the domain name “dom.example” and returning the public data available to non-authenticated users, according to examples of the present disclosure.

FIG. 3 shows an authenticated and authorized RDAP method of satisfying a domain lookup for the domain name “dom.example” that includes authentication via an RDAP Authentication Provider and authorization via RDAP services by passing an access token, according to examples of the present disclosure.

FIG. 4 shows intra-jurisdiction authorization RDAP method of satisfying a domain lookup for the domain name “dom.example” that applies jurisdiction-based authorization leveraging the locality (jurisdiction A) of the user, the nationality (jurisdiction A) of the user, and the location of the RDAP service (jurisdiction A), according to examples of the present disclosure.

FIG. 5 shows inter-jurisdiction authorization RDAP method of satisfying a domain lookup for the domain name “dom.example” that applies jurisdiction-based authorization leveraging the locality (jurisdiction B) of the user, the nationality (jurisdiction A) of the user, and the location of the RDAP service (jurisdiction A), according to examples of the present disclosure.

FIG. 6 shows a RDAP query resolution process using virtual thick RDAP service, according to examples of the present disclosure.

FIG. 7 shows a RDAP query resolution process using virtual thick RDAP service with a query batching feature, according to examples of the present disclosure.

FIG. 8 shows a RDAP query resolution process using virtual thick RDAP service with query batching and claim ticket feature, according to examples of the present disclosure.

FIG. 9 shows a RDAP referral search process, according to examples of the present disclosure.

FIG. 10 shows a RDAP resolution process using a RDAP authentication and authorization service, according to examples of the present disclosure.

FIG. 11 shows another RDAP resolution process using a centralized RDAP authentication and authorization service, according to examples of the present disclosure.

FIG. 12 shows a trust relation between RDAP entities using a second RDAP service, according to examples of the present disclosure.

FIG. 13 shows a process flow between RDAP entities, according to examples of the present disclosure.

FIG. 14A shows a process where a user agent is redirected to IDP for authentication, according to examples of the present disclosure.

FIG. 14B shows a process where RDAP client authenticates directly with IDP, according to examples of the present disclosure.

FIG. 15 shows a RDAP authentication process where the RDAP service is the identity provider, according to examples of the present disclosure.

FIG. 16 shows a RDAP authentication process using a general identity provider, according to examples of the present disclosure

FIG. 17 shows a RDAP authentication process where an organizational identity provider is the identity provider, according to examples of the present disclosure.

FIG. 18 shows an IDP selection process, according to examples of the present disclosure.

FIG. 19 shows another IDP selection process, according to examples of the present disclosure.

FIG. 20 shows yet another IDP selection process, according to examples of the present disclosure.

FIG. 21 illustrates an example of a hardware configuration for a computer device, which can be used to perform one or more of the processes described above.

DETAILED DESCRIPTION

Reference will now be made in detail to example implementations, which are illustrated in the accompanying drawings. When appropriate, the same reference numbers are used throughout the drawings to refer to the same or like parts.

For simplicity and illustrative purposes, the principles of the present disclosure are described by referring mainly to exemplary implementations thereof. However, one of ordinary skill in the art would readily recognize that the same principles are equally applicable to, and can be implemented in, all types of information and systems, and that any such variations do not depart from the true spirit and scope of the present disclosure. Moreover, in the following detailed description, references are made to the accompanying figures, which illustrate specific exemplary implementations. Electrical, mechanical, logical and structural changes may be made to the exemplary implementations without departing from the spirit and scope of the present disclosure. The following detailed description is, therefore, not to be taken in a limiting sense and the scope of the present disclosure is defined by the appended claims and their equivalents.

Generally speaking, examples of the present disclosure describe a virtual RDAP (“VRDAP”) service that is operable to provide a thick RDAP service for TLDs and provides an approach for an RDAP service that can retrieve information from RDAP services for arbitrary TLDs. In a thick RDAP service, all the contact information needed for the domain names are held by the thick service. In contrast, in a thin domain registry the domain contact information is held by the registrar. The registry WHOIS or RDAP just holds a referral to the registrar, the registration, expiry, update date, nameservers and domain status. In a thin registry, the contacts are not transferred as part of the transfer itself as they are in a thick registry. Thus the gaining/new registrar has to parse them when a domain is transferred or replace them with the contacts that were entered on the order. The lack of mandated registrar WHOIS output makes the parsing of WHOIS information difficult. Currently, .com and .net are the only gTLDs still using a thin registry. Many of the country code top level domain (“ccTLD”) registries that are running thin registries are switching to using extensible provisioning protocol (“EPP”) for the registrars to communicate with them, which normally involves the transfer to a thick WHOIS or thick RDAP. An RDAP service is a service that conforms to the RDAP protocol and provides access to a well-defined subset of domains such as all second-level domains under a TLD or all domains registered by a registrar. RDAP services can provide differentiated access levels. An RDAP client is an application that interacts with RDAP services to access domain-related information.

For example, the VRDAP is operable to accept RDAP queries for data for which the VRDAP is not authoritative. During query processing, a VRDAP identifies what data it is not directly able to retrieve from its own data stores and then attempts to identify RDAP services that are to be queried to retrieve the desired data. The VRDAP may then query the identified RDAP services and receive RDAP responses from them. After receiving the response from the identified RDAP services, VRDAP consolidates the responses and returns the consolidated results as the response to the original query. In another approach, a VRDAP would not query the identified RDAP services, but rather return referrals to the identified RDAP services in the RDAP response to a client query.

VRDAP can optimize the query processing it performs by “batching queries.” This capability allows it to send a number of queries at a time to alternate RDAP services and to produce consolidated results from the responses of the batched queries. VRDAP defines RDAP extension capabilities that allow for asynchronous batch processing, such as providing claim tickets in response to queries that have been batched and a mechanism for retrieving the search results at a later time using the claim ticket. VRDAP defines RDAP extension capabilities that allow the multiple batched queries to execute and the results to be aggregated into a single response.

The VRDAP approach can be used in a variety of ways. In one example, VRDAP allows a thin RDAP service to offer thick RDAP capabilities. A thin RDAP service may do this transparently to an RDAP client, in which case the thin RDAP service responds to queries it receives by querying thick RDAP services as necessary to produce thick data and return it in response to the query it received. A thin RDAP service might also return an RDAP response that contains thin data plus referrals needed for retrieving the thick RDAP data that corresponds with the thin data. In another example, an RDAP service could use this approach to provide RDAP search results for TLDs that the RDAP service is not authoritative for. In this example, the RDAP service may do this transparently to an RDAP client, in which case the RDAP service responds to queries it receives by identifying the RDAP service(s) that is/are authoritative to the TLD(s) applicable to the query and then querying the identified RDAP service(s) as necessary to produce the RDAP response that is then returned to the RDAP client. In this example, the RDAP service could also return just return an RDAP response that refers to the authoritative RDAP services that would need to be queried to fulfill the original query received from the RDAP client.

