Patents by Inventor Stephan F. Jou
Stephan F. Jou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230334010Abstract: A system includes a processor and a memory coupled with and readable by the processor and storing therein a set of instructions. When executed by the processor, the processor is caused to receive application events associated with an application and create data records based on the application events. The processor is further caused to compute an interestingness value for each of the data records based on a goal of the application, assign the computed interestingness value to each of the data records and store each of the data records with the assigned interestingness value.Type: ApplicationFiled: April 15, 2022Publication date: October 19, 2023Applicant: MICRO FOCUS LLCInventors: Venkatesh HariRama Subbu, Asad Narayanan, Maria Pospelova, Stephan F. Jou
-
Publication number: 20220417026Abstract: A request to load an application into memory for execution is received. The application is stored in one or more blocks in a blockchain. The application is validated by running a blockchain hash. In response to validating the application by running the blockchain hash, the application is loaded from the blockchain into a memory. The application is then executed in the memory. This provides a secure method of loading an application into memory.Type: ApplicationFiled: June 23, 2021Publication date: December 29, 2022Applicant: MICRO FOCUS LLCInventors: Douglas Max Grover, Michael A. Angelo, Stephan F. Jou
-
Patent number: 11449514Abstract: A computing device includes a processor and a medium storing instructions. The instructions are executable by the processor to: receive a database query for an approximate aggregation of a numerical value of a plurality of records, wherein each record includes the numerical value and a filter value; in response to the database query, determine a count of records that have filter values within an importance threshold associated with the database query; and determine the approximate aggregation of the numerical value based on the count of records and the importance threshold associated with the database query.Type: GrantFiled: December 27, 2019Date of Patent: September 20, 2022Assignee: Interset Software LLCInventors: Shaun Pilkington, Stephan F. Jou, Ross Diener
-
Publication number: 20210200773Abstract: A computing device includes a processor and a medium storing instructions. The instructions are executable by the processor to: receive a database query for an approximate aggregation of a numerical value of a plurality of records, wherein each record includes the numerical value and a filter value; in response to the database query, determine a count of records that have filter values within an importance threshold associated with the database query; and determine the approximate aggregation of the numerical value based on the count of records and the importance threshold associated with the database query.Type: ApplicationFiled: December 27, 2019Publication date: July 1, 2021Inventors: Shaun Pilkington, Stephan F. Jou, Ross Diener
-
Patent number: 10887335Abstract: The systems and methods described herein, given a population of entities each with associated information technology (IT) security risk scores, computes an aggregate risk score which quantifies the overall risk of the population. The method works for any arbitrary population of any size, and of any combination of different entity types and results in normalized risk scores for the arbitrary population (i.e. in the [0,1] range, regardless of population size or makeup). Since the risk scores are normalized, it affords comparison across different arbitrary entity populations having different combinations of entity types (e.g. users, servers, and printers). The aggregation technique allows for sensitivity to small numbers of high risk entities, which is a highly desirable characteristic for risk-based applications, and allows for sensitivity to different entity types or other relevant factors such as higher risk users, different threat types.Type: GrantFiled: July 20, 2018Date of Patent: January 5, 2021Assignee: Interset Software, Inc.Inventors: Shaun Pilkington, Michael John Cyze, Stephan F. Jou
-
Patent number: 10868823Abstract: Humans as well as non-human actors may interact with computer devices on a computer network. As described herein, it is possible to train and apply human vs. non-human detection models to provide an indication of the probability that a human or a non-human actor was interacting with a computer device during a particular time period. The probability that a human or non-human was interacting with computers during a particular time may be used to improve various actions, including selecting one or more different threat detection models to apply during the particular time, selecting data to use with threat detection models during the time, or selecting data from the particular time to store.Type: GrantFiled: July 20, 2018Date of Patent: December 15, 2020Assignee: Interset Software Inc.Inventors: Shaun Pilkington, Maria Pospelova, Stephan F. Jou
-
Patent number: 10860711Abstract: The present invention provides a method, system and computer program product for analyzing risks, for example associated with potential data leakage. Risk for activities may be measured as a function of risk components related to: persons involved in the activity; sensitivity of data at risk; endpoint receiving data at risk; and type the activity. Risk may account for the probability of a leakage event given an activity as well as a risk cost which reflects the above risk components. Manually and/or automatically tuned parameters may be used to affect the risk calculation. Risk associated with persons and/or files may be obtained by: initializing risk scores of persons or files based on a rule set; adjusting the risk scores in response to ongoing monitoring of events; identifying commonalities across persons or files; and propagating risk scores based on the commonalities.Type: GrantFiled: October 17, 2017Date of Patent: December 8, 2020Assignee: Interset Software Inc.Inventors: Stephan F. Jou, Shaun Pilkington
-
