Patents by Inventor David G. Jones

David G. Jones has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10893073
    Abstract: A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world-wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: January 12, 2021
    Assignee: ThreatMETRIX PTY LTD
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 10505932
    Abstract: A method for querying a knowledge base of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a worldwide network of computers. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base, and outputting second information associated with the unknown host based upon the querying process.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: December 10, 2019
    Assignee: THREATMETRIX PTY LTD.
    Inventors: Scott Thomas, David G. Jones
  • Publication number: 20190081987
    Abstract: A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world-wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.
    Type: Application
    Filed: November 15, 2018
    Publication date: March 14, 2019
    Inventors: Scott Thomas, David G. Jones
  • Publication number: 20180343254
    Abstract: A method for querying a knowledge base of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a worldwide network of computers. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base, and outputting second information associated with the unknown host based upon the querying process.
    Type: Application
    Filed: July 13, 2018
    Publication date: November 29, 2018
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 10142369
    Abstract: A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world-wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.
    Type: Grant
    Filed: May 19, 2014
    Date of Patent: November 27, 2018
    Assignee: ThreatMETRIX PTY LTD
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 10027665
    Abstract: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a worldwide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: July 17, 2018
    Assignee: ThreatMetrix PTY LTD.
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 9449168
    Abstract: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a worldwide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.
    Type: Grant
    Filed: June 6, 2014
    Date of Patent: September 20, 2016
    Assignee: THREATMETRIX PTY LTD
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 9444835
    Abstract: A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.
    Type: Grant
    Filed: August 8, 2014
    Date of Patent: September 13, 2016
    Assignee: THREATMETRIX PTY LTD
    Inventors: Scott Thomas, David G. Jones, Alisdair Faulkner
  • Patent number: 9332020
    Abstract: A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.
    Type: Grant
    Filed: April 10, 2012
    Date of Patent: May 3, 2016
    Assignee: ThreatMETRIX PTY LTD
    Inventors: Scott Thomas, David G Jones, Alisdair Faulkner
  • Patent number: 8782783
    Abstract: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.
    Type: Grant
    Filed: February 13, 2012
    Date of Patent: July 15, 2014
    Assignee: Threatmetrix Pty Ltd
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 8763113
    Abstract: A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation.
    Type: Grant
    Filed: October 17, 2006
    Date of Patent: June 24, 2014
    Assignee: Threatmetrix Pty Ltd
    Inventors: Scott Thomas, David G. Jones
  • Publication number: 20130055388
    Abstract: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.
    Type: Application
    Filed: February 13, 2012
    Publication date: February 28, 2013
    Applicant: ThreatMETRIX PTY LTD
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 8176178
    Abstract: A method for tracking machines on a network of computers. The method includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.
    Type: Grant
    Filed: January 29, 2008
    Date of Patent: May 8, 2012
    Assignee: ThreatMETRIX Pty Ltd
    Inventors: Scott Thomas, David G. Jones, Alisdair Faulkner
  • Patent number: 8141148
    Abstract: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.
    Type: Grant
    Filed: October 17, 2006
    Date of Patent: March 20, 2012
    Assignee: ThreatMETRIX Pty Ltd
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 7960563
    Abstract: The present invention relates to novel indazole derivatives having pharmacological activity, processes for their preparation, compositions containing them and uses of these compounds in the treatment of estrogen receptor beta mediated diseases.
    Type: Grant
    Filed: March 5, 2008
    Date of Patent: June 14, 2011
    Assignee: Glaxo Group Limited
    Inventors: Christopher Norbert Johnson, David G Jones, Xi Liang, David Timothy MacPherson, Aaron B Miller, Antoinette Naylor, Steven James Stanway, Andrew Kenneth Takle, Giancarlo Trani
  • Patent number: 7956083
    Abstract: The present invention relates to novel indole derivatives having pharmacological activity, processes for their preparation, compositions containing them and the use of these compounds in the treatment of estrogen receptor beta mediated diseases.
    Type: Grant
    Filed: February 17, 2009
    Date of Patent: June 7, 2011
    Assignee: Glaxo Group Limited
    Inventors: Christopher Norbert Johnson, David G. Jones, Xi Liang, David Timothy MacPherson, Aaron B Miller, Steven James Stanway, Andrew Kenneth Takle, Giancarlo Trani, Antoinette Wilson
  • Publication number: 20100324106
    Abstract: The present invention relates to novel indole derivatives having pharmacological activity, processes for their preparation, compositions containing them and the use of these compounds in the treatment of estrogen receptor beta mediated diseases.
    Type: Application
    Filed: February 17, 2009
    Publication date: December 23, 2010
    Inventors: Christopher Norbert Johnson, David G. Jones, Xi Liang, David Timothy Macpherson, Aaron B. Miller, Steven James Stanway, Andrew Kenneth Takle, Giancarlo Trani, Antoinette Wilson
  • Publication number: 20100087502
    Abstract: The present invention relates to novel indazole derivatives having pharmacological activity, processes for their preparation, compositions containing them and uses of these compounds in the treatment of estrogen receptor beta mediated diseases.
    Type: Application
    Filed: March 5, 2008
    Publication date: April 8, 2010
    Applicant: GLAXO GROUP LIMITED
    Inventors: Christopher Norbert Johnson, David G. Jones, Xi Liang, David Timothy Macpherson, Aaron B. Miller, Antoinette Naylor, Steven James Stanway, Andrew Kenneth Takle, Giancarlo Trani
  • Publication number: 20080244744
    Abstract: A method for tracking machines on a network of computers. The method includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.
    Type: Application
    Filed: January 29, 2008
    Publication date: October 2, 2008
    Applicant: ThreatMETRIX PTY LTD
    Inventors: SCOTT THOMAS, David G. Jones, Alisdair Faulkner
  • Publication number: 20080194536
    Abstract: The present invention relates to a compound represented by the following formula: (I) or a pharmaceutically acceptable salt thereof, or a pharmaceutically acceptable solvate thereof, or a combination thereof, wherein Ro, R1, R1?, R2, R2?, R3 and n are defined herein. The present invention further relates to a method of treating a patient from endometreosis or uterine fibroids.
    Type: Application
    Filed: April 14, 2006
    Publication date: August 14, 2008
    Inventors: Marlys Hammond, David G. Jones, Istvan Kaldor, Lara S. Kallander, Xi Lang, Scott Kevin Thompson, Philip Stewart Turnbull, David G. Washburn