The VRDAP provides a mechanism for a particular registry to retrieve RDAP data that that particular registry does not own or store and provides mechanisms for efficiently processing batches of RDAP queries asynchronously. In doing so, the particular registry does not need to collect and store the information needed to respond to the RDAP queries the service supports. VRDAP accomplishes this by querying other RDAP services that are identified as sources for desired data. There are several advantages to this approach. It alleviates the costs and complexities involved in collecting and operating a thick registry. It facilitates offering a thick service that is compliant with PII legal requirements in various international jurisdictions. It may provide the particular registry with a legal shield against inaccuracy and omissions in data. It may also provide the particular registry with business opportunities related to being a trusted provider of consolidated data.

The VRDAP allows for batching, which allows the end user to submit multiple RDAP queries for processing. Batching allows asynchronous processing of RDAP queries, enabling RDAP clients to avoid latency and connectivity issues that are inherent in a synchronous processing approach. The VRDAP allows for routing, which allows the end user to not have to figure out which RDAP service to query to get desired data. The VRDAP allows for aggregation, which allows an RDAP client to issues only a single RDAP query to get a response that contains all the applicable data the VRDAP service is authoritative for or is able to act as a front-end for.

Turning now to the figures, FIG. 1 shows a gTLD DNR RDAP component diagram for the components that makeup the gTLD DNR RDAP architecture model 100, according to examples of the present disclosure. The components comprise the following seven elements. The first element is RDAP user 105. RDAP user 105 wants information from the RDAP services. RDAP user 105 could directly interface with the different services or could interface with RDAP client 110 to resolve the query. The second element is RDAP client 110, which is an application that interfaces with RDAP services and RDAP authentication provider 120 to resolve a query for RDAP user 105. RDAP clients 110 can include, but are not limited to, a web client or a command line client. The third element is RDAP bootstrap service 115, which is the HTTP service, defined in RFC 7484 that provides the authoritative list of registry RDAP service URLs for TLDs. The service returns a JSON response and is accessed using the URL http://data.iana.org/rdap/dns.json. The fourth element is RDAP authentication provider 120, which can be a federated authentication provider that supports RDAP user authentication that generates ID tokens that can be passed to the RDAP services to perform authorization. There can be more than one supported RDAP authentication provider 120. The fifth element is registry RDAP service 125, which is provided by the domain name registry that returns the data that the domain name registry is authoritative for (domain name and name server) and that includes a link to registrar info RDAP service 130 for RDAP client 110 to obtain the registrar information. The sixth element is registrar info RDAP service 130, which is provided by a party that is authoritative for the registrar data, like ICANN for the accredited registrars of gTLDs, to return registrar and registrar contact information, including the link to registrar RDAP service 125. There can be multiple registrar info RDAP services 130 that are authoritative for a different set of registrars (ICANN accredited vs. non-ICANN accredited). The seventh element is a registrar RDAP service 135, which is provided by the registrar that returns data that the registrar is authoritative for, such as, but not limited to, registrar domain and contact. RDAP bootstrap service 115, registry RDAP service 125, registrar info RDAP service 130, registrar RDAP service 135 are examples of RDAP services and can be provided by respective servers 140, 145, 150, 155 comprising one or more processors that are operable to execute one or more of the methods disclosed herein that are stored in one or more non-transitory computer-readable media.

In particular, RDAP client 110 is an application that interfaces with RDAP services and RDAP authentication provider 120 to resolve a query for RDAP user 105. RDAP clients 110 can leverage the RDAP services and RDAP authentication provider 120 to support queries from RDAP users 105 and display for the query results, including an RDAP web client, RDAP command line client, and RDAP client application. Each kind of RDAP client 110 can support a different set of features based on the features available in the underlying RDAP services. An example of RDAP client 110 is an RDAP web client that supports querying registration data directory services (“RDDS”) data from a list of TLDs, with providing tiers of data through authentication, providing both lookup and search capabilities, and providing the aggregate results in a consistent and easily consumable fashion. RDAP client 110 may provide to RDAP user 105 an RDAP query response that is comprised of information retrieved by executing the RDAP query against one or more authoritative RDAP services. For instance, an RDAP response to RDAP user 105 may be comprised of domain name and name server information retrieved from registry RDAP service 125 and contact information retrieved from a registrar RDAP service 135. The processing flows RDAP client 110 can perform in querying RDAP services shown in the figures below. RDAP clients 110 interacting with RDAP services that implement authorization can support authorization processing flows as described in RFC 7481. Authorization of RDAP clients 110 relative to authentication and granted authorization levels is further described with reference to the below described RDAP Authorization.

RDAP bootstrap service 115 is the HTTP service, defined in RFC 7484, that provides the authoritative list of registry RDAP service 125 URLs for TLDs. The service returns a JSON response and is accessed using the URL http://data.iana.org/rdap/dns.json. The RDAP bootstrap service 115 information may be cached in RDAP client 110. RDAP clients 110 use the RDAP bootstrap service 115 as the authoritative source for the registry RDAP services 125 of TLDs. There is no personal or private information data supported by the RDAP bootstrap service. The RDAP bootstrap service 115 does not provide differentiated levels of access and does not require authorization as described herein.

RDAP authentication provider 120 is a federated authentication provider that supports RDAP user authentication that generates ID tokens that can be passed to the RDAP services to perform authorization. There can be more than one supported RDAP authentication provider 120. To provide any level of differentiated access other than “public,” an RDAP service has a trust relationship with RDAP authentication provider 120 that issued the ID token presented to the RDAP service by RDAP client 110. A trust relationship requires that the RDAP service is capable of verifying the identity of the RDAP authentication provider 120 as a trusted RDAP authentication provider using a public key of the RDAP authentication provider 120 to verify cryptographic signatures of the RDAP authentication provider 120 on ID tokens it issues. RDAP authentication providers are capable of providing claims needed for differentiated authorization by an RDAP service. The claims may be put into ID tokens issued by RDAP authentication provider 120 or may be retrievable using an access token issues by RDAP authentication provider 120. In examples, an RDAP service will not provide differentiated levels of access if the claims needed for determining access levels are not provided to the RDAP service or retrievable by the RDAP service. In this case, an RDAP service will only provide “public” level of access. RDAP clients are be authenticated by a trusted RDAP authentication provider 120 in order to be granted anything more than “public” level of access to an RDAP service.

RDAP authentication can be based on widely adopted standards such as security assertion markup language (“SAML”) and OpenID Connect. RDAP clients can be authenticated in order to be granted anything more than a default minimal level of access. Identity providers (“IDPs”) are services that allow a user to authenticate a RDAP client. IDPs provide a signed authentication token as proof of authentication. Authentication tokens can be standards compliant, either SAML or JSON web token (“JWT”) (for OpenID Connect). An authentication token contains a claim that identifies a “subject” that has been authenticated. The subject is unique for each user within the IDP. Other claims in an authentication token can further identify a user, such as a claim identifying the email address of the user. Authentication tokens are cryptographically signed by the private key of the issuing IDP. Authentication tokens are used to establish the identity an RDAP client is operating under when interacting with RDAP services. The IDP signature on an authentication token is cryptographically verified using the public key of the IDP. IDPs can use one of the following combinations of technologies for their underlying authentication technology: Active Directory/SAML, LDAP/SAML, OpenID Connect/JWT.

