VERINT SYSTEMS LTD. Patent applications |
Patent application number | Title | Published |
20150310014 | SYSTEMS AND METHODS FOR KEYWORD SPOTTING USING ADAPTIVE MANAGEMENT OF MULTIPLE PATTERN MATCHING ALGORITHMS - Methods and systems for keyword spotting, i.e., for identifying textual phrases of interest in input data. The input data may be communication packets exchanged in a communication network. A keyword spotting system holds a dictionary (or dictionaries) of textual phrases for searching input data. The input data and the patterns are assigned to multiple different pattern matching algorithms. For example, a share of the traffic is handled by one algorithm and smaller traffic shares may be handled by the others. The system monitors the algorithms performance as they process the data to search for a match. The ratio of traffic splitting among the algorithms is dynamically reassigned or adjusted to maximize the overall performance. | 10-29-2015 |
20150066506 | System and Method of Text Zoning - A method of zoning a transcription of audio data includes separating the transcription of audio data into a plurality of utterances. A that each word in an utterances is a meaning unit boundary is calculated. The utterance is split into two new utterances at a work with a maximum calculated probability. At least one of the two new utterances that is shorter than a maximum utterance threshold is identified as a meaning unit. | 03-05-2015 |
20150066504 | System and Method for Determining the Compliance of Agent Scripts - Systems and methods of script identification in audio data obtained from audio data. The audio data is segmented into a plurality of utterances. A script model representative of a script text is obtained. The plurality of utterances are decoded with the script model. A determination is made if the script text occurred in the audio data. | 03-05-2015 |
20150066503 | System and Method of Automated Language Model Adaptation - Systems and methods of automated adaptation of a language model for transcription of audio data include obtaining audio data. The audio data is transcribed with a language model to produce a plurality of audio file transcriptions. A quality of the plurality of audio file transcriptions is evaluated. At least one best transcription from a plurality of audio file transcriptions is selected based upon the evaluated quality. Statistics are calculated from the selected at least one best transcription from the plurality of audio file transcriptions. The language model is modified from the calculated statistics. | 03-05-2015 |
20150066502 | System and Method of Automated Model Adaptation - Methods, systems, and computer readable media for automated transcription model adaptation includes obtaining audio data from a plurality of audio files. The audio data is transcribed to produce at least one audio file transcription which represents a plurality of transcription alternatives for each audio file. Speech analytics are applied to each audio file transcription. A best transcription is selected from the plurality of transcription alternatives for each audio file. Statistics from the selected best transcription are calculated. An adapted model is created from the calculated statistics. | 03-05-2015 |
20150039306 | System and Method of Automated Evaluation of Transcription Quality - Systems and methods automatedly evaluate a transcription quality. Audio data is obtained. The audio data is segmented into a plurality of utterances with a voice activity detector operating on a computer processor. The plurality of utterances are transcribed into at least one word lattice with a large vocabulary continuous speech recognition system operating on the processor. A minimum Bayes risk decoder is applied to the at least one word lattice to create at least one confusion network. At least conformity ratio is calculated from the at least one confusion network. | 02-05-2015 |
20150039304 | Voice Activity Detection Using A Soft Decision Mechanism - Voice activity detection (VAD) is an enabling technology for a variety of speech based applications. Herein disclosed is a robust VAD algorithm that is also language independent. Rather than classifying short segments of the audio as either “speech” or “silence”, the VAD as disclosed herein employees a soft-decision mechanism. The VAD outputs a speech-presence probability, which is based on a variety of characteristics. | 02-05-2015 |
20150025887 | Blind Diarization of Recorded Calls with Arbitrary Number of Speakers - In a method of diarization of audio data, audio data is segmented into a plurality of utterances. Each utterance is represented as an utterance model representative of a plurality of feature vectors. The utterance models are clustered. A plurality of speaker models are constructed from the clustered utterance models. A hidden Markov model is constructed of the plurality of speaker models. A sequence of identified speaker models is decoded. | 01-22-2015 |
20140369565 | Systems and Methods for Multi-Pass Adaptive People Counting - People are counted in a segment of video with a video processing system that is configured with a first set of parameters. This produces a first output. Based on this first output, a second set of parameters is chosen. People are then counted in the segment of video using the second set of parameters. This produces a second output. People are counted with a video played forward. People are counted with a video played backwards. The results of these two counts are reconciled to produce a more accurate people count. | 12-18-2014 |
20140325653 | SYSTEM AND METHOD FOR AUTOMATED CONFIGURATION OF INTRUSION DETECTION SYSTEMS - Methods and systems for automated generation of malicious traffic signatures, for use in Intrusion Detection Systems (IDS). A rule generation system formulates IDS rules based on traffic analysis results obtained from a network investigation system. The rule generation system then automatically configures the IDS to apply the rules. An analysis process in the network investigation system comprises one or more metadata filters that are indicative of malicious traffic. An operator of the rule generation system is provided with a user interface that is capable of displaying the network traffic filtered in accordance with such filters. | 10-30-2014 |
20140289401 | SYSTEMS AND METHODS FOR EXTRACTING MEDIA FROM NETWORK TRAFFIC HAVING UNKNOWN PROTOCOLS - Methods and systems for analyzing network traffic. An analysis system receives network traffic, which complies with a certain protocol. The received network traffic carries a data item, which may be of value to an analyst. In order to access the data item in question, the analysis system automatically identifies the media type of the data item, by processing the network traffic irrespective of the protocol. The analysis system identifies the media type irrespective of the protocol in order to avoid the computational complexity involved in decoding the protocol. | 09-25-2014 |
20140241519 | Identification of Non-Compliant Interactions - A method of evaluating scripts in an interpersonal communication includes monitoring a customer service interaction. At least one portion of a script is identified. At least one script requirement is determined. A determination is made whether the at least one portion of the script meets the at least one script requirement. An alert is generated indicative of a non-compliant script. | 08-28-2014 |
