Patents by Inventor Magnus Stensmo
Magnus Stensmo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
System, method, and computer program product for detecting and assessing security risks in a network
Patent number: 10803183Abstract: The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A behavior model is built for a user in the network based on the user's interactions with the network, wherein a behavior model for a user indicates client device(s), server(s), and resources used by the user. The user's behavior during a period of time is compared to the user's behavior model. A risk assessment is calculated for the period of time based at least in part on the comparison between the user's behavior and the user's behavior model, wherein any one of certain anomalies between the user's behavior and the user's behavior model increase the risk assessment.Type: GrantFiled: October 18, 2019Date of Patent: October 13, 2020Assignee: Exabeam, Inc.Inventors: Sylvain Gil, Domingo Mihovilovic, Nir Polak, Magnus Stensmo, Sing Yip -
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETECTING AND ASSESSING SECURITY RISKS IN A NETWORK
Publication number: 20200082098Abstract: The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A behavior model is built for a user in the network based on the user's interactions with the network, wherein a behavior model for a user indicates client device(s), server(s), and resources used by the user. The user's behavior during a period of time is compared to the user's behavior model. A risk assessment is calculated for the period of time based at least in part on the comparison between the user's behavior and the user's behavior model, wherein any one of certain anomalies between the user's behavior and the user's behavior model increase the risk assessment.Type: ApplicationFiled: October 18, 2019Publication date: March 12, 2020Inventors: Sylvain Gil, Domingo Mihovilovic, Nir Polak, Magnus Stensmo, Sing Yip -
Patent number: 10580056Abstract: In some embodiments, a method comprises receiving at least two parameters for a gift exchange from an organizer of the gift exchange. The at least two parameters can comprise a set of participants and a budget. The method further comprises identifying a gift exchange recipient for a respective participant in the set of participants, determining one or more gifts for the gift exchange recipient based at least in part on the budget and a first trust graph, and arranging for display the one or more determined gifts to the respective participant. In many embodiments, the first trust comprises levels of trust associated with the gift exchange recipient. Other embodiments also are disclosed herein.Type: GrantFiled: March 30, 2015Date of Patent: March 3, 2020Assignee: WALMART APOLLO, LLCInventors: Nathan Stoll, Jan Magnus Stensmo, Andrew Mark Ellerhorst, Abhishek Banerjee
-
System, method, and computer program product for detecting and assessing security risks in a network
Patent number: 10474828Abstract: The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A behavior model is built for a user in the network based on the user's interactions with the network, wherein a behavior model for a user indicates client device(s), server(s), and resources used by the user. The user's behavior during a period of time is compared to the user's behavior model. A risk assessment is calculated for the period of time based at least in part on the comparison between the user's behavior and the user's behavior model, wherein any one of certain anomalies between the user's behavior and the user's behavior model increase the risk assessment.Type: GrantFiled: October 3, 2018Date of Patent: November 12, 2019Assignee: Exabeam, Inc.Inventors: Sylvain Gil, Domingo Mihovilovic, Nir Polak, Magnus Stensmo, Sing Yip -
Patent number: 10210559Abstract: Various embodiments of systems and methods for recommendation scraping include a method comprising receiving a content feed, wherein the content feed is associated with a holder and identifying at least one post within the content feed comprising a mention of a respective item. In many embodiments, the method can further comprise generating an item recommendation corresponding to the respective item, associating the item recommendation with a profile associated with the holder, and sending instructions to present the item recommendation to one or more users. Other embodiments are also disclosed herein.Type: GrantFiled: March 30, 2015Date of Patent: February 19, 2019Assignee: WALMART APOLLO, LLCInventors: Nathan Stoll, Jan Magnus Stensmo, Stuart Payton Robinson, Andrew Mark Ellerhorst
-
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETECTING AND ASSESSING SECURITY RISKS IN A NETWORK
Publication number: 20190034641Abstract: The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A behavior model is built for a user in the network based on the user's interactions with the network, wherein a behavior model for a user indicates client device(s), server(s), and resources used by the user. The user's behavior during a period of time is compared to the user's behavior model. A risk assessment is calculated for the period of time based at least in part on the comparison between the user's behavior and the user's behavior model, wherein any one of certain anomalies between the user's behavior and the user's behavior model increase the risk assessment.Type: ApplicationFiled: October 3, 2018Publication date: January 31, 2019Inventors: Sylvain Gil, Domingo Mihovilovic, Nir Polak, Magnus Stensmo, Sing Yip -
Patent number: 10181147Abstract: In some embodiments of methods and systems of purchasing products via a subscription mechanism, a method comprises, presenting a subscription mechanism corresponding to a first user, wherein the subscription mechanism is associated with a set of products. In many embodiments, the method further comprises receiving a notification from a second user selecting the subscription mechanism corresponding to the first user, determining that one or more conditions are satisfied, and causing at least a portion of the set of products associated with the subscription mechanism to be purchased by the second user. Other embodiments also are disclosed herein.Type: GrantFiled: March 30, 2015Date of Patent: January 15, 2019Assignee: WALMART APOLLO, LLCInventors: Nathan Stoll, Jan Magnus Stensmo, Andrew Mark Ellerhorst