Authorization determines and grants the access level for an entity relative to resources. Access levels are determined based on at least the following factors: has the identity of the entity been authenticated; and have access rights been defined for the identity. An authorization service authorizes entities relative to resources managed by a resource service/relying party (referred to here-in as resource server per OAuth 2 terminology). OAuth 2 is an IETF defined framework that defines how clients are granted access by an authorization service to resources managed by a resource service. OpenID Connect is a specification for how an authentication service can be combined with an OAuth 2 authorization service to support both authentication and authorization. RDAP services can follow the OAuth 2 protocol for authorizing RDAP clients and support OpenID Connect for both authentication and authorization. For example, IETF RFC 7521 can be followed, which defines a framework to support authentication as part of authorization including how authentication tokens are passed in authorization requests to an OAuth 2 authorization service. IETF RFC 7522 defines how SAML authentication assertions are used for this and IETF RFC 7523 defines how JWT ID tokens are used for this. IETF RFCs 7521-7523 require the IDP to specify the “audience” (authorization service) for the authentication token. IETF draft, “OAuth 2.0 Token Exchange: An STS for the REST of Us” specifies the means by which an IDP can be informed of the audience for an authentication token. The various examples provided herein for the interactions between an IDP, an RDAP client, and RDAP services can use these referenced standards.

Registry RDAP service 125 supports queries and returns the data that the domain name registry is authoritative for and includes a link to the registrar info RDAP service 130 for RDAP client 110 to obtain the registrar information. The data that the domain name registry is authoritative for includes the domain name and name server data used to manage the domain name and name server, and to generate the DNS zone. The referenced registrar info RDAP service 130 can be used to get the registrar information, including the URL for registrar RDAP service, for RDAP client 110 to obtain all of the domain name and name server related information that RDAP client 110 is authorized for. There is no personal or private information data supported by the registry RDAP service 125, so use of RDAP authentication provider 120 is optional, but registry RDAP service 125 supports the passing of the ID token. Registry RDAP service 125 supports the following queries as defined in RFC 7482: 1. Domain Path Segment Specification 2. Nameserver Path Segment Specification 3. Domain Search 4. Nameserver Search.

“Table 1—Domain Object Fields” shows the list of domain object fields that may or are be returned in the RDAP response for domain objects with a reference to the location within the RDAP response, according to RFC 7483. The fields that are returned include a “Yes” and the fields that may be returned include a “No” for the required column. This table is based on “Appendix B: Data Element Mappings” in the Registration Data Access Protocol (RDAP) Operational Profile for gTLD Registries and Registrars. All the fields are available using the “public” authorization tier.

TABLE 1 Domain Object Fields Required Field (Yes, No) Location in RDAP Response Domain Name Yes ldhName Domain ID Yes Domain ID Updated Date No events.eventAction “last changed” Creation Date Yes events.eventAction “registration” Registry Expiry Yes events.eventAction “expiration” Date Domain Status Yes status object Name Server No nameservers.ldhname DNSSEC Yes secureDNS object Internationalized Yes for IDN unicodeName Domain Name domain, No for (“IDN”) ASCII domain Registrar Yes publicIDs.identifier in entities.roles registrar Registrar Link Yes “registrar” links element to the registrar entity in the Registrar Info RDAP

“Table 2—Name Server Object Fields” shows the list of name server object fields that may or are be returned in the RDAP response for name server objects with a reference to the location within the RDAP response, according to RFC 7483. The fields that are returned include a “Yes” and the fields that may be returned include a “No” for the required column. This table is based on “Appendix B: Data Element Mappings” in the Registration Data Access Protocol (RDAP) Operational Profile for gTLD Registries and Registrars. All the fields are available using the “public” authorization tier.

TABLE 2 Name Server Object Fields Field Required (Yes, No) Location in RDAP Response Server Name Yes nameserver.ldhName IP Address No nameserver.ipAddresses Registrar Yes entities.roles regisrar Registrar Link Yes “registrar” links element to the registrar entity in the Registrar Info RDAP Service

Registrar info RDAP service 130 is an RDAP service provided by a party that is authoritative for the registrar data, like ICANN for gTLDs, to return registrar and registrar contact information, including a link to registrar RDAP service 135. Links to registrar RDAP services 135 are used for RDAP clients 110 to use in identifying authoritative registrar RDAP services 135 to query for contact information and domain information authoritative to the registrar. Registrar info RDAP service 130 returns URLs for registrar RDAP service 135 in responses to RDAP registrar queries.

“Table 3—Registrar Object Fields” shows the list of registrar object fields under the entities.role “registrar” that may or are be returned in the RDAP response for registrar objects with a reference to the location within the RDAP response, according to RFC 7483. The fields that are returned include a “Yes” and the fields that may be returned include a “No” for the required column. This table is based on “Appendix B: Data Element Mappings” in the Registration Data Access Protocol (RDAP) Operational Profile for gTLD Registries and Registrars. All the fields are available using the “public” authorization tier.

TABLE 3 Registrar Object Fields Required Field (Yes, No) Location in RDAP Response Registrar Name Yes jCard fn Registrar Street Yes Grouped into the adr member Registrar City Yes Grouped into the adr member Registrar State/Province No Grouped into the adr member Registrar Postal Code No Grouped into the adr member Registrar Country Yes Grouped into the adr member Registrar Phone Number No tel with a type parameter voice Registrar Phone Number Ext No Ext Registrar Fax No tel with a type parameter Registrar Fax Ext Yes Ext Registrar Email Yes Email

“Table 4—Registrar Contact Object Fields” shows the list of registrar contact object fields under the entities.role “administrative” for an administrative contact, entities.role “technical” for a technical contact, and entities.role “abuse” for an abuse contact, that may or are returned in the RDAP response for registrar contact objects with a reference to the location within the RDAP response, according to RFC 7483. The fields that are returned include a “Yes” and the fields that may be returned include a “No” for the required column. The fields that may be returned are subject to authentication and authorization levels defined in the RDAP authorization section. The table indicates the minimum authorization level required in order for a field to be returned in the access level column. The fields that may be returned may require a higher access level than shown in the table based on an RDAP Service adherence to privacy law. This table is based on “Appendix B: Data Element Mappings” in the Registration Data Access Protocol (RDAP) Operational Profile for gTLD Registries and Registrars.

TABLE 4 Registrar Contact Object Fields Access Field Required Level Location in RDAP Response Contact Yes Public jCard fn Phone Number No Extended tel with a type parameter voice Phone Number Ext No Extended ext Fax Number No Extended tel with a type parameter fax Fax Number Ext No Extended ext Email No Private email

Registrar RDAP service 135 is an RDAP service provided by the registrar that returns data that the registrar is authoritative for (registrar domain and contact). Personal or private information data may be provided in RDAP responses from registrar RDAP service 135. Registrar RDAP services 135 supports the use of the ID token created by RDAP authentication provider 120 for determining differentiated levels of access to RDAP data. Registrar RDAP service 135 supports the following queries as defined in RFC 7482: 1. Domain Path Segment Specification 2. Entity Path Segment Specification 3. Domain Search 4. Entity Search

“Table 5—Registrar Domain Object Fields” shows the list of domain object fields authoritative to the registrar that may be or are returned in the RDAP response for domain objects with a reference to the location within the RDAP response, according to RFC 7483. The fields that are returned include a “Yes” and the fields that may be returned include a “No” for the required column. This table is based on “Appendix B: Data Element Mappings” in the Registration Data Access Protocol (RDAP) Operational Profile for gTLD Registries and Registrars. All the fields are available using the “public” authorization tier.

