Patents by Inventor John Mears
John Mears has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12381838Abstract: A computer-implemented method includes sending email scan requests to an email scanner. The method further includes receiving, from the email scanner, a verdict of suspicion and one or more data fragments. The method further includes storing the one or more data fragments for each email of the plurality of emails in a datastore. The method further includes receiving a new email. The method further includes deriving one or more new keys for the new email. The method further includes retrieving one or more matching data fragments from the datastore by matching the one or more new keys with the one or more keys stored in the datastore. The method further includes providing, to the email scanner, the new email and the one or more matching data fragments. The method further includes receiving a new verdict of suspicion and one or more new data fragments.Type: GrantFiled: April 27, 2023Date of Patent: August 5, 2025Assignee: SOPHOS LIMITEDInventor: John Mears
-
Publication number: 20250148074Abstract: A computer-implemented method includes receiving an email for processing. The method further includes prior to delivering the email, providing the email to a set of scanners, wherein one or more of the scanners are associated with a respective type of content and are configured to detect whether the email includes the respective type of content. The method further includes receiving, from the set of scanners, an identification of a plurality of types of content in the email. The method further includes for each type of content in the email providing the email to a user of a particular role, wherein users of the particular role are authorized to review the type of content and receiving, from the user, approval of the email for the type of content. The method further includes responsive to the email being approved for each type of content, delivering the email to a recipient.Type: ApplicationFiled: November 7, 2023Publication date: May 8, 2025Applicant: SOPHOS LIMITEDInventors: John Mears, Balakrishnan Rajkumar
-
Publication number: 20250071124Abstract: Systems and methods for processing an electronic communication. The method may include receiving an electronic message including a first location indicator of a network resource, wherein the first location indicator has a first length and includes an identifier of a recipient of the electronic message, wherein the identifier indicates an action allowed to be performed by the recipient, and transforming the first location indicator into a second location indicator of the network resource, wherein the second location indicator has a second length that is less than the first length. The method may further include storing the first location indicator in a network accessible storage location and forwarding the second location indicator of the resource to a recipient to allow the recipient to automatically access the network resource and perform the allowed action upon providing an input with respect to the second location indicator.Type: ApplicationFiled: August 22, 2023Publication date: February 27, 2025Inventors: NarendraKumar Shah, Deepak Kharpuriya, John Mears
-
Patent number: 12238121Abstract: A computer-implemented method includes generating behavior patterns based on historical behavior of a plurality of emails. The method further includes receiving an email message from a sender, wherein the email message is withheld from delivery to a recipient. The method further includes extracting a plurality of features from the email message. The method further includes determining whether content of the email message matches at least one criterion for suspicious content. The method further includes determining a reputation score associated with the sender based on a comparison of the extracted features with the behavior patterns, wherein the extracted features include an identity of the sender. The method further includes responsive to the content of the email message not matching the at least one criterion for suspicious content and the reputation score meeting a reputation threshold, delivering the email message to the recipient.Type: GrantFiled: March 30, 2022Date of Patent: February 25, 2025Assignee: Sophos LimitedInventor: John Mears
-
Publication number: 20240364651Abstract: A computer-implemented method includes sending email scan requests to an email scanner. The method further includes receiving, from the email scanner, a verdict of suspicion and one or more data fragments. The method further includes storing the one or more data fragments for each email of the plurality of emails in a datastore. The method further includes receiving a new email. The method further includes deriving one or more new keys for the new email. The method further includes retrieving one or more matching data fragments from the datastore by matching the one or more new keys with the one or more keys stored in the datastore. The method further includes providing, to the email scanner, the new email and the one or more matching data fragments. The method further includes receiving a new verdict of suspicion and one or more new data fragments.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Applicant: SOPHOS LIMITEDInventor: John Mears
-
Publication number: 20240291789Abstract: Remote services, such as security services, are onboarded for a tenant in a multi-tenant environment, such as a cloud-based electronic mail tenant, by configuring the tenant to permit remote access to local resources used at the tenant to facilitate the remote security services. As a significant advantage, this permits use of the remote security services with cloud-based enterprise resources hosted on the tenant, e.g., an enterprise mail server handling inbound and/or outbound electronic mail traffic, without requiring changes to the tenant's network configuration. As an additional advantage, security risks associated with the remote access may be confined to the specific tenant in the multi-tenant environment by creating a unique key for exchanging data between the tenant and the remote security services.Type: ApplicationFiled: November 22, 2023Publication date: August 29, 2024Inventors: Vivek Rudraduttbhai Yagnik, John Mears
-