20140233803 | Increased Quality of Image Objects Based on Depth in Scene - Systems, methods, and software for operating an image processing system are provided herein. In a first example, a method of operating an image processing system is provided. The method includes identifying object pixels associated with an object of interest in a scene, identifying additional pixels to associate with the object of interest, and performing an operation based on a depth of the object in the scene on target pixels comprised of the object pixels and the additional pixels to change a quality of the object of interest. | 08-21-2014 |
20140233802 | Increased Quality of Image Objects Based on Depth in Scene - Systems, methods, and software for operating an image processing system are provided herein. In a first example, a method of operating an image processing system is provided. The method includes identifying object pixels associated with an object of interest in a scene, identifying additional pixels to associate with the object of interest, and performing an operation based on a depth of the object in the scene on target pixels comprised of the object pixels and the additional pixels to change a quality of the object of interest. | 08-21-2014 |
20140222852 | SYSTEM AND METHOD FOR BIT-MAP BASED KEYWORD SPOTTING IN COMMUNICATION TRAFFIC - Methods and systems for locating occurrences of a search pattern in a body of text. A processor searches the text for one or more occurrences of a pattern. Both the text and the pattern comprise symbols of some alphabet. In preparation for the search, the processor defines a respective bit-map for each alphabet symbol. Using the bit-maps, the processor carries out a highly efficient process of searching the text for occurrences of the pattern. The processor then scans the pattern backwards using the bit-maps, symbol by symbol, attempting to match the symbols of the pattern to the corresponding symbols of the text. If a match is not found, the processor calculates the size of the jump to the next position in the text based on the accumulated results of the evaluations up to the current position. | 08-07-2014 |
20140222476 | Anomaly Detection in Interaction Data - Method of automated anomaly detection includes obtaining a corpus of interaction data. Regular interaction data is identified from the corpus of interaction data with a processor. New interaction data is received. The processor compares the new interaction data to the identified regular interaction data The processor identities anomalies in the new interaction data. | 08-07-2014 |
20140222419 | Automated Ontology Development - Systems and methods of automated ontology development include a corpus of communication data. The corpus of communication data includes communication data from a plurality of interactions and is processed. A plurality of terms are extracted from the corpus. Each term of the plurality is a plurality of words that identify a single concept within the corpus. An ontology is automatedly generated from the extracted terms. | 08-07-2014 |
20140221004 | SYSTEM AND METHOD FOR GEOGRAPHY-BASED CORRELATION OF CELLULAR AND WLAN IDENTIFIERS - Methods and systems for tracking mobile communication terminals based on their identifiers. The disclosed techniques identify cellular terminals and Wireless Local Area Network (WLAN) terminals that are likely to be carried by the same individual, or cellular and WLAN identifiers that belong to the same multi-mode terminal. A correlation system is connected to a cellular network and to a WLAN. The system receives location coordinates of cellular identifiers used by mobile terminals in the cellular network, and location coordinates of WLAN identifiers used by mobile terminals in the WLAN. Based on the location coordinates, the system is able to construct routes that are traversed by the terminals having the various cellular and WLAN identifiers. The system attempts to find correlations in time and space between the routes. | 08-07-2014 |
20140214407 | SYSTEM AND METHOD FOR KEYWORD SPOTTING USING REPRESENTATIVE DICTIONARY - Methods and systems for keyword spotting, i.e., for identifying textual phrases of interest in input data. In the embodiments described herein, the input data comprises communication packets exchanged in a communication network. The disclosed keyword spotting techniques can be used, for example, in applications such as Data Leakage Prevention (DLP), Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS), and spam e-mail detection. A keyword spotting system holds a dictionary of textual phrases for searching input data. In a communication analytics system, for example, the dictionary defines textual phrases to be located in communication packets—such as e-mail addresses or Uniform Resource Locators (URLs). | 07-31-2014 |
20140177919 | Systems and Methods for Multi-Pass Adaptive People Counting - People are counted in a segment of video with a video processing system that is configured with a first set of parameters. This produces a first output. Based on this first output, a second set of parameters is chosen. People are then counted in the segment of video using the second set of parameters. This produces a second output. People are counted with a video played forward. People are counted with a video played backwards. The results of these two counts are reconciled to produce a more accurate people count. | 06-26-2014 |
20140177841 | SYSTEM AND METHOD FOR USER-PRIVACY-AWARE COMMUNICATION MONITORING AND ANALYSIS - Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, content-based identifiers such as speaker recognition or keyword matching are used. | 06-26-2014 |
20140165198 | SYSTEM AND METHOD FOR MALWARE DETECTION USING MULTIDIMENSIONAL FEATURE CLUSTERING - Methods and systems for malware detection techniques, which detect malware by identifying the Command and Control (C&C) communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The fine-granularity features are examined, which are present in the transactions and are indicative of whether the transactions are exchanged with malware. A feature comprises an aggregated statistical property of one or more features of the transactions, such as average, sum median or variance, or of any suitable function or transformation of the features. | 06-12-2014 |
20140161316 | TIME-IN-STORE ESTIMATION USING FACIAL RECOGNITION - A method of monitoring the amount of time spent in a specified area by an individual comprises employing a first camera to automatically create one or more entrance images, each entrance image containing a face of an entering individual that passes a first location, and storing each entrance image in a database along with a corresponding entrance time that the entering individual passed the entrance location. A second camera is also employed to automatically create an exit image of a face of an exiting individual that passes a second location, and the exit image is recorded along with the corresponding exit time that the exiting individual passed the exit location. The exit image is then compared to the entrance images in the database to identify a matching entrance image containing the same face as the exit image. A stay time is then determined for the exiting individual by determining the difference between the entrance time corresponding to the matching entrance image and the exit time. | 06-12-2014 |