TABLE 5 Registrar Domain Object Fields Required Field (Yes, No) Location in RDAP Response Domain Name Yes ldhName Registrar Registration No events.eventAction “registrar Expiration Date expiration” Reseller No Entities.role reseller

“Table 6—Contact Object Fields” shows the list of contact object fields under the entities.role “registrant” for a registrant contact, entities.role “administrative” for an administrative contact, entities.role “technical” for a technical contact, and entities.role “billing” for a billing contact, that may or are returned in the RDAP response for contact objects with a reference to the location within the RDAP response, according to RFC 7483. The fields that are returned include a “Yes” and the fields that may be returned include a “No” for the required column. The fields that may be returned are subject to authentication and authorization levels discussed in the RDAP authorization section. The table indicates the minimum authorization level required in order for a field to be returned in the access level column. The fields that may be returned may require a higher access level than shown in the table based on an RDAP service adherence to privacy law. This table is based on “Appendix B: Data Element Mappings” in the Registration Data Access Protocol (RDAP) Operational Profile for gTLD Registries and Registrars.

TABLE 6 Contact Object Fields Required Access Location in RDAP Field (Yes, No) Level Response Contact ID Yes Public Entity handle Contact Name Yes Public jCard “fn” Contact No Extended Org Organization Contact Street No Extended Grouped into the adr member Contact City No Extended Grouped into the adr member Contact No Extended Grouped into the adr member State/Province Contact Postal No Extended Grouped into the adr member Code Contact Country No Extended Grouped into the adr member Contact Phone No Extended tel with a type parameter voice Number Contact Phone No Extended ext Number Ext Contact Fax No Extended tel with a type parameter fax Contact Fax Ext No Extended ext Contract Emai No Private email

The figures below builds off FIG. 1 to present the flows through the components to satisfy an RDAP query. In general, the use of authentication and the use of the ID token with the authorization scheme determines the amount of data that the user will get. Applying the authorization policy is up to each RDAP service, which provides maximum flexibility to address many different authorization requirements.

FIG. 2 shows a public (non-authentication) RDAP method of satisfying a domain lookup for the domain name “dom.example” and returning the public data available to non-authenticated users 200, according to examples of the present disclosure. The data returned does not include any private or Personally Identifiable Information (PII). At 205, RDAP user 105 accesses RDAP Client 110 and the user performs a lookup for the domain name “dom.example.” At 210, RDAP client 110 locates the registry RDAP service 120 for “example” by querying RDAP bootstrap service 115. This information may be cached in RDAP client 110. At 215, RDAP client 110 sends an RDAP domain lookup for the domain name “dom.example”, according to section 3.1.3 of RFC 7482, to registry RDAP service 120 for “example.” The domain name and related name server fields returned are based on “Table 1—Domain Object Fields” and “Table 2—Name Server Object Fields”, respectively. RDAP client 110 uses the registrar link field for the next step. At 220, RDAP client 110 sends an RDAP entity lookup for the registrar, leveraging the registrar link field defined in “Table 1—Domain Object Fields” to registrar info RDAP service 130. The “Public” registrar information is returned that includes the registrar RDAP link field for the next step. At 225, RDAP client 110 sends an RDAP domain lookup for the domain name “dom.example”, according to section 3.1.3 of RFC 7482, to registrar RDAP service 135 defined by the registrar RDAP link field of 220. The “Public” domain name fields and related contact fields (registrant, admin, tech, billing) returned are based on “Table 5—Registrar Domain Object Fields” and “Table 6—Contact Object Fields.” At 230, RDAP client 110 aggregates the information from the RDAP services and returns the query response to RDAP user 105.

FIG. 3 shows an authenticated and authorized RDAP method of satisfying a domain lookup for the domain name “dom.example” that includes authentication via an RDAP Authentication Provider and authorization via RDAP services by passing the access token 300, according to examples of the present disclosure. The level of data available to the user is based on the contents of their access token. The data returned may include private or personally identifiable information (“PII”) information. At 305, RDAP user 105 accesses RDAP Client 110 and the RDAP user 105 performs a lookup for the domain name “dom.example.” At 310, RDAP client 110 authenticates RDAP user 105 with RDAP authentication provider 120. RDAP authentication provider 120 will generate and return the access token that is used by the RDAP services for authorization. At 315, RDAP client 110 locates registry RDAP service 125 for “example” by querying RDAP bootstrap service 115. This information may be cached in RDAP client 110. At 320, RDAP client 110 sends an RDAP domain lookup for the domain name “dom.example”, according to section 3.1.3 of RFC 7482, to registry RDAP service 125 for “example” with the access token used for authorization. The domain name and related name server fields returned are based on “Table 1—Domain Object Fields” and “Table 2—Name Server Object Fields”, respectively. RDAP client 110 uses the registrar link field for the next step. At 325, RDAP client 110 sends an RDAP entity lookup for the registrar, leveraging the registrar link field defined in “Table 1—Domain Object Fields” to the registrar info RDAP service 130 with the access token used for authorization. The registrar information is returned based on the access level defined in the access token that includes the registrar RDAP link field for the next step. At 330, RDAP client 110 sends an RDAP domain lookup for the domain name “dom.example”, according to section 3.1.3 of RFC 7482, to the registrar RDAP service 135 defined by the registrar RDAP link field of 325. The domain name fields and related contact fields (registrant, admin, tech, billing) is returned based on the access level defined in the access token and based on the “Table 5—Registrar Domain Object Fields” and the “Table 6—Contact Object Fields”. At 335, RDAP client 110 aggregates the information from the RDAP services and returns the query response to RDAP user 105.

FIG. 4 shows intra-jurisdiction authorization RDAP method of satisfying a domain lookup for the domain name “dom.example” that applies jurisdiction-based authorization leveraging the locality (jurisdiction A) of the user, the nationality (jurisdiction A) of the user, and the location of the RDAP service (jurisdiction A) 400, according to examples of the present disclosure. Since the locality, nationality, and service location reside within the same jurisdiction, it is expected that the user will receive more data than if the jurisdictions did not match. At 410, jurisdiction A RDAP user 405 accesses RDAP client 110 from within jurisdiction A where RDAP user 405 performs a lookup for the domain name “dom.example.” At 415, RDAP client 110 authenticates jurisdiction A RDAP user 405 with RDAP authentication provider 120 with the inclusion of the user's locality. RDAP authentication provider 120 will generate and return the access token with the locality and nationality of jurisdiction A RDAP user 405 that is used by the RDAP services for authorization. At 420, RDAP client 110 locates registry RDAP service 125 for “example” by querying RDAP bootstrap service 115. This information may be cached in RDAP Client 110. At 425, RDAP client 110 sends an RDAP domain lookup for the domain name “dom.example”, according to section 3.1.3 of RFC 7482, to the registry RDAP service 125 for “example” with the access token used for authorization. The domain name and related name server fields returned are based on “Table 1—Domain Object Fields” and “Table 2—Name Server Object Fields”, respectively. RDAP client 110 uses the registrar link field for 430. At 430, RDAP client 110 sends an RDAP entity lookup for the registrar, leveraging the registrar link field defined in “Table 1—Domain Object Fields” to registrar info RDAP service 130 with the access token used for authorization. The registrar information is returned based on the access level defined in the access token that includes the registrar RDAP link field for 435. At 435, RDAP client 110 sends an RDAP domain lookup for the domain name “dom.example”, according to section 3.1.3 of RFC 7482, to the Registrar RDAP Service defined by the Registrar RDAP Link field of 430. At 445, registrar RDAP service 440 will apply the jurisdiction authorization that shows that the user's locality, the user's nationality, and the service's location all are in jurisdiction A. The domain name fields and related contact fields (registrant, admin, tech, billing) is returned based on the jurisdiction authorization policy, which is expected to be more than if the jurisdictions did not match. At 450, RDAP client 110 aggregates the information from the RDAP services and returns the query response to jurisdiction A RDAP user 405.