-
System, method, and computer program product for detecting and assessing security risks in a network
Patent number: 10095871Abstract: The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A behavior model is built for a user in the network based on the user's interactions with the network, wherein a behavior model for a user indicates client device(s), server(s), and resources used by the user. The user's behavior during a period of time is compared to the user's behavior model. A risk assessment is calculated for the period of time based at least in part on the comparison between the user's behavior and the user's behavior model, wherein any one of certain anomalies between the user's behavior and the user's behavior model increase the risk assessment.Type: GrantFiled: September 19, 2017Date of Patent: October 9, 2018Assignee: Exabeam, Inc.Inventors: Sylvain Gil, Domingo Mihovilovic, Nir Polak, Magnus Stensmo, Sing Yip -
Patent number: 9875483Abstract: In accordance with some implementations, a method for responding to requests submitted through a conversational interface is disclosed. The method is performed on a server system having one or more processors and memory storing one or more programs for execution by the one or more processors. The server system receives a request from a user through a conversational interface. The server system determines, based on the request, whether the system is able to fulfill the request automatically. In accordance with a determination that the system is able to fulfill the request automatically, the server system fulfills the user request with no human interaction. In accordance with a determination that the system is not able to fulfill the request without human intervention, the server system sends the request to a human operator for fulfillment.Type: GrantFiled: May 16, 2013Date of Patent: January 23, 2018Assignee: WAL-MART STORES, INC.Inventors: Nathan Stoll, Jan Magnus Stensmo, Stuart Robinson
-
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETECTING AND ASSESSING SECURITY RISKS IN A NETWORK
Publication number: 20180004961Abstract: The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A behavior model is built for a user in the network based on the user's interactions with the network, wherein a behavior model for a user indicates client device(s), server(s), and resources used by the user. The user's behavior during a period of time is compared to the user's behavior model. A risk assessment is calculated for the period of time based at least in part on the comparison between the user's behavior and the user's behavior model, wherein any one of certain anomalies between the user's behavior and the user's behavior model increase the risk assessment.Type: ApplicationFiled: September 19, 2017Publication date: January 4, 2018Inventors: Sylvain Gil, Domingo Mihovilovic, Nir Polak, Magnus Stensmo, Sing Yip -
System, method, and computer program product for detecting and assessing security risks in a network
Patent number: 9798883Abstract: The present disclosure is directed to a system, method, and computer program for detecting and assessing security risks in an enterprise's computer network. A behavior model is built for a user in the network based on the user's interactions with the network, wherein a behavior model for a user indicates client device(s), server(s), and resources used by the user. The user's behavior during a period of time is compared to the user's behavior model. A risk assessment is calculated for the period of time based at least in part on the comparison between the user's behavior and the user's behavior model, wherein any one of certain anomalies between the user's behavior and the user's behavior model increase the risk assessment.Type: GrantFiled: October 6, 2014Date of Patent: October 24, 2017Assignee: Exabeam, Inc.Inventors: Sylvain Gil, Domingo Mihovilovic, Nir Polak, Magnus Stensmo, Sing Yip -
Publication number: 20150278916Abstract: Various embodiments of systems and methods for recommendation scraping include a method comprising receiving a content feed, wherein the content feed is associated with a holder and identifying at least one post within the content feed comprising a mention of a respective item. In many embodiments, the method can further comprise generating an item recommendation corresponding to the respective item, associating the item recommendation with a profile associated with the holder, and sending instructions to present the item recommendation to one or more users. Other embodiments are also disclosed herein.Type: ApplicationFiled: March 30, 2015Publication date: October 1, 2015Applicant: Wal-Mart Stores, Inc.Inventors: Nathan Stoll, Jan Magnus Stensmo, Stuart Payton Robinson, Andrew Mark Ellerhorst
-
Publication number: 20150278918Abstract: Various embodiments of methods and systems for providing a collections search include a method comprising determining one or more recommendations from a set of users within a trust network of a first user, wherein each user from the set of users is associated with one of the plurality of first recommendations and determining a category for each of the one or more recommendations. In many embodiments, the method further comprises arranging one or more collections of the one or more recommendations according to the category for each of the one or more recommendations and arranging for display the one or more collections. Other embodiments are disclosed herein.Type: ApplicationFiled: March 30, 2015Publication date: October 1, 2015Applicant: Wal-Mart Stores, Inc.Inventors: Nathan Stoll, Jan Magnus Stensmo, David Luther Alan Stafford
-