Publication number: 20240291839Abstract: Remote services, such as security services, are onboarded for a tenant in a multi-tenant environment, such as a cloud-based electronic mail tenant, by configuring the tenant to permit remote access to local resources used at the tenant to facilitate the remote security services. Mail flow rules associated with the multi-tenant environment govern how electronic mail is handled in the environment. For example, mail flow rules may be used to divert inbound and/or outbound electronic mail through a mail security service. Changes to the mail flow rules are monitored and analyzed to determine whether such changes are valid (e.g., not unsafe or tampered with) to support secure management of electronic mail traffic. If a change to a mail flow rule is determined to not be valid, an action may be performed, such as deleting, disabling, or reverting the change.Type: ApplicationFiled: November 22, 2023Publication date: August 29, 2024Inventors: Vivek Rudraduttbhai Yagnik, John Mears, Rakesh Ghanshyamgiri Gauswami, Vishal Revabhai Prajapati
-
Patent number: 11916858Abstract: A method for mitigating outbound electronic message spam includes determining whether an outbound electronic message to a recipient sent from an electronic messaging account of a sender has at least a predetermined number of indicators of compromise. The outbound electronic message is sent to the recipient using an IP address from a first pool of service delivery IP addresses based on a determination that the message has less than the predetermined number of indicators of compromise. The outbound electronic message is sent to the recipient using an IP address from a second pool of service delivery IP addresses based on a determination that the message has at least the predetermined number of indicators of compromise. The method may further include providing a notification of a possible compromise of the electronic messaging account and the notification may include a request to modify a security feature of the electronic messaging account.Type: GrantFiled: September 30, 2022Date of Patent: February 27, 2024Assignee: Sophos LimitedInventors: John Mears, Brett Hunter Cove
-
Publication number: 20230319065Abstract: A computer-implemented method includes generating behavior patterns based on historical behavior of a plurality of emails. The method further includes receiving an email message from a sender, wherein the email message is withheld from delivery to a recipient. The method further includes extracting a plurality of features from the email message. The method further includes determining whether content of the email message matches at least one criterion for suspicious content. The method further includes determining a reputation score associated with the sender based on a comparison of the extracted features with the behavior patterns, wherein the extracted features include an identity of the sender. The method further includes responsive to the content of the email message not matching the at least one criterion for suspicious content and the reputation score meeting a reputation threshold, delivering the email message to the recipient.Type: ApplicationFiled: March 30, 2022Publication date: October 5, 2023Applicant: SOPHOS LIMITEDInventor: John Mears
-
Patent number: 11356494Abstract: A technique implements an administrative user interface of a backend service used to manage and administer on-premises resources, such as storage nodes of a cluster, within a private customer network. The backend service includes a browser configured to issue cross-origin resource sharing (CORS) requests among target storage nodes and a publicly-hosted web application on remote computing systems accessed via a public computer network (i.e., internet) that can be loaded on the browser within the customer network to manage and administer the on-prem resources on the private network. The technique involves the use of CORS over HyperText Transfer Protocol to access an origin that is not reachable via the public internet from a predetermined location of the browser, e.g., within the same customer network as the target storage nodes, particularly to facilitate management of the nodes.Type: GrantFiled: April 24, 2020Date of Patent: June 7, 2022Assignee: NetApp, Inc.Inventors: Joseph Ray Thomas, III, John Mears, Nathan Hammernik
-
Publication number: 20210337008Abstract: A technique implements an administrative user interface of a backend service used to manage and administer on-premises resources, such as storage nodes of a cluster, within a private customer network. The backend service includes a browser configured to issue cross-origin resource sharing (CORS) requests among target storage nodes and a publicly-hosted web application on remote computing systems accessed via a public computer network (i.e., internet) that can be loaded on the browser within the customer network to manage and administer the on-prem resources on the private network. The technique involves the use of CORS over HyperText Transfer Protocol to access an origin that is not reachable via the public internet from a predetermined location of the browser, e.g., within the same customer network as the target storage nodes, particularly to facilitate management of the nodes.Type: ApplicationFiled: April 24, 2020Publication date: October 28, 2021Inventors: Joseph Ray Thomas, III, John Mears, Nathan Hammernik
-
Patent number: 11044148Abstract: An optimistic and failsafe technique validates network configurations of storage and compute nodes deployed as a cluster. An optimistic aspect of the technique, saves an initial network configuration state of each node as a “failsafe” state and an expected network end-state is applied to each node. According to a validation aspect of the technique, each node employs a test to validate connectivity with other nodes in the cluster. In response to every validating node responding to a coordinating node that the validation test succeeded, an “all-clear” message is sent to all of the nodes instructing each node to maintain the applied expected network end-state. If any node is unreachable due to a configuration validation failure, then a failsafe aspect of the technique is invoked wherein the all-clear message is not sent and the remaining nodes of the cluster automatically “roll-back” to the initial failsafe network state after a timeout.Type: GrantFiled: May 2, 2019Date of Patent: June 22, 2021Assignee: NetApp, Inc.Inventors: John Allen Patterson, John Mears
-