FIG. 5 shows inter-jurisdiction authorization RDAP method of satisfying a domain lookup for the domain name “dom.example” that applies jurisdiction-based authorization leveraging the locality (jurisdiction B) of the user, the nationality (jurisdiction A) of the user, and the location of the RDAP service (jurisdiction A) 500, according to examples of the present disclosure. Since the locality, nationality, and service location don't reside within the same jurisdiction, it is expected that the user will receive less data than if the jurisdictions did match. At 510, jurisdiction A RDAP user 505 accesses RDAP client 110 from within jurisdiction B where jurisdiction A RDAP user 505 performs a lookup for the domain name “dom.example.” At 515, RDAP client 110 authenticates the jurisdiction A RDAP user 505 with RDAP authentication provider 120 with the inclusion of the user's locality. RDAP authentication provider 120 will generate and return the access token with the locality and nationality of the jurisdiction A RDAP user 505 that is used by the RDAP Services for authorization. At 520, RDAP client 110 locates registry RDAP service 125 for “example” by querying RDAP bootstrap service 115. This information may be cached in RDAP client 110. At 525, RDAP client 110 sends an RDAP domain lookup for the domain name “dom.example”, according to section 3.1.3 of RFC 7482, to registry RDAP service 125 for “example” with the access token used for authorization. The domain name and related name server fields returned are based on “Table 1—Domain Object Fields” and “Table 2—Name Server Object Fields”, respectively. RDAP client 110 uses the registrar link field for 530. At 530, RDAP client 110 sends an RDAP entity lookup for the registrar, leveraging the registrar link field defined in “Table 1—Domain Object Fields” to registrar info RDAP service 130 with the access token used for authorization. The registrar information is returned based on the access level defined in the access token that includes the registrar RDAP link field for 540. At 540, RDAP client 110 sends an RDAP domain lookup for the domain name “dom.example”, according to section 3.1.3 of RFC 7482, to the registrar RDAP service defined by the registrar RDAP link field of 530. At 545, registrar RDAP service 535 will apply the jurisdiction authorization that shows that the user's locality is different from the user's nationality and the service's location. The domain name fields and related contact fields (registrant, admin, tech, billing) is returned based on the jurisdiction authorization policy, which is expected to be less than if the jurisdictions did match. At 550, RDAP client 110 aggregates the information from the RDAP services and returns the query response to jurisdiction A RDAP user 505.

FIG. 6 shows a RDAP query resolution process using virtual thick RDAP service 600, according to examples of the present disclosure. The virtual thick RDAP service is a thin service that provides a RDAP user the appearance of a thick service by performing additional processing with other RDAP services that are transparent to the RDAP user. The process beings by RDAP user 605 initiating a RDAP query 610 to RDAP client 615. RDAP client 615 sends RDAP query 620 with access token 625 provided by a RDAP authentication provider (not shown), such as RDAP authentication provider 120, to virtual thick RDAP service 630. Virtual thick RDAP service 630 provides local thin RDAP data with references to registrars with thick data. Virtual thick RDAP service 630 identifies RDAP services to query based on its thin data and IANA registry of gTLD registry providers 635. Virtual thick RDAP service 630 queries identified RDAP services, i.e., registry RDAP service 650, registrar thick RDP service 665, registrar thick RDAP service 670, and may provide access token 625 with each query so that the RDAP services can determine the authorized access level of RDAP client 615. In this example, virtual thick RDAP service 630 provides RDAP query 645 optionally with access token 625 to registry RDAP service 650 and receives RDAP response 655 and provides RDAP query 660 optionally with access token 625 to registrar thick RDAP service 670 and receives RDAP response 675. Based on the RDAP responses from the identified RDAP services, virtual thick RDAP service 630 aggregates query results 680 and send aggregated RDAP response 685 to RDAP client 615. RDAP client 615 presents consolidated query results 690 to RDAP user 605.

FIG. 7 shows a RDAP query resolution process using virtual thick RDAP service with a query batching feature 700, according to examples of the present disclosure. The virtual thick RDAP service is a thin service that provides a RDAP user the appearance of a thick service by performing additional processing with other RDAP services that are transparent to the RDAP user. The process beings by RDAP user 705 initiating a RDAP query 710 to RDAP client 715. RDAP client 715 sends RDAP query 720 with access token 725 provided by a RDAP authentication provider (not shown), such as RDAP authentication provider 120, to virtual thick RDAP service 730. Virtual thick RDAP service 730 provides local thin RDAP data with references to registrars with thick data. Virtual thick RDAP service 730 identifies RDAP services to query based on its thin data and IANA registry of gTLD registry providers 735. Virtual thick RDAP service 730 iterates through identified RDAP services, i.e., thin RDAP service 745, thick RDP service 760, thick RDAP service 770, and creates batches of queries for each identified RDAP service submits query batches to the RDAP service, and may provide access token 725 with each query batch so that the RDAP services can determine the authorized access level of RDAP client 715. The identified RDAP services process the query batches and send back aggregated results to virtual thick RDAP service 730. In this example, virtual thick RDAP service 730 provides RDAP query batch 755 optionally with access token 725 to thin RDAP service 745 and receives RDAP response 750 and provides RDAP query batch 765 optionally with access token 725 to thick RDAP service 770 and receives RDAP response 775. Based on the RDAP responses from the identified RDAP services, virtual thick RDAP service 730 aggregates results of query batches and send aggregated RDAP response 785 to RDAP client 715. RDAP client 715 presents aggregated query results 790 to RDAP user 705.

