Patents by Inventor David James Mitchell

David James Mitchell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12238065
    Abstract: Systems, methods, and software described herein manage traffic rules in association with fully qualified domain names (FQDNs). In one implementation, a domain name system (DNS) security service obtains a FQDN associated with a DNS request by a computing device. The DNS security service determines a first score for the FQDN based on trust factors associated with the FQDN and determines whether the first score satisfies one or more criteria. When the first score satisfies the one or more criteria, the DNS security service evaluates host posture information associated with an IP address in the DNS response for the FQDN, updates the first score to a second score based on the host posture information, and determines a traffic rule for the FQDN based on the second score.
    Type: Grant
    Filed: March 1, 2022
    Date of Patent: February 25, 2025
    Assignee: HYAS Infosec Inc.
    Inventors: David James Mitchell, Paul Cornelius van Gool
  • Publication number: 20230283591
    Abstract: Systems, methods, and software described herein manage traffic rules in association with fully qualified domain names (FQDNs). In one implementation, a domain name system (DNS) security service obtains a FQDN associated with a DNS request by a computing device. The DNS security service determines a first score for the FQDN based on trust factors associated with the FQDN and determines whether the first score satisfies one or more criteria. When the first score satisfies the one or more criteria, the DNS security service evaluates host posture information associated with an IP address in the DNS response for the FQDN, updates the first score to a second score based on the host posture information, and determines a traffic rule for the FQDN based on the second score.
    Type: Application
    Filed: March 1, 2022
    Publication date: September 7, 2023
    Inventors: David James Mitchell, Paul Cornelius van Gool
  • Patent number: 10972483
    Abstract: Electronic communications passing through a communication gateway or similar device for an enterprise can be monitored for indicators of malicious activity. When potentially malicious activity is identified, a user-based inquiry can be employed to identify potential sources of the malicious activity within the enterprise network. More specifically, by identifying a user that sourced the communication, instead of or in addition to a network address, devices within the enterprise network associated with the user can be located, analyzed, and remediated as appropriate.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: April 6, 2021
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, David James Mitchell, Paul Stuart Murray
  • Patent number: 10868821
    Abstract: Electronic communications passing through a communication gateway or similar device for an enterprise can be monitored for indicators of malicious activity. When potentially malicious activity is identified, a user-based inquiry can be employed to identify potential sources of the malicious activity within the enterprise network. More specifically, by identifying a user that sourced the communication, instead of or in addition to a network address, devices within the enterprise network associated with the user can be located, analyzed, and remediated as appropriate.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: December 15, 2020
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, David James Mitchell, Paul Stuart Murray
  • Publication number: 20190190936
    Abstract: Electronic communications passing through a communication gateway or similar device for an enterprise can be monitored for indicators of malicious activity. When potentially malicious activity is identified, a user-based inquiry can be employed to identify potential sources of the malicious activity within the enterprise network. More specifically, by identifying a user that sourced the communication, instead of or in addition to a network address, devices within the enterprise network associated with the user can be located, analyzed, and remediated as appropriate.
    Type: Application
    Filed: December 20, 2017
    Publication date: June 20, 2019
    Inventors: Andrew J. Thomas, David James Mitchell, Paul Stuart Murray
  • Publication number: 20190190929
    Abstract: Electronic communications passing through a communication gateway or similar device for an enterprise can be monitored for indicators of malicious activity. When potentially malicious activity is identified, a user-based inquiry can be employed to identify potential sources of the malicious activity within the enterprise network. More specifically, by identifying a user that sourced the communication, instead of or in addition to a network address, devices within the enterprise network associated with the user can be located, analyzed, and remediated as appropriate.
    Type: Application
    Filed: December 20, 2017
    Publication date: June 20, 2019
    Inventors: Andrew J. Thomas, David James Mitchell, Paul Stuart Murray
  • Publication number: 20150350229
    Abstract: In an embodiment, a method detects an abuse to a network environment. In the method, real-time name service transaction data to resolve a domain name to a network address is collected from the network environment. Historical name service information for the domain name is retrieved. Transaction information describing data sent between the network environment and the network address is collected. The collected transaction information and the historical name service information is analyzed against at least one rule. When the collected transaction information and the historical name service information are determined to match at least one rule, the network address is determined to be is associated with a potential abuser of the network environment.
    Type: Application
    Filed: July 17, 2015
    Publication date: December 3, 2015
    Inventor: David James Mitchell
  • Patent number: 8881281
    Abstract: In an embodiment, a computer-implemented method detects a network or application abuse to a service provider environment. In the method, data is collected describing incoming requests from plurality of different external source addresses to the service provider environment. The collected data is used to compare the incoming requests against a heuristic. When the incoming requests are determined to match the heuristic, the requests, having the plurality of different external source addresses, are from a common abuse entity. Finally, the collected data is evaluated to determine that the common abuse entity is a potential network abuser of the service provider environment.
    Type: Grant
    Filed: May 29, 2014
    Date of Patent: November 4, 2014
    Assignee: Singularity Networks, Inc.
    Inventor: David James Mitchell
  • Patent number: 7018641
    Abstract: The subject invention provides compositions useful for the control of plant pathogens. Specifically exemplified are essential oil compositions which are effective in the control of fungal and bacterial plant pathogens.
    Type: Grant
    Filed: August 9, 2001
    Date of Patent: March 28, 2006
    Assignee: University of Florida
    Inventors: Timur Mehmet Momol, David James Mitchell, Steve M. Olson, Esengul A. Momol
  • Publication number: 20010033503
    Abstract: A DC-DC converter is configured as a constant current source to drive an LED load. This circuit configuration draws constant power from the input supply and delivers a constant current to the light source. A wide range of output voltages can be supported due to the implementation of current feedback for closed loop control. This allows for a selectable number of LED's to be powered simultaneously in a series configuration. Exceptional battery life is achieved due to the constant power discharge mode achieved with constant current feedback control. LED's powered at a constant current maintain a constant brightness level throughout the life of the battery.
    Type: Application
    Filed: March 9, 2001
    Publication date: October 25, 2001
    Inventors: Charles Henry Hamp, David James Mitchell
  • Patent number: D400414
    Type: Grant
    Filed: February 18, 1997
    Date of Patent: November 3, 1998
    Assignee: ABW Australia Pty, Ltd.
    Inventors: Mark Stephen Wilson, David James Mitchell