20140161315 | Irregular Event Detection in Push Notifications - Systems and methods of detecting irregular events include the extraction of values for measure in each of a plurality of notifications. The extracted values are stored in a measures database and a distribution is calculated for the values of each of the measures. The extracted values are compared to the calculated distributions to determine if an irregular event has occurred. An irregularity alert is produced if an irregular event has occurred. | 06-12-2014 |
20140161314 | Object Search by Description - Systems and methods search video data for objects that satisfy a general object description. A database is populated with identified objects and object characteristics detected in video data with at least one identifier that specifies video image data. At least one search parameter is received that presents a general object description. The database is queried based upon the received at least one search parameter. At least one identifier is returned from the database based upon the at least one search parameter. | 06-12-2014 |
20140160251 | LIVE STREAMING VIDEO OVER 3D - A video monitoring system and method comprises a first camera at a first camera location configured to video record a first monitored area, wherein a georeference location of the first monitored area is known, and a virtual 3D model of the monitored zone that includes the first camera location and the first monitored area, wherein the virtual 3D model is georeferenced to a physical location. The system further comprises a processor configured to receive the video recording of the first monitored area and to overlay the video recording of the first monitored area onto a part of the virtual 3D model that corresponds to the georeference location of the first monitored area. A display is also connected to the processor and configured to display the virtual 3D model of the monitored zone overlaid with the video recording of the first monitored area. | 06-12-2014 |
20140142944 | Diarization Using Acoustic Labeling - Systems and method of diarization of audio files use an acoustic voiceprint model. A plurality of audio files are analyzed to arrive at an acoustic voiceprint model associated to an identified speaker. Metadata associate with an audio file is used to select an acoustic voiceprint model. The selected acoustic voiceprint model is applied in a diarization to identify audio data of the identified speaker. | 05-22-2014 |
20140142940 | Diarization Using Linguistic Labeling - Systems and methods of diarization using linguistic labeling include receiving a set of diarized textual transcripts. A least one heuristic is automatedly applied to the diarized textual transcripts to select transcripts likely to be associated with an identified group of speakers. The selected transcripts are analyzed to create at least one linguistic model. The linguistic model is applied to transcripted audio data to label a portion of the transcripted audio data as having been spoken by the identified group of speakers. Still further embodiments of diarization using linguistic labeling may serve to label agent speech and customer speech in a recorded and transcripted customer service interaction. | 05-22-2014 |
20140112541 | Method and System for Edge Detection - A method executed by a computer system for detecting edges comprises receiving an image comprising a plurality of pixels, determining a phase congruency value for a pixel, where the phase congruency value comprises a plurality of phase congruency components, and determining if the phase congruency value satisfies a phase congruency criteria. If the phase congruency value satisfies the phase congruency criteria, the computer system categorizes the pixel as an edge pixel. If the phase congruency value does not satisfy the phase congruency criteria, the computer system compares a first phase congruency component of the plurality of phase congruency components to a phase congruency component criteria. If the first phase congruency component satisfies the phase congruency component criteria, the computer system categorizes the pixel as an edge pixel, and if the first phase congruency component does not satisfy the phase congruency component criteria, categorizes the pixel as a non-edge pixel. | 04-24-2014 |
20140096228 | SYSTEM AND METHOD FOR AUTOMATIC PROVISIONING OF MULTI-STAGE RULE-BASED TRAFFIC FILTERING - Methods and systems for filtering communication packets using a multi-stage filtering system that receives a large volume of communication packets from a communication network that filters the packets in two or more successive stages. The system comprises at least one front-end filtering unit and multiple back-end filtering units. Typically although not necessarily, the front-end filtering unit filters the packets based on layer-2 to layer-4 attributes of the packets. The back-end filtering units, on the other hand, filter the packets based on content extracted from the packet payloads. The back-end filtering units may perform filtering, for example, based on keyword spotting, application classification, malware detection and other content-related criteria. The front-end filtering unit typically performs filtering at the individual packet level and/or at the level of request-response transactions. The back-end filtering units, on the other hand, typically perform filtering at the level of entire reconstructed packet flows. | 04-03-2014 |
20140095700 | System and method for passive decoding of social network activity using replica database - Methods and systems for obtaining reconstructing activities of target users in social networks, such as for decoding and displaying social network sessions held by a target user, or identifying other users who are associated with the target user. This analysis is typically carried out based on passive monitoring of network traffic. A social network decoding system constructs and maintains a replica database, which mimics a portion of the user profile database maintained by the social network servers. The social network decoding system monitors network traffic between users and social network servers. Based on the monitored traffic, the system gradually constructs a replica database that attempts to replicate a portion of the social network user profile database, relating to one or more predefined target users. Using the replica database, the system is able to correlate loosely-coupled information objects, events and interactions between the target users and social network pages. | 04-03-2014 |
20140089498 | SYSTEM AND METHOD OF HIGH VOLUME RULE ENGINE - A rule engine configured with at least one hash table which summarizes the rules managed by the engine. The rule engine receives rules and automatically adjusts the hash table in order to relate to added rules and/or in order to remove cancelled rules. The adjustment may be performed while the rule engine is filtering packets, without stopping. The rules may be grouped into a plurality of rule types and for each rule type the rule engine performs one or more accesses to at least one hash table to determine whether any of the rules of that type match the packet. In some embodiments, the rule engine may automatically select the rule types responsive to a set of rules provided to the rule engine and adapt its operation to the specific rules it is currently handling, while not spending resources on checking rule types not currently used. | 03-27-2014 |