FIG. 8 shows a RDAP query resolution process using virtual thick RDAP service with query batching and claim ticket feature 800, according to examples of the present disclosure. The virtual thick RDAP service is a thin service that provides a RDAP user the appearance of a thick service by performing additional processing with other thick RDAP service that are transparent to the RDAP user. The process beings by RDAP user 805 initiating a RDAP query 810 to RDAP client 815. RDAP client 815 sends RDAP query 820 with access token 825 provided by a RDAP authentication provider (not shown), such as RDAP authentication provider 120, to virtual thick RDAP service 830. Virtual thick RDAP service 830 provides local thin RDAP data with references to registrars with thick data. Virtual thick RDAP services 830 identifies RDAP services to query based on its thin data and IANA registry of gTLD registry providers 835. In this example, virtual thick RDAP service 830 provides claim ticket 875 to RDAP client 815 for it to use later in retrieving RDAP response 885 to RDAP query 810. Virtual thick RDAP service 830 iterates through identified RDAP services, i.e., thin RDAP service 845, thick RDP service 855, thick RDAP service 865, and creates batches of queries for each identified RDAP service submits query batches to the RDAP service, and may provide access token 825 with each query batch so that the RDAP services can determine the authorized access level of RDAP client 815. The identified RDAP services process the query batches and send back aggregated results to virtual thick RDAP service 830. In this example, virtual thick RDAP service 830 provides RDAP query batch 840 optionally with access token 825 to thin RDAP service 845 and receives RDAP response 850 and provides RDAP query batch 860 optionally with access token 825 to thick RDAP service 865 and receives RDAP response 870. Based on the RDAP responses from the identified RDAP services and a user request for results of the RDAP query that causes RDAP client 815 to use claim ticket 880 in request for RDAP response 890, virtual thick RDAP service 830 aggregates results of query batches and send aggregated RDAP response 885 to RDAP client 815. RDAP client 815 presents aggregated query results 895 to RDAP user 805.

FIG. 9 shows a RDAP referral search process 900, according to examples of the present disclosure. RDAP user 905 initiates RDAP query 910 against virtual thick RDAP service 930 to RDAP client 915. RDAP client 915 provides RDAP query 920 with access token 925 to virtual thick RDAP service 930 that it receives during the authentication and authorization process using RDAP authentication provider 120. Virtual thick RDAP service 930 queries its own data and also determines other RDAP services, such as references to thick RDAD services and IANA registry of gTLD registries, that could be queried to fully satisfy RDAP query 910. Virtual thick RDAP service 930 then provides RDAP response 935 to RDAP client 915. RDAP client 915 presents results page with hyperlinks 955 based on referral URLs it received from virtual thick RDAP service 930. The hyperlinks include access token 925 that was in the referral URL. RDAP user 905 initiates a search 960 against the referral RDAP services using the hyperlinks off the thin results page. Access token 925 in the hyperlinks is passed on to the queried RDAP services. RDAP client 915 provides initiates RDAP query 940 based on the search 960 along with access token 925 to RDAP service specified in referral 945 and returns RDAP response 950. RDAP client 915 then returns the RDAP results 965 to RDAP user 905.

FIG. 10 shows a RDAP resolution process using a RDAP authentication and authorization service 1000, according to examples of the present disclosure. RDAP authentication and authorization service determines the access level to grant to an RDAP client based on an identity associated with it and authorizations granted to that identity. Example access levels include the following: minimal, for unauthenticated clients, that provides privacy shield against unknown entities mining RDAP services; medium, equivalent to thick WHOIS, for authenticated clients not associated with an organization that has been granted privileged access; and privileged, can penetrate past privacy services, which is for authenticated clients that are associated with an organization that has been granted privileged access. Medium and privileged access could require a trust relationship between authorization service and IDP. RDAP user 1005 initiates a RDAP query 1010 using a user agent in the form of a web browser 1015 on a client computer 1020. Web browser 1015 is then redirected 1025 to OpenID Connect service 1030. OpenID Connect service 1030 authenticates RDAP client 1005 and generates an OAuth authentication token 1035 and access token 1040 and returns them 1045 to RDAP client 1050. RDAP client 1050 initiates RDAP query 1055 including access token 1040 to RDAP service 1060. RDAP service 1060 includes RDAP REST services 1065 that interfaces with RDAP client 1050 and trust store 1070 that stores access permissions for one or more RDAP users 1005. RDAP service 1060 determines access levels based on issuer of access token 1040. RDAP service 1060 returns, via RDAP REST services 1065, query results 1075 to RDAP client 1050 that are constrained based on access level of access token 1040. RDAP client 1050 then returns the query result to RDAP user 1005.

FIG. 11 shows another RDAP resolution process using an RDAP authentication and authorization service 1100, according to examples of the present disclosure. RDAP user 1105 initiates a RDAP query 1110 using a user agent in the form of a web browser 1115 on a client computer 1120. Web browser 1115 is then redirected 1125 to trusted identity provider (“IDP”) 1130, which is a service that authenticates a client via a user interaction, for authentication. IDP 1130 may be defaulted or the user agent may select IDP 1130. The user agent informs the IDP 1130 that the RDAP authorization service 1135 is the audience for authentication token 1140 to be produced. IDP 1130 digitally signs authentication token 1140 and provides it to the user agent or RDAP authorization service 1135. Authentication token 1140 can include a claim that specifies RDAP authorization service 1135 as the audience for authentication token 1140. SAML authentication assertions from Active Directory/lightweight directory access protocol (“LDAP”) and JSON web tokens (“JWT tokens”) from OpenID Connect can be used. OAuth 2 authorization are based on one or more of the following elements: (1) is RDAP client authenticated?; (2) is RDAP client pre-registered with RDAP authorization services?: (3) authenticated subject's organizational affiliation; and (4) other claims found in authentication token 1140. RDAP authorization service 1135 provides OAuth 2 access token 1145 to RDAP web client 1050. OAuth 2 access token 1145 is provided by RDAP web client 1150 in interactions with RDAP REST service 1155. RDAP REST service 1155 provides access defined by the claims due to the trust in RDAP authorization service 1135 that digitally signed access token 1145. RDAP query results 1165 are provided to RDAP user 1105 by RDAP web client 1150.

FIG. 12 shows a trust relation between RDAP entities using a second RDAP service 1200, according to examples of the present disclosure. RDAP client 1205 receives access token 1210 from authorization service 1215 trusted by virtual thick RDAP service 1220. RDAP client 1205 uses access token 1210 when interacting with virtual thick RDAP service 1220. Virtual thick RDAP service 1220 provides access token 1210 when making a request to second RDAP service 1225. Second RDAP service 1225 trusts access token 1210 because it has a trust relationship with authorization service 1215.

FIG. 13 shows a process flow between RDAP entities 1300, according to examples of the present disclosure. At 1325, RDAP service 1315 determines and provides an OpenID Connect provider to client 1310. At 1330, RDAP service 1315 provides a redirect for OpenID Connect provider with a client ID to user agent 1305. User agent 1305 provides an authorization/authentication request with the client ID to OpenID Connect provider 1320, where OpenID Connect provider 1320 verifies the client ID at 1340. At 1345, OpenID Connect provider 1320 provides user authentication 1345 to user agent 1305. At 1350, OpenID Connect provider 1320 performs a lookup client endpoint URL based on the client ID and issues an access token. At 1355, OpenID Connect provider 1320 provides a redirect, authentication token, and access token for client 1310 to user agent 1305. At 1360, user agent 1305 provides authentication token and access token to client 1310. At 1365, client 1310 initiates a RDAP query with the access token to RDAP service 1315. At 1370, RDAP service 1315 provides a RDAP response to client 1310.