Publication number: 20200351157Abstract: An optimistic and failsafe technique validates network configurations of storage and compute nodes deployed as a cluster. An optimistic aspect of the technique, saves an initial network configuration state of each node as a “failsafe” state and an expected network end-stale is applied to each node. According to a validation aspect of the technique, each node employs a test to validate connectivity with other nodes in the cluster. In response to every validating node responding to a coordinating node that the validation test succeeded, an “all-clear” message is sent to all of the nodes instructing each node to maintain the applied expected network end-state. If any node is unreachable due to a configuration validation failure, then a failsafe aspect of the technique is invoked wherein the all-clear message is not sent and the remaining nodes of the cluster automatically “roll-hack” to the initial failsafe network state after a timeout.Type: ApplicationFiled: May 2, 2019Publication date: November 5, 2020Inventors: John Allen Patterson, John Mears
-
Patent number: 10450320Abstract: A series of 1,2,6,7,9,9a-hexahydropyrazino[1,2-d][1,2,4]triazin-4-one derivatives, substituted in the 8-position by an optionally substituted fused bicyclic heteroaromatic group, and in the 3-position by a range of functional groups, being selective inhibitors of phosphatidylinositol-4-kinase III? (PI4KIII?) activity, are beneficial in the treatment and/or prevention of various human ailments, including inflammatory, autoimmune and oncological disorders; viral diseases and malaria; and organ and cell transplant rejection.Type: GrantFiled: December 8, 2016Date of Patent: October 22, 2019Assignees: UCB Biopharma SPRL, Katholieke Universiteit Leuven, K.U.Leuven R&DInventors: Helen Tracey Horsley, Richard John Mears, Judi Charlotte Neuss, James Thomas Reuberson
-
Publication number: 20180362532Abstract: A series of 1,2,6,7,9,9a-hexahydropyrazino[1,2-d][1,2,4]triazin-4-one derivatives, substituted in the 8-position by an optionally substituted fused bicyclic heteroaromatic group, and in the 3-position by a range of functional groups, being selective inhibitors of phosphatidylinositol-4-kinase III? (PI4KIII?) activity, are beneficial in the treatment and/or prevention of various human ailments, including inflammatory, autoimmune and oncological disorders; viral diseases and malaria; and organ and cell transplant rejection.Type: ApplicationFiled: December 8, 2016Publication date: December 20, 2018Inventors: Helen Tracey Horsley, Richard John Mears, Judi Charlotte Neuss, James Thomas Reuberson
-
Patent number: 9794258Abstract: Techniques for managing authorization are disclosed. In one embodiment, the techniques may be realized as a method including receiving, from a centralized authorization service, authorization logic for an application; determining the identity of a user; and, based on the identity of the user, authorizing the use of a particular feature of the application using the received authorization logic.Type: GrantFiled: October 31, 2014Date of Patent: October 17, 2017Assignee: Symantec CorporationInventor: John Mears
-
Patent number: 9294511Abstract: Out-of-band notifications are used to inform users of clients of security policy enforcement actions, such as enforcement of a data loss prevention (DLP) policy. Code for instantiating a notification agent at a client used by a user is inserted into network traffic inbound to the client. Outbound network traffic sent from the client to a server is monitored for compliance with one or more security policies. If it is determined that the network traffic violates a security policy, an enforcement action is taken. An out-of-band notification message describing the enforcement action is inserted into a response to the outbound network traffic and sent to the client. The notification agent at the client receives the notification message and presents the message to the user.Type: GrantFiled: August 14, 2014Date of Patent: March 22, 2016Assignee: Symantec CorporationInventors: David Trent McNair, John Mears, David Shapcott
-
Patent number: 9045263Abstract: A child-resistant closure includes a body with a base and a lid, the closure having a locked position in which the lid is held in a closed position and an unlocked position in which the lid is released and can be moved to an open position. The sidewall has one or more pressing pads for moving the closure to the unlocked position. The or each pad is supported on the sidewall by force insulating links which restrict lateral spreading of forces into the sidewall during inward deflection of the pad(s).Type: GrantFiled: May 14, 2012Date of Patent: June 2, 2015Assignee: Obrist Closures Switzerland GmbHInventors: Jamie Fox, Darren John Mears, Stephen Faragher
-
Publication number: 20150082376Abstract: Out-of-band notifications are used to inform users of clients of security policy enforcement actions, such as enforcement of a data loss prevention (DLP) policy. Code for instantiating a notification agent at a client used by a user is inserted into network traffic inbound to the client. Outbound network traffic sent from the client to a server is monitored for compliance with one or more security policies. If it is determined that the network traffic violates a security policy, an enforcement action is taken. An out-of-band notification message describing the enforcement action is inserted into a response to the outbound network traffic and sent to the client. The notification agent at the client receives the notification message and presents the message to the user.Type: ApplicationFiled: August 14, 2014Publication date: March 19, 2015Inventors: David Trent McNair, John Mears, David Shapcott
-
Patent number: 8887291Abstract: A computer-implemented method for data loss prevention for text fields may include (1) identifying a form submission sent from a client system, the form submission including a textual field, (2) storing at least one characteristic of a value of the textual field within the form submission in connection with an identifier of a form used to generate the form submission, (3) determining, based at least in part on the characteristic of the value of the textual field, that the textual field may include user-generated content, (4) intercepting a subsequent form submission derived from the form, (5) subjecting the textual field within the subsequent form submission to a data-loss-prevention analysis based at least in part on determining that the textual field may include user-generated content and (6) performing a data-loss-prevention action based on the data-loss-prevention analysis.Type: GrantFiled: March 1, 2013Date of Patent: November 11, 2014Assignee: Symantec CorporationInventors: John Mears, Ben Scholl