20140074467 | Speaker Separation in Diarization - The system and method of separating speakers in an audio file including obtaining an audio file. The audio file is transcribed into at least one text file by a transcription server. Homogenous speech segments are identified within the at least one text file. The audio file is segmented into homogenous audio segments that correspond to the identified homogenous speech segments. The homogenous audio segments of the audio file are separated into a first speaker audio file and second speaker audio file the first speaker audio file and the second speaker audio file are transcribed to produce a diarized transcript. | 03-13-2014 |
20140072270 | Systems, Methods, and Software for Mobile Video Display and Management - A system, method, and software for mobile video display and management includes acquiring a plurality of streams of video data from a plurality of cameras. The plurality of streams of video data are stored and plurality of selected streams of video data that includes at least one stream of recorded video data and at least one stream of live video data are presented in a graphical user interface of a remote device. | 03-13-2014 |
20140024349 | SYSTEM AND METHOD FOR CELLULAR CALL MONITORING USING DOWNLINK CHANNEL CORRELATION - Methods and systems for monitoring communication of mobile communication terminals, such as cellular phones. An off-air monitoring system reconstructs both directions of a call conducted between two mobile terminals by receiving only downlink channels. The off-air monitoring system receives multiple downlink transmissions transmitted by base stations in a wireless communication network. The system uses the received downlink transmissions to reconstruct the bidirectional call content of calls conducted between wireless terminals. In order to reconstruct the bidirectional content of a given call, the system identifies and correlates the two downlink transmissions of that call from among the multiple received downlink transmissions. | 01-23-2014 |
20140009613 | Systems and Method for Video Monitoring using Linked Devices - A subject can be tracking using a plurality of physical video monitoring or image acquisition devices deployed in a delimited area. A map represents the delimited area. Icons representing the physical monitoring devices can be placed and configured on the map representing the delimited area. Some or all of the placed and configured video monitoring devices can be logically linked together to form scenes. The video feed from the physical video monitoring devices may be recorded in stable storage. A layout for display of the video feeds may be selected. Upon playing the video feed, whether live or recorded, a subject can be tracked through the delimited area by selecting one of the video monitoring devices in one of the available scenes. | 01-09-2014 |
20130347114 | SYSTEM AND METHOD FOR MALWARE DETECTION - Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In particular, the disclosed techniques distinguish between request-response transactions that carry C&C communication and request-response transactions of innocent traffic. Individual request-response transactions may be analyzed rather than entire flows, and fine-granularity features examined within the transactions. As such, these methods and systems are highly effective in distinguishing between malware C&C communication and innocent traffic, i.e., in detecting malware with high detection probability and few false alarms. | 12-26-2013 |
20130347060 | SYSTEMS AND METHODS FOR COMBINED PHYSICAL AND CYBER DATA SECURITY - Methods and systems for protecting computer systems against intrusion. The disclosed techniques detect intrusions by jointly considering both cyber security events and physical security events. In some embodiments, a correlation subsystem receives information related to the computer system and its physical environment from various information sources in the cyber domain and in the physical domain. The correlation subsystem analyzes the information and identifies both cyber security events and physical security events. The correlation subsystem finds cyber security events and physical security events that are correlative with one another, and uses this correlation to detect intrusions. | 12-26-2013 |
20130344844 | SYSTEMS AND METHODS FOR IDENTIFYING ROGUE BASE STATIONS - Methods and systems for identifying one or more rogue devices within a wireless communication network over a particular geographic location. A rogue base station detection system receives air interface transmissions from base stations belonging to a wireless communication network, as well as from one or more rogue base stations that do not belong to the network and are used for monitoring (e.g., hacking or eavesdropping) communication terminals communicating in the network. The system typically searches for signaling channels and converts the RF signal into GSM/UMTS messages including overcoming the different encryption methods used. The system than analyzes the received transmissions so as to identify suspicious transmissions that may be transmitted by the rogue base stations. | 12-26-2013 |
20130342346 | SYSTEM AND METHOD FOR PREDICTION OF THREATENED POINTS OF INTEREST - Embodiments that are described herein provide improved methods and systems for predicting threatened POIs. In some embodiments, an automated location tracking system tracks the locations of one or more target individuals. The locations of the target individuals may be tracked, for example, by tracking the cellular phones of the targets, or using various other automated location tracking techniques. Based on the tracked locations, a prediction system anticipates the future locations of the targets. Over time, the system uses this information to progressively narrow down the list of possibly-threatened POIs. | 12-26-2013 |
20130212260 | SYSTEM AND METHOD FOR AUTOMATIC PRIORITIZATION OF COMMUNICATION SESSIONS - The disclosed techniques apply automatic prioritization to communication sessions conducted by users of a communication network, and present the sessions to an operator in accordance with the priorities. Each session is assigned an initial priority depending on the user who conducts the session (referred to as “target user”). The priority is then adjusted in accordance with a set of rules defined for that target user, and possibly based on activities of the target user as analyzed using the reconstructed communication. The rules typically consider metadata of the session. The sessions are typically held in a queue and presented to an operator in accordance with their respective priorities. | 08-15-2013 |
20130198391 | System And Method For Main Page Identification In Web Decoding - Web pages may be rendered from a main page data element and a plurality of embedded data elements, which are separately fetched by a browser. Herein is provided a web decoder which includes a learning engine adapted to receive human indications of data elements which are unimportant and accordingly to adjust the web decoder's procedures for determining which data elements are displayed to the user. The learning engine may receive human indications of important data elements and uses both types of indications in its further determinations. Optionally, rule generalizations are performed in a manner which searches for parameters which differentiate between important and unimportant data elements. The rule generalizations optionally concentrate on groups of data elements having at least a predetermined number of parameters having the same values for both important and unimportant data elements, reducing the chances that a generalization rule will find important data elements as unimportant. | 08-01-2013 |