Patent number: 9619583Abstract: An illustrative embodiment of a computer-implemented method for predictive analytic queries includes creating a user-defined predictive analytics query using a set of syntactic grammar that defines a correct syntax of the user-defined predictive analytics query including a created set of predictive analytics by-example vocabularies and a set of subject-specific by-example vocabularies forming a set of by-example vocabularies, wherein the set of syntactic grammar defines semantics of each syntactically correct predictive analytics query using the by-example vocabularies such that predictive analytics queries can be expressed with semantic precision using this constrained Natural Language Processing (cNLP) approach. The computer-implemented method further generates a predictive analytic model and runtime query, using the user-defined predictive analytics query, executes the runtime query using the predictive analytic model to create a result, and returns the result to the user.Type: GrantFiled: June 3, 2013Date of Patent: April 11, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alex T. Lau, Diana Lau, Stephan F. Jou, Joanna W. Ng
-
Publication number: 20130332481Abstract: An illustrative embodiment of a computer-implemented method for predictive analytic queries includes creating a user-defined predictive analytics query using a set of syntactic grammar that defines a correct syntax of the user-defined predictive analytics query including a created set of predictive analytics by-example vocabularies and a set of subject-specific by-example vocabularies forming a set of by-example vocabularies, wherein the set of syntactic grammar defines semantics of each syntactically correct predictive analytics query using the by-example vocabularies such that predictive analytics queries can be expressed with semantic precision using this constrained Natural Language Processing (cNLP) approach. The computer-implemented method further generates a predictive analytic model and runtime query, using the user-defined predictive analytics query, executes the runtime query using the predictive analytic model to create a result, and returns the result to the user.Type: ApplicationFiled: June 3, 2013Publication date: December 12, 2013Inventors: Alex T. Lau, Diana Lau, Stephan F. Jou, Joanna W. Ng
-
Patent number: 6995768Abstract: An interactive system for visualizing business data organized according to the dimensional model allows to combine data from more than one data source and present the data in the form of a graphical, multi-metric data visualization. The visualizations are hierarchically structured and built from visualization elements including, in ascending order of hierarchy, charts, panels, scenes and sheets. The system provides a large variety of two- and three-dimensional visualization elements, mostly predefined charts, which can be combined in any number into fully customized visualizations. In a preferred embodiment, a visualization is built by the system, which prompts the user to select data sources, data items to be visualized, and certain features of the presentation layout.Type: GrantFiled: May 10, 2001Date of Patent: February 7, 2006Assignee: Cognos IncorporatedInventors: Stephan F. Jou, Don Campbell, Ian Ballantyne
-
Patent number: 6853375Abstract: A method of rendering screen of a computer display device under conditions requiring frequent repainting of the screen is disclosed. The display is a part of a computer system running an application under control of an operating system. The application detects the onset of conditions requiring frequent repainting of the screen by checking messages sent by the operating system to the application's message queue. The application then starts the repainting of the screen based on the information retrieved from the queue while checking periodically the message queue to see if the originally detected conditions still apply. If this is the case, the application terminates the original repainting operation and starts a new repainting operation based on the updated information retrieved from the message queue. This cycle is repeated until it is determined that the originally detected conditions no longer apply, in which case a final complete repaint of the screen takes place.Type: GrantFiled: May 10, 2001Date of Patent: February 8, 2005Assignee: Cognos IncorporatedInventors: Stephan F. Jou, Don Campbell, Ian Ballantyne
-
Publication number: 20030071814Abstract: An interactive system for visualizing business data organized according to the dimensional model allows to combine data from more than one data source and present the data in the form of a graphical, multi-metric data visualization. The visualizations are hierarchically structured and built from visualization elements including, in ascending order of hierarchy, charts, panels, scenes and sheets. The system provides a large variety of two- and three-dimensional visualization elements, mostly predefined charts, which can be combined in any number into fully customized visualizations. In a preferred embodiment, a visualization is built by the system, which prompts the user to select data sources, data items to be visualized, and certain features of the presentation layout.Type: ApplicationFiled: May 10, 2001Publication date: April 17, 2003Inventors: Stephan F. Jou, Don Campbell, Ian Ballantyne
-
Publication number: 20020008699Abstract: A method of rendering screen of a computer display device under conditions requiring frequent repainting of the screen is disclosed. The display is a part of a computer system running an application under control of an operating system. The application detects the onset of conditions requiring frequent repainting of the screen by checking messages sent by the operating system to the application's message queue. The application then starts the repainting of the screen based on the information retrieved from the queue while checking periodically the message queue to see if the originally detected conditions still apply. If this is the case, the application terminates the original repainting operation and starts a new repainting operation based on the updated information retrieved from the message queue. This cycle is repeated until it is determined that the originally detected conditions no longer apply, in which case a final complete repaint of the screen takes place.Type: ApplicationFiled: May 10, 2001Publication date: January 24, 2002Inventors: Stephan F. Jou, Don Campbell, Ian Ballantyne