FIG. 14A shows a process where a user agent is redirected to IDP for authentication 1400, according to examples of the present disclosure. RDAP user 1405 initiates a RDAP query with user agent 1410, such as a web browser, on client computer 1415. User agent 1410 is redirected to IDP 1420 so that RDAP user 1405 can authenticate RDAP web client 1440. IDP 1420 generates authentication token 1425, which is included in a request to RDAP authorization service 1430, either via a redirect or by RDAP web client 1440. RDAP web client 1440 provides authentication token 1425 to RDAP authorization service 1430 and receives access token 1435. RDAP web client 1440 then provides access token 1435 to user agent 1410.

FIG. 14B shows a process where RDAP client authenticates directly with IDP 1450, according to examples of the present disclosure. RDAP user 1405 initiates a RDAP query with RDAP client 1445, which has RDAP user 1405 authenticate with a trusted identify provider, such as IDP 140. IDP 1420 generates and provides authentication token 1425 to RDAP client 1445. Authentication token 1425 is included in a request to RDAP authorization service 1430. RDAP authorization service 1430 returns OAuth 2 access token 1435 to RDAP client 1445.

FIG. 15 shows a RDAP authentication process where the RDAP service is the identity provider 1500, according to examples of the present disclosure. RDAP user 1505 communicates with user agent 1510 to establish account with RDAP service 1515. When RDAP client 1520 connects, authorization service 1525 redirects to identify provider 1530. Identify provider 1530 authenticates RDAP user 1505 and redirects back to authorization service 1525 providing it authentication token 1520. Authorization service 1525 evaluates authentication token 1535 and issues access token 1535 to RDAP client 520.

FIG. 16 shows a RDAP authentication process using a general identity provider 1600, such as a public identity provider, according to examples of the present disclosure. RDAP user 1605 communicates with public identity provider 1610 to establish an account. RDAP user 1605 chooses to authenticate with identity provider 1610. User agent 1615 is then redirected to identity provider 1610 which authenticates RDAP user 1605. RDAP service 1640 includes authorization service 1625 and RDAP client 1630. Identity provider 1610 redirects to authentication service 1605 and provides authentication token 1620. Authorization service 1625 redirects to RDAP client 1630 and provides access token 1635.

FIG. 17 shows a RDAP authentication process where an organizational identity provider is the identity provider 1700, according to examples of the present disclosure. Organization 1705 includes RDAP user 1710, organization's identity provider 1715, and user agent 1720. RDAP service 1725 includes RDAP client 1730 and authorization service 1735. RDAP user 1710 has an account with organization's identity provider 1715. RDAP user 1710 is identified as a member of organization 1705. User agent 1720 is redirected to identity provider 1715 which authenticates RDAP user 1710. Identity provider 1715 redirects to authorization service 1735 and provides authentication token 1740. Authorization service 1735 redirects RDAP client 1730 and provides access token 1745.

FIG. 18 shows an IDP selection process 1800, according to examples of the present disclosure. An out-of-band administrative process is used to configure IDP list 1805 of known IDPs for RDAP client 1810. When RDAP client 1810 is initiated, it allows RDAP user 1815 to initiate client authentication, at which time it allows RDAP user 1815 to select an IDP from IDP list 1805. RDAP client 1810 redirects to selected IDP 1820, which authenticates RDAP user 1815. In some examples, RDAP client can filter IDP list 1805 based on information it knows or can infer about RDAP user 1815.

FIG. 19 shows another IDP selection process 1900, according to examples of the present disclosure. An out-of-band administrative process is used to make one or more IDPs discoverable via discovery service 1905. DNS-SID and Webfinger are discovery protocols that could be used to discover IDPs. When RDAP client 1910 is initiated, environmental information, such as a DHCP supplied DNS search list, tells it the location of discovery service 1905. RDAP client 1910 queries discovery service 1905 for IDPs and receives back a list 1915 on IDPs known to discovery service 1905. RDAP client 1910 allows RDAP user 1920 to select an IDP if more than one has been discovered. RDAP client redirects to selected IDP 1925 which authenticates RDAP user 1920.

FIG. 20 shows yet another IDP selection process 2000, according to examples of the present disclosure. An out-of-band administrative process is used by RDAP user 2005 to configure their preferred IDP. When RDAP client 2010 is initiated, it determines the IDP for RDAP user 2005 using IDP association list 2015, either through inferences or by prompting RDAP user 2005 for their identity and looking up the IDP that corresponds to that identity. RDAP client 2010 redirects to selected IDP 2020 which authenticates RDAP user 2005. In some examples, RDAP client 2010 can filter the IDP list based on information it knows or can infer about RDAP user 2005.

FIG. 21 illustrates an example of a hardware configuration for computer device 2100 that can be used as mobile device or server, which can be used to perform one or more of the processes described above. While FIG. 21 illustrates various components contained in computer device 2100, FIG. 21 illustrates one example of a computer device and additional components can be added and existing components can be removed.

Computer device 2100 can be any type of computer devices, such as desktops, laptops, servers, DNS server, etc., or mobile devices, such as smart telephones, tablet computers, cellular telephones, personal digital assistants, etc. As illustrated in FIG. 21, computer device 2100 can include one or more processors 2102 of varying core configurations and clock frequencies. Computer device 2100 can also include one or more memory devices 2104 that serve as a main memory during the operation of computer device 2100. For example, during operation, a copy of the software that supports the DNS operations can be stored in one or more memory devices 2104. Computer device 2100 can also include one or more peripheral interfaces 2106, such as keyboards, mice, touchpads, computer screens, touchscreens, etc., for enabling human interaction with and manipulation of computer device 2100.

The computer device 2100 can also include one or more network interfaces 2108 for communicating via one or more networks, such as Ethernet adapters, wireless transceivers, or serial network components, for communicating over wired or wireless media using protocols. The computer device 2100 can also include one or more storage device 2110 of varying physical dimensions and storage capacities, such as flash drives, hard drives, random access memory, etc., for storing data, such as images, files, and program instructions for execution by one or more processors 2102.

Additionally, computer device 2100 can include one or more software programs 2112 that enable the functionality described above. One or more software programs 2112 can include instructions that cause one or more processors 2102 to perform the processes described herein. Copies of one or more software programs 2112 can be stored in one or more memory devices 2104 and/or on in one or more storage devices 2110. Likewise, the data, for example, the DNS registry data, DNS registrar data, authentication and/or authorization data utilized by one or more software programs 2112 can be stored in one or more memory devices 2104 and/or on in one or more storage devices 2110.

In implementations, computer device 2100 can communicate with other devices via network 2116. The other devices can be any types of devices as described above. Network 2116 can be any type of electronic network, such as a local area network, a wide-area network, a virtual private network, the Internet, an intranet, an extranet, a public switched telephone network, an infrared network, a wireless network, and any combination thereof. Network 2116 can support communications using any of a variety of commercially-available protocols, such as TCP/IP, UDP, OSI, FTP, UPnP, NFS, CIFS, AppleTalk, and the like. Network 2116 can be, for example, a local area network, a wide-area network, a virtual private network, the Internet, an intranet, an extranet, a public switched telephone network, an infrared network, a wireless network, and any combination thereof.