20130191354 | System and Method for Information Lifecycle Management of Investigation Cases - Various agencies, such as law enforcement and intelligence agencies, deploy monitoring centers that monitor communication networks and analyze the monitored communication. One possible way to reduce storage cost is to apply Information Lifecycle Management (ILM) techniques, which store the content to multiple storage tiers having different performance levels. The monitoring center processes the various items of content in the context of investigation cases. given investigation case may be assigned a certain status, e.g., active or closed. The monitoring center comprises an ILM server that assigns content items to storage tiers based on the investigation cases with which the content items are associated. The ILM server may analyze the state of a given investigation case, and selects an ILM policy based on the state of the case. The ILM policy specifies the storage tier (or tiers) to be used for storing items of data associated with the case. | 07-25-2013 |
20130184011 | SYSTEM AND METHOD FOR LOCATION OF WIRELESS COMMUNICATION TERMINALS USING APPLICATION-LEVEL LOCATION DATA - Methods and systems for tracking the locations of wireless communication terminals such as mobile phones. A location system monitors communication conducted between a wireless communication terminal and a wireless communication network. The monitoring system may monitor the communication by intercepting one or more of the interfaces or links between network elements. The location system decodes the monitored communication, and identifies an interaction between the terminal and a server that provides the terminal with a location-based service. The identification may be performed, for example, by detecting a data pattern that is indicative of the Application Programming Interface (API) of the location-based service. The monitoring system then finds location data in the decoded communication between the terminal and the server. The monitoring system extracts this location data and uses it to track the location of the terminal. | 07-18-2013 |
20130151616 | System and Method for Target Profiling Using Social Network Analysis - A profile or dossier of a user is constructed based partly on data culled from a data network that reveals indirect, network-mediated relationships with other individuals and groups. The profile is assembled from information, such as properties of a target individual to build an initial social circle of the target individual. References to the target individual can be derived from the direct and indirect associations in order to compile a dossier on the target individual from the references to the target individual. The initial social circle may be expanded by building respective new social circles having new associations by crawling a plurality of web sites, and deriving additional references to the target individual from the new associations in the new social circles. According to a further aspect of the method, compiling a dossier includes extracting metadata from the references. | 06-13-2013 |
20130148858 | SYSTEM AND METHOD FOR LINK ANALYSIS BASED ON IMAGE PROCESSING - Methods and systems to identify relationships between individuals by analyzing digital images and automatically detecting individuals who appear together in the images. A link analysis system accepts one or more digital images, and automatically recognizes individuals who appear together in the images. The system may recognize the individuals, for example, by applying a suitable face recognition process to the images. Upon identifying individuals who appear together, the system defines a relationship between them and acts upon the relationship. | 06-13-2013 |
20130115924 | SYSTEM AND METHOD FOR COMBINED PASSIVE AND ACTIVE INTERCEPTION OF MOBILE COMMUNICATION - A hybrid interception system that comprises both a passive interception subsystem and an active interception subsystem that operate jointly to intercept communication of a target wireless terminal. A passive interception system receives the communication without transmitting to the mobile communication terminal. An active interception system intercepts the communication by initiating temporary bidirectional communication with the terminal. The target terminal may be initially detected by the passive interception subsystem, while in other embodiments it is detected by the active interception subsystem. The subsystem that detects the target terminal triggers the other subsystem, so that the target terminal is effectively intercepted jointly by both subsystems. The outputs of both the passive and the active interception are analyzed jointly, stored in a joint data structure, and/or presented jointly to an operator. This joint analysis and presentation increases the quality and intelligence value of the intercepted information. | 05-09-2013 |
20130110764 | SYSTEM AND METHOD OF COMBINED DATABASE SYSTEM | 05-02-2013 |
20130108114 | SYSTEM AND METHOD FOR INTERCEPTION OF IP TRAFFIC BASED ON IMAGE PROCESSING | 05-02-2013 |
20120303648 | SYSTEM AND METHOD FOR KEYWORD SPOTTING USING MULTIPLE CHARACTER ENCODING SCHEMES - Methods and systems for finding search phrases in a body of data that is encoded using any of multiple possible character encoding schemes. An analytics system accepts an input search phrase for searching in a certain body of data. The system identifies two or more candidate character encoding schemes, which may have been used for encoding the body of data. Having determined the candidate encoding schemes, the system translates the input search phrase into multiple encoding-specific search phrases that represent the input search phrase in the respective candidate encoding schemes. The system then searches the body of data for occurrences of the input search phrase using the multiple encoding-specific search phrases. | 11-29-2012 |
20120300983 | SYSTEMS AND METHODS FOR MULTI-PASS ADAPTIVE PEOPLE COUNTING UTILIZING TRAJECTORIES - People are counted in a segment of video with a video processing system that is configured with a first set of parameters. This produces a first output. Based on this first output, a second set of parameters is chosen. People are then counted in the segment of video using the second set of parameters. This produces a second output. People are counted with a video played forward. People are counted with a video played backwards. The results of these two counts are reconciled to produce a more accurate people count. | 11-29-2012 |
20120295615 | SYSTEM AND METHOD FOR JOINT PASSIVE INTERCEPTION OF SATELLITE AND CELLULAR COMMUNICATION - Methods and systems for communication interception that apply joint processing to signals and information obtained from a satellite communication network and from a cellular communication network. A processing unit processes intercepted signals from the satellite and cellular networks using shared hardware. The processing unit extracts information related to target users from communication sessions conducted by the target users in the satellite and cellular networks. The processing unit may store this information in a single data structure, and in particular correlate information pertaining to the same target user in the two networks. The processing unit may correlate the different identifiers used by the target user in the different networks, and use this correlation to enhance the tracking of this user. | 11-22-2012 |