Publication number: 20150278919Abstract: Various embodiments of methods and systems for providing a catalog of trending and trusted items include a method comprising determining a plurality of first recommendations from a set of users within a trust network of a first user, wherein each user from the set of users is associated with one of the plurality of first recommendations, determining respective time differences between respective chronologically successive first recommendations of the plurality of first recommendations, and determining one or more second recommendations that satisfy one or more popularity criteria. In many embodiments, the method further comprises arranging for display the first recommendations in a chronologically based order, and one or more of the second recommendations, wherein a respective second recommendation is inserted between respective chronologically successive first recommendations whose time difference is greater than a threshold. Other embodiments are disclosed herein.Type: ApplicationFiled: March 30, 2015Publication date: October 1, 2015Applicant: WAL-MART STORES, INC.Inventors: Nathan Stoll, Jan Magnus Stensmo, David Luther Alan Stafford
-
Publication number: 20150278917Abstract: Various embodiments of systems and methods for obtaining product recommendations include a method comprising receiving from a requestor a recommendation request and determining a first level category associated with the recommendation request. In many embodiments, the method further comprises sending instructions to display the recommendation request to one or more first users within a trust network of the requester, wherein the first users are identified as trusted by the requester with respect to the first level category, and if one or more first conditions are satisfied, send instructions to display the recommendation request to one or more second users, wherein each second user is within a respective trust network of a respective first user and is identified as trusted by the respective first user with respect to the first level category. Other embodiments also are disclosed herein.Type: ApplicationFiled: March 30, 2015Publication date: October 1, 2015Applicant: Wal-Mart Stores, Inc.Inventors: Nathan Stoll, Jan Magnus Stensmo, Andrew Mark Ellerhorst, Stuart Payton Robinson
-
Publication number: 20150206211Abstract: In some embodiments, a method of trusted gifting comprises, identifying a first user, identifying a second user associated with an event, and determining one or more potential products for the second user according to one or more criteria. In many embodiments, the method further comprises causing at least one product of the one or more determined potential products to be purchased for the second user by the first user. Other embodiments also are disclosed herein.Type: ApplicationFiled: March 30, 2015Publication date: July 23, 2015Applicant: Wal-Mart Stores, Inc.Inventors: Nathan Stoll, Jan Magnus Stensmo, Andrew Mark Ellerhorst, Abhishek Banerjee
-
Publication number: 20150206113Abstract: In some embodiments of methods and systems of purchasing products via a subscription mechanism, a method comprises, presenting a subscription mechanism corresponding to a first user, wherein the subscription mechanism is associated with a set of products. In many embodiments, the method further comprises receiving a notification from a second user selecting the subscription mechanism corresponding to the first user, determining that one or more conditions are satisfied, and causing at least a portion of the set of products associated with the subscription mechanism to be purchased by the second user. Other embodiments also are disclosed herein.Type: ApplicationFiled: March 30, 2015Publication date: July 23, 2015Applicant: WAL-MART STORES, INC.Inventors: Nathan Stoll, Jan Magnus Stensmo, Andrew Mark Ellerhorst
-
Publication number: 20150206225Abstract: In some embodiments, a method comprises receiving at least two parameters for a gift exchange from an organizer of the gift exchange. The at least two parameters can comprise a set of participants and a budget. The method further comprises identifying a gift exchange recipient for a respective participant in the set of participants, determining one or more gifts for the gift exchange recipient based at least in part on the budget and a first trust graph, and arranging for display the one or more determined gifts to the respective participant. In many embodiments, the first trust comprises levels of trust associated with the gift exchange recipient. Other embodiments also are disclosed herein.Type: ApplicationFiled: March 30, 2015Publication date: July 23, 2015Applicant: WAL-MART STORES, INC.Inventors: Nathan Stoll, Jan Magnus Stensmo, Andrew Mark Ellerhorst, Abhishek Banerjee
-
Patent number: 9064005Abstract: A computer-implemented system and method is disclosed for retrieving documents using context-dependant probabilistic modeling of words and documents. The present invention uses multiple overlapping vectors to represent each document. Each vector is centered on each of the words in the document and includes the local environment. The vectors are used to build probability models that are used for predictions of related documents and related keywords. The results of the statistical analysis are used for retrieving an indexed document, for extracting features from a document, or for finding a word within a document. The statistical evaluation is also used to evaluate the probability of relation between the key words appearing in the document and building a vocabulary of key words that are generally found together. The results of the analysis are stored in a repository. Searches of the data repository produce a list of related documents and a list of related terms.Type: GrantFiled: July 12, 2007Date of Patent: June 23, 2015Assignee: Nuance Communications, Inc.Inventor: Jan Magnus Stensmo
-
Publication number: 20130317941Abstract: In accordance with some implementations, a method for storing levels of trust between users for use in online e-commerce is disclosed. The method is performed on a server system having one or more processors and memory storing one or more programs for execution by the one or more processors. The server system stores trust information for a plurality of users, wherein each user has an associated level of trust with one or more other users in the plurality of users. The server system receives, from a first user, a trust indication for a second user in the plurality of users. The server system then updates the trust information of the first user based on the trust indication.Type: ApplicationFiled: February 15, 2013Publication date: November 28, 2013Inventors: Nathan Stoll, Jan Magnus Stensmo