Patents by Inventor Michael John Cyze

Michael John Cyze has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250124136
    Abstract: Core entities are each defined as a subset of base entities that satisfy one or more core entity connection relationships. Base stories are each defined as a subset of core entities that satisfy one or more story connection relationships. A risk score of each core entity is calculated based on previously calculated risk scores of the base entities. A risk score of each base story is calculated based on the calculated risk score of each core entity of the base story. Selected base stories are extended with external content to generate corresponding extended stories.
    Type: Application
    Filed: October 11, 2023
    Publication date: April 17, 2025
    Applicant: OPEN TEXT INC.
    Inventors: Stephan Fong-Jau Jou, Maria Pospelova, Michael John Cyze
  • Publication number: 20250126144
    Abstract: Core entities are each defined as a subset of base entities that satisfy one or more core entity connection relationships. Base stories are each defined as a subset of core entities that satisfy one or more story connection relationships. A risk score of each core entity is calculated based on previously calculated risk scores of the base entities. A risk score of each base story is calculated based on the calculated risk score of each core entity of the base story. Selected base stories are extended with external content to generate corresponding extended stories.
    Type: Application
    Filed: October 11, 2023
    Publication date: April 17, 2025
    Applicant: OPEN TEXT INC.
    Inventors: Stephan Fong-Jau Jou, Maria Pospelova, Michael John Cyze
  • Patent number: 11699116
    Abstract: A system and method is described for providing custom predictive models for detecting electronic security threats within an enterprise computer network. The custom models may be defined in a declarative language. The custom models, along with native models, may be combined together to provide custom machine learning (ML) use cases.
    Type: Grant
    Filed: April 16, 2019
    Date of Patent: July 11, 2023
    Assignee: Interset Software Inc.
    Inventors: Stephan Jou, Mario Daigle, Shaun Pilkington, Michael John Cyze, Josh Mahonin, Wesley Lawrence
  • Publication number: 20230138113
    Abstract: A system and method are provided that store electronic data describing events that have occurred in a computing system, index the electronic data to create indexed data records; and store the indexed data records in computer memory as part of a flat data structure.
    Type: Application
    Filed: February 9, 2021
    Publication date: May 4, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: JEAN-PHILIPPE BERGERON, MICHAEL JOHN CYZE
  • Patent number: 10887335
    Abstract: The systems and methods described herein, given a population of entities each with associated information technology (IT) security risk scores, computes an aggregate risk score which quantifies the overall risk of the population. The method works for any arbitrary population of any size, and of any combination of different entity types and results in normalized risk scores for the arbitrary population (i.e. in the [0,1] range, regardless of population size or makeup). Since the risk scores are normalized, it affords comparison across different arbitrary entity populations having different combinations of entity types (e.g. users, servers, and printers). The aggregation technique allows for sensitivity to small numbers of high risk entities, which is a highly desirable characteristic for risk-based applications, and allows for sensitivity to different entity types or other relevant factors such as higher risk users, different threat types.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: January 5, 2021
    Assignee: Interset Software, Inc.
    Inventors: Shaun Pilkington, Michael John Cyze, Stephan F. Jou
  • Patent number: 10754983
    Abstract: Sensitive data may be anonymized for use in user interfaces by applying a cryptographic hash function to the data. The hashed value may be broken into hash tokens and the hash tokens converted to human readable tokens using a 1:1 conversion function. The human readable tokens can then be concatenated together to provide a human readable identifier of the sensitive data.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: August 25, 2020
    Assignee: Interset Software Inc.
    Inventors: Josh Christopher Tyler Mahonin, Michael John Cyze, Michael Iles, Shaun Pilkington, Wesley Lawrence, Stephan Jou
  • Publication number: 20190318203
    Abstract: A system and method is described for providing custom predictive models for detecting electronic security threats within an enterprise computer network. The custom models may be defined in a declarative language. The custom models, along with native models, may be combined together to provide custom machine learning (ML) use cases.
    Type: Application
    Filed: April 16, 2019
    Publication date: October 17, 2019
    Inventors: Stephan Jou, Mario Daigle, Shaun Pilkington, Michael John Cyze, Josh Mahonin, Wesley Lawrence
  • Patent number: 10360387
    Abstract: The present invention provides a method of identifying aggregating and mathematically ranking security alert data having the steps of identifying a plurality of alerts, selecting a subset of the plurality alerts based on at least one preselected theme, applying a function to the subset of the plurality alerts to compute an aggregate risk score, the function based on at least one factor and prioritizing the aggregate risk score in a risk score list.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: July 23, 2019
    Assignee: Interset Software, Inc.
    Inventors: Stephan Jou, Shaun Pilkington, Michael John Cyze
  • Publication number: 20190044969
    Abstract: The systems and methods described herein, given a population of entities each with associated information technology (IT) security risk scores, computes an aggregate risk score which quantifies the overall risk of the population. The method works for any arbitrary population of any size, and of any combination of different entity types and results in normalized risk scores for the arbitrary population (i.e. in the [0,1] range, regardless of population size or makeup). Since the risk scores are normalized, it affords comparison across different arbitrary entity populations having different combinations of entity types (e.g. users, servers, and printers). The aggregation technique allows for sensitivity to small numbers of high risk entities, which is a highly desirable characteristic for risk-based applications, and allows for sensitivity to different entity types or other relevant factors such as higher risk users, different threat types.
    Type: Application
    Filed: July 20, 2018
    Publication date: February 7, 2019
    Inventors: Shaun PILKINGTON, Michael John CYZE, Stephan JOU
  • Publication number: 20180285597
    Abstract: Sensitive data may be anonymized for use in user interfaces by applying a cryptographic hash function to the data. The hashed value may be broken into hash tokens and the hash tokens converted to human readable tokens using a 1:1 conversion function. The human readable tokens can then be concatenated together to provide a human readable identifier of the sensitive data.
    Type: Application
    Filed: March 31, 2017
    Publication date: October 4, 2018
    Inventors: Josh Christopher Tyler MAHONIN, Michael John CYZE, Michael ILES, Shaun PILKINGTON, Wesley LAWRENCE, Stephan JOU
  • Publication number: 20160344762
    Abstract: The present invention provides a method of identifying aggregating and mathematically ranking security alert data having the steps of identifying a plurality of alerts, selecting a subset of the plurality alerts based on at least one preselected theme, applying a function to the subset of the plurality alerts to compute an aggregate risk score, the function based on at least one factor and prioritizing the aggregate risk score in a risk score list.
    Type: Application
    Filed: May 20, 2016
    Publication date: November 24, 2016
    Inventors: Stephan Jou, Shaun Pilkington, Michael John Cyze