20120290829 | SYSTEM AND METHOD FOR SELECTIVE INSPECTION OF ENCRYPTED TRAFFIC - Inspection of encrypted network traffic where multiple network connections are monitored that carry encrypted data, but only a subset of the network connections are decrypted and inspected. Typically, only network connections that are associated with designated target users whose encrypted data is to be inspected are decrypted. A Network Monitor Center (NMC) dynamically establishes a list of rules for selection of encrypted data connections. The rules are provided to a Secure data Inspection Appliance (SIA) that accepts some or all of the network user encrypted traffic and checks it against a rule table. When detecting an encrypted connection that matches the rule table, the SIA decrypts the connection and provides a copy of the connection plain data to the NMC. The NMC then inspects the plain data for security threats. Once a security threat is found in a connection, the NMC applies predefined consequent actions to this connection. | 11-15-2012 |
20120243793 | METHOD AND SYSTEM FOR EDGE DETECTION - A method executed by a computer system for detecting edges comprises receiving an image comprising a plurality of pixels, determining a phase congruency value for a pixel, where the phase congruency value comprises a plurality of phase congruency components, and determining if the phase congruency value satisfies a phase congruency criteria. If the phase congruency value satisfies the phase congruency criteria, the computer system categorizes the pixel as an edge pixel. If the phase congruency value does not satisfy the phase congruency criteria, the computer system compares a first phase congruency component of the plurality of phase congruency components to a phase congruency component criteria. If the first phase congruency component satisfies the phase congruency component criteria, the computer system categorizes the pixel as an edge pixel, and if the first phase congruency component does not satisfy the phase congruency component criteria, categorizes the pixel as a non-edge pixel. | 09-27-2012 |
20120220271 | SYSTEM AND METHOD FOR SELECTIVE MONITORING OF MOBILE COMMUNICATION TERMINALS BASED ON SPEECH KEY-PHRASES - Methods and systems for monitoring mobile communication terminals. A correlation system selects candidate communication terminals to be monitored, and then attempts to identify whether the candidate terminals are indeed operated by target users. Following successful correlation of a candidate terminal with a target user, various surveillance actions can be performed with respect to the terminal. Correlation of candidate communication terminals with target users is based on identification of speech key-phrases. When evaluating a given candidate terminal, the system analyzes speech that is communicated via the candidate terminal and attempts to detect one or more of the speech key-phrases in the analyzed speech. | 08-30-2012 |
20120215927 | SYSTEM AND METHOD FOR DECODING TRAFFIC OVER PROXY SERVERS - Methods and systems for applying surveillance to client computers that communicate via proxy servers. A decoding system accepts communication packets from a communication network. Based on the received packets, the decoding system identifies that a certain client computer conducts a communication session with a target server via a proxy server. The decoding system processes the packets so as to correlate the identity of the client computer with the identity of the target server. The correlated identities may comprise, for example, Internet Protocol (IP) addresses or Uniform Resource Locators (URLs). | 08-23-2012 |
20120215909 | SYSTEM AND METHOD FOR EFFICIENT CLASSIFICATION AND PROCESSING OF NETWORK TRAFFIC - Methods and systems for analyzing flows of communication packets. A front-end processor associates input packets with flows and forwards each flow to the appropriate unit, typically by querying a flow table that holds a respective classification for each active flow. In general, flows that are not yet classified are forwarded to the classification unit, and the resulting classification is entered in the flow table. Flows that are classified as requested for further analysis are forwarded to an appropriate flow analysis unit. Flows that are classified as not requested for analysis are not subjected to further processing, e.g., discarded or allowed to pass. | 08-23-2012 |
20120213074 | SYSTEM AND METHOD FOR FLOW TABLE MANAGEMENT - Methods and systems for managing the actions that are applied to packet flows by packet processing systems. A packet processing system maintains a flow table, i.e., a list of active flows and respective actions to be applied to the flows. The system classifies each incoming packet into a respective flow, and processes the packet in accordance with the action that is specified for this flow in the flow table. Typically, the system deletes a packet flow from the flow table when it becomes inactive, e.g., when no packets belonging to the flow arrive within a certain time-out period. | 08-23-2012 |
20120116762 | SYSTEM AND METHOD FOR COMMUNICATION TERMINAL SURVEILLANCE BASED ON SPEAKER RECOGNITION - A Candidate Isolation System (CIS) detects subscribers of phone call services as candidates to be surveillance targets. A Voice Matching System (VMS) then decides whether or not a given candidate Communication Terminals (CTs) should be tracked by determining, using speaker recognition techniques, whether the subscriber operating the candidate CT is a known target subscriber. The CIS receives from the network call event data that relate to CTs in the network. The CIS detects candidate CTs using a unique candidate isolation process, which applies predefined selection criteria to the received call events data | 05-10-2012 |
20120108262 | SYSTEM AND METHOD FOR NON-COOPERATIVE STIMULATION OF MOBILE COMMUNICATION TERMINALS - Methods and systems for locating Mobile Stations (MSs) that are served by a Wireless communication Network (WLN) in a given geographical area. The MSs typically communicate with other parties, or connect to the Internet, through the WLN, wherein Base Transceiver Stations (BTSs) serve as the WLN front ends from the MSs perspective. A Stimulating Apparatus (SA) monitors control messages that the BTSs in the area of the SA broadcast to MSs. The SA analyzes the control messages that it receives, selects one transmitting BTS and creates a modified version of the control messages that it has received from the selected BTS. The SA then broadcasts the modified messages on behalf of the selected BTS by using its frequency channel. The discrepant transmission parameters are designed to stimulate any MS that receives them to induce a network event from which the MS location may be estimated. | 05-03-2012 |
20120106378 | SYSTEM AND METHOD FOR IP TARGET TRAFFIC ANALYSIS - Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers. | 05-03-2012 |