Computer device 2100 can include a variety of data stores and other memory and storage media as discussed above. These can reside in a variety of locations, such as on a storage medium local to (and/or resident in) one or more of the computers or remote from any or all of the computers across the network. In some implementations, information can reside in a storage-area network (“SAN”) familiar to those skilled in the art. Similarly, any necessary files for performing the functions attributed to the computers, servers, or other network devices may be stored locally and/or remotely, as appropriate.

In implementations, the components of computer device 2100 as described above need not be enclosed within a single enclosure or even located in close proximity to one another. Those skilled in the art will appreciate that the above-described componentry are examples only, as computer device 2100 can include any type of hardware componentry, including any necessary accompanying firmware or software, for performing the disclosed implementations. Computer device 2100 can also be implemented in part or in whole by electronic circuit components or processors, such as application-specific integrated circuits (ASICs) or field-programmable gate arrays (FPGAs).

If implemented in software, the functions can be stored on or transmitted over a computer-readable medium as one or more instructions or code. Computer-readable media includes both tangible, non-transitory computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media can be any available tangible, non-transitory media that can be accessed by a computer. By way of example, and not limitation, such tangible, non-transitory computer-readable media can comprise RAM, ROM, flash memory, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk and disc, as used herein, includes CD, laser disc, optical disc, DVD, floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Combinations of the above should also be included within the scope of computer-readable media.

The foregoing description is illustrative, and variations in configuration and implementation can occur to persons skilled in the art. For instance, the various illustrative logics, logical blocks, modules, and circuits described in connection with the embodiments disclosed herein can be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor can be a microprocessor, but, in the alternative, the processor can be any conventional processor, controller, microcontroller, or state machine. A processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.

In one or more exemplary embodiments, the functions described can be implemented in hardware, software, firmware, or any combination thereof. For a software implementation, the techniques described herein can be implemented with modules (e.g., procedures, functions, subprograms, programs, routines, subroutines, modules, software packages, classes, and so on) that perform the functions described herein. A module can be coupled to another module or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, or the like can be passed, forwarded, or transmitted using any suitable means including memory sharing, message passing, token passing, network transmission, and the like. The software codes can be stored in memory units and executed by processors. The memory unit can be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means as is known in the art.

While the teachings have been described with reference to examples of the implementations thereof, those skilled in the art will be able to make various modifications to the described implementations without departing from the true spirit and scope. The terms and descriptions used herein are set forth by way of illustration only and are not meant as limitations. In particular, although the processes have been described by examples, the stages of the processes can be performed in a different order than illustrated or simultaneously. Furthermore, to the extent that the terms “including”, “includes”, “having”, “has”, “with”, or variants thereof are used in the detailed description, such terms are intended to be inclusive in a manner similar to the term “comprising.” As used herein, the terms “one or more of” and “at least one of” with respect to a listing of items such as, for example, A and B, means A alone, B alone, or A and B. Further, unless specified otherwise, the term “set” should be interpreted as “one or more.” Also, the term “couple” or “couples” is intended to mean either an indirect or direct connection. Thus, if a first device couples to a second device, that connection can be through a direct connection, or through an indirect connection via other devices, components, and connections.

Those skilled in the art will be able to make various modifications to the described embodiments without departing from the true spirit and scope. The terms and descriptions used herein are set forth by way of illustration only and are not meant as limitations. In particular, although the method has been described by examples, the steps of the method can be performed in a different order than illustrated or simultaneously. Those skilled in the art will recognize that these and other variations are possible within the spirit and scope as defined in the following claims and their equivalents.

The foregoing description of the disclosure, along with its associated embodiments, has been presented for purposes of illustration only. It is not exhaustive and does not limit the disclosure to the precise form disclosed. Those skilled in the art will appreciate from the foregoing description that modifications and variations are possible in light of the above teachings or may be acquired from practicing the disclosure. For example, the steps described need not be performed in the same sequence discussed or with the same degree of separation. Likewise various steps may be omitted, repeated, or combined, as necessary, to achieve the same or similar objectives. Similarly, the systems described need not necessarily include all parts described in the embodiments, and may also include other parts not describe in the embodiments.

Accordingly, the disclosure is not limited to the above-described embodiments, but instead is defined by the appended claims in light of their full scope of equivalents. 

What is claimed is:
 1. A method for providing a response to a user query for a domain-related information of a domain, the method comprising: obtaining, at a client over a network, the user query for the domain-related information; identifying one or more thick services based on thin data for the domain, wherein the thin data is locally stored thin data at the client; providing, by the client, the user query to the identified one or more thick services; obtaining a first answer to the user query from the one or more thick services; and providing a second answer to a user based on the first answer.
 2. The method of claim 1, further comprising determining, by the client, that the domain-related information cannot be retrieved from a local storage of the client.
 3. The method of claim 1, wherein the client is not authoritative for the domain-related information.
 4. The method of claim 1, wherein the client comprises an RDAP client, wherein the domain-related information comprises RDAP data, wherein the one or more thick services comprise one or more thick RDAP services, and wherein the thin data comprises thin RDAP data.
 5. The method of claim 4, wherein the one or more thick RDAP services comprise a RDAP bootstrap service, a registry RDAP service, a registrar information RDAP service, and a registrar RDAP service.
 6. The method of claim 1, further comprising authorizing the user prior to providing the second answer.
 7. The method of claim 6, wherein the authorizing the user is based on an identified jurisdiction.
 8. The method of claim 7, wherein the authorizing the user comprises determining at least one or more of a locality of the user, a nationality of the user, and/or a location of the one or more thick services.
 9. The method of claim 6, wherein the authorizing the user is based on authenticating the user.
 10. The method of claim 6, wherein a type of information provided in the second answer is based on the authorizing the user and a jurisdiction policy.
 11. The method of claim 1, wherein a token is received from an authorization service or an authentication service to authorize the user to receive the answer or authenticate the user.
 12. The method of claim 1, wherein the second answer provided to the user comprises first answers consolidated from the one or more thick services.
 13. One or more non-transitory computer-readable media for providing a response to a user query for a domain-related information of a domain, the one or more non-transitory computer-readable media comprising instructions, that in response to execution by a processor, cause the processor to perform operations comprising: obtaining, at a client over a network, the user query for the domain-related information; identifying one or more thick services based on thin data for the domain, wherein the thin data is locally stored thin data at the client; providing, by the client, the user query to the identified one or more thick services; obtaining a first answer to the user query from the one or more thick services; and providing a second answer to a user based on the first answer.
 14. The one or more non-transitory computer-readable media of claim 13, wherein the operations further comprise authorizing the user prior to providing the second answer.
 15. The one or more non-transitory computer-readable media of claim 14, wherein the authorizing the user is based on an identified jurisdiction.
 16. The one or more non-transitory computer-readable media of claim 15, wherein the authorizing the user comprises determining at least one or more of a locality of the user, a nationality of the user, and/or a location of the one or more thick services.
 17. The one or more non-transitory computer-readable media of claim 14, wherein the authorizing the user is based on authenticating the user.
 18. The one or more non-transitory computer-readable media of claim 14, wherein a type of information provided in the second answer is based on the authorizing the user and a jurisdiction policy.
 19. The one or more non-transitory computer-readable media of claim 13, wherein a token is received from an authorization service or an authentication service to authorize the user to receive the answer or authenticate the user. 