20120086555 | SYSTEM AND METHOD FOR CORRELATION OF MOBILE COMMUNICATION TERMINALS AND INDIVIDUALS AT CONTROL CHECKPOINTS - Methods and systems for correlating mobile communication terminals with individuals. The methods and systems take advantage of scenarios where individuals pass through control checkpoints, such as passport control and immigration counters. When an individual is served by a control checkpoint, the individual's mobile communication terminal is known to be located in a well-localized geographical area. At the same time, the individual voluntarily provides some identification information, such as his passport details. Thus, this scenario presents an opportunity to correlate the mobile communication terminal and its user with high reliability. | 04-12-2012 |
20120015626 | SYSTEM AND METHOD FOR DETERMINING COMMONLY USED COMMUNICATION TERMINALS AND FOR IDENTIFYING NOISY ENTITIES IN LARGE-SCALE LINK ANALYSIS - Methods and systems for determining mobile communication terminals (mobiles) that have a common user, or that have a group of users in common. The methods and systems examine change-of-association events of mobiles operating in a network, and correlate the events to determine common mobiles, i.e., mobiles that have the same or similar change-of-association events. The events described are generated by the mobiles themselves automatically, by virtue of the fact that the mobiles are operating in the network. There is thus no need for, and the embodiments described herein do not require, user intervention to generate the events. | 01-19-2012 |
20110238723 | SYSTEMS AND METHODS FOR WEB DECODING - Reconstructing web sessions of target users may be performed by accepting communication packets exchanged over a network during at least one network session associated with a target user. The packets may be processed so as to identify web pages viewed by the target user during the network session and interactions between the target user and the viewed web pages. The network session may be reconstructed as viewed by the target user over time, based on the identified web pages and interactions. The reconstructed network session may be presented to an operator. The interactions may be identified by a pattern of one or more packets that matches a given interaction selected from a set of possible interactions that are available in a given viewed web page. | 09-29-2011 |
20110208630 | METHODS AND SYSTEMS FOR DETECTION OF FINANCIAL CRIME - Systems and methods for evaluating financial transactions. Methods include receiving first indications of financial transactions related to a target user from a financial system, and receiving second indications of communication events, which are related to the target user but are not directly related to any financial transactions. Forensic criterion are evaluated defined over the first and second indications to issue and alert upon meeting the criterion. The forensic criterion may include detecting a money laundering event, a fraud event, or a financial transaction that is not related to the target user. | 08-25-2011 |
20110207474 | SYSTEM AND METHOD FOR MASS CALIBRATION OF RADIO FREQUENCY FINGERPRINT (RF-FP) LOCATION MEASUREMENTS - Systems and methods for location tracking in a communication network. Base stations transmit downlink signals to a plurality of subscriber terminals to define a mapping between geographical locations and respective sets of signal strengths of the downlink signals received from the base stations at the geographical locations. A subset of the subscriber terminals may be selected, and for each subscriber terminal in the subset, first measurements of a geographical location of the subscriber terminal irrespective of the downlink signals is made. Second measurements of the downlink signals received at the subscriber terminal at the geographical location is made and the mapping of the subscribers terminals is updated responsively to the first and second measurements. The geographical locations of the subscriber terminals is updated using the updated mapping. | 08-25-2011 |
20110142217 | METHODS AND SYSTEMS FOR MASS LINK ANALYSIS USING RULE ENGINES - A substantially real-time graph-based rule engine that analyzes connectivities, both direct and indirect relationships, between entities stored in a database as the database is updated (e.g., with CDR or financial transaction data). The rule engine uses pre-defined rules to detect events (i.e., the database updates) that influence the relationship between entities in the database. When the database is updated with events (e.g., CDRs), the real-time rule engine compares the update to any relevant rules. If the real-time based rule engine finds a match between a rule and an update to the database, then the rule engine generates a notification, such as an alert. The alerts may be used to provide notification of, e.g, fraudulent activities. | 06-16-2011 |
20110131208 | SYSTEMS AND METHODS FOR LARGE-SCALE LINK ANALYSIS - Systems and methods for accepting relationship indications based on interaction among entities, where each relationship indication specifies that a respective pair of the entities may be related. A single entity record may be constructed that indicates all the linked entities that have been identified as being related to the entity. The entities may include an individual, a set of individuals, a communication terminal, a plurality of communication terminals, an organization, an e-mail address, a Web-site, a bank account and a home address. An analytics operation may performed, such as identifying a shortest sequence of interrelated entities that relate a first entity with a second entity, and acting upon the identified sequence. | 06-02-2011 |
20110069173 | SYSTEM AND METHOD FOR AUTOMATIC CAMERA HAND-OFF USING LOCATION MEASUREMENTS - Systems and methods for receiving video images from a plurality of video cameras having respective fields of view that cover a geographical region. At a first time, first video images of an object may be output, where the images are captured by a first video camera selected from the plurality of video cameras. Location indications may be received, which specify a geographical location of the object in the geographical region and which are determined independently of the video images. At a second time subsequent to the first time, a second video camera from the plurality may be selected based on the location indications. The output may be switched to the second video images of the object, which are captured by the selected second video camera. | 03-24-2011 |
20110069172 | SYSTEMS AND METHODS FOR LOCATION-BASED MULTIMEDIA - Systems and methods for receiving location indications of a communication terminal engaged in a communication session with a communication network, and selecting from a plurality of cameras having different respective fields of view within a geographical region that contains the geographical location, at least one camera whose field of view covers the geographical location. Images are output of the geographical location captured during the session by the at least one selected camera. The images may be correlated with the location indications by a switch in the communication network. | 03-24-2011 |
20110028162 | SYSTEMS AND METHODS FOR LOCATING COMMUNICATION TERMINALS IN CELLULAR NETWORKS - Methods and systems in a wireless communication network for determining respective distances between a given base transceiver station and one or more other base transceiver stations. An effective location of the given base transceiver station may be calculated that is different from its physical location. The effective location may be use to report an estimated location of a communication terminal communicating with the given base transceiver station. The estimated location may be provided in networks that support both a hard handover or soft handover of the communication terminal between the given base transceiver station and the one or more other base transceiver stations. | 02-03-2011 |
20110018995 | SYSTEMS AND METHODS FOR VIDEO- AND POSITION-BASED IDENTIFICATION - A system having interfaces to receive images from one or more cameras and location information with respect to wireless communication terminals. A notification may be received regarding an individual observed in the images. Next, wireless communication terminals located in a vicinity of the individual may be identified. From the identified wireless communication terminals, identification information applicable to the individual may be obtained. The identification information may be, e.g., personal information related to a subscriber of the given wireless communication terminal. | 01-27-2011 |
20100313267 | SYSTEMS AND METHODS FOR EFFICIENT KEYWORD SPOTTING IN COMMUNICATION TRAFFIC - Methods and systems related to keyword searching processes. A list of keywords may be first represented by a set of short substrings. The substrings are selected such that an occurrence of a substring indicates a possible occurrence of one or more of the keywords. Input data may be initially pre-processed, so as to identify locations in the input data in which the substrings occur. Then, the identified locations are searched for occurrences of the actual keywords. The pre-processing scheme enables the keyword search process to search only in the identified locations of the substrings instead of over the entire input data. | 12-09-2010 |
20100279656 | SYSTEMS AND METHODS FOR CORRELATING MULTIPLE LOCATION SOURCES - A system and method for correlating multiple location sources of mobile users. The method includes accepting a first location of a user from a first system, accepting a second location of the user from a second system and processing the first and second location so as to detect a violation of a predefined rule specifying a legitimate relationship between the first and second locations. An action with respect to the detected violation may then be invoked. | 11-04-2010 |
20100214117 | SYSTEM AND METHOD FOR PREDICTING FUTURE MEETINGS OF WIRELESS USERS - Methods and system for predicting a future location of users of wireless communications terminals. Location information indicating respective locations of multiple wireless communication terminals may be received and processed so as to predict a future meeting among respective users of the wireless communication terminals. An action may be taken with respect to the predicted future meeting. The location information may be received from a wireless communication network to obtain a Point-of-Interest (POI) that is related to one or more of the users from a characteristic location profile of the one or more users. The POI may be indicated as the likely location of the future meeting. | 08-26-2010 |
20100144373 | METHOD AND SYSTEM FOR BORDER CONTROL - A method for location tracking that includes identifying a subset of users of a mobile communication network who are located in a predefined area of interest using a first location subsystem of the mobile communication network. One or more of the identified users are assigned to a second location subsystem of the mobile communication network, which is different from and has a higher resolution than the first location subsystem, to measure their respective locations. In variations, the locations may be passed to an operator, the subset of the users may be identified by passively monitoring location information generated in the mobile communication network, the second location subsystem may be provided with information regarding the users, and profiles of the users may be determined. | 06-10-2010 |
20100137003 | SYSTEM AND METHOD FOR TARGET LOCATION PROFILING - Methods and systems for profiling the locations of users of wireless communication terminals. A profiling engine may accept data points regarding a given target. Each data point may indicate a location of the target at a certain measurement time. The profiling engine may accumulate the data points relative to a periodic time scale having a pre-specified time period. The accumulation process produces a location profile of the target. The location profile may convey information regarding the tracked targets. For example, the profiling engine may use the location profile to improve the location accuracy of a target terminal that is idle for long period of time, to detect deviations from the characteristic location pattern of a target, to detect that a certain sensitive location is being visited regularly by a given target, and/or to identify connections among different targets by detecting similarities or correlations between their location profiles. | 06-03-2010 |
20100039259 | SYSTEM AND METHOD FOR BOARDING AREA SECURITY - A security method that includes defining rules specifying permitted movements of passengers in a transportation terminal. Passengers entering the terminal may be issued a boarding pass having a Radio Frequency Identification (RFID) tag attached thereto. The location of the RFID tag may be measured and responsive to the measured location of the RFID tag, a violation of at least one of the rules by the passenger may be detected. An action with respect to the detected violation may be taken. The rules may define a region that is forbidden for access, a region in which the passengers are expected to be in motion, a region in which the passengers are expected not to be stationary for more than a given time period, etc. | 02-18-2010 |
20100013633 | SYSTEMS AND METHODS FOR VERIFICATION OF WIRELESS TERMINALS ON BOARD VEHICLES USING COUNTRY-OF-ORIGIN INFORMATION - A security method and system for accepting identity information regarding a vehicle. The system intercepts communications between wireless communication terminals located on board a vehicle and a wireless communication network, and processes the intercepted communication so as to identify respective countries of origin of the terminals on the vehicle. A comparison is made between the countries of origin of the terminals and identity information of the vehicle to invoke an action. For example, the comparison may include detecting an inconsistency between the identity information of the vehicle and one or more of the countries of origin of the terminals. | 01-21-2010 |
20090295918 | SYSTEMS AND METHODS FOR VIDEO MONITORING USING LINKED DEVICES - A subject can be tracking using a plurality of physical video monitoring or image acquisition devices deployed in a delimited area. A map represents the delimited area. Icons representing the physical monitoring devices can be placed and configured on the map representing the delimited area. Some or all of the placed and configured video monitoring devices can be logically linked together to form scenes. The video feed from the physical video monitoring devices may be recorded in stable storage. A layout for display of the video feeds may be selected. Upon playing the video feed, whether live or recorded, a subject can be tracked through the delimited area by selecting one of the video monitoring devices in one of the available scenes. | 12-03-2009 |