Patent application number | Description | Published |
20080212943 | TRIGGERING EVENTS FOR VIDEO RINGTONES - A system includes a unit to receive triggering events from a network operator and a unit to provide media content to a terminal for playing by a media player on the terminal in response to the triggering events. One embodiment is implemented with an IMS (IP multimedia subsystem). In this embodiment, the unit to receive is an application server of an IMS system and the unit to provide has at least one media resource unit of the IMS system and a community server. The community server associates media content with terminals of the IMS system and in response to triggering events and activates the IMS system to provide media content to a relevant terminal in response to a relevant triggering event. | 09-04-2008 |
20080222625 | SMART CONTACT LIST - An application for a mobile communications device includes a contact list application providing contact list operations for contact details of at least one contact, the contact details including at least one instance of updatable contact data associated with the contact, and an updater updating the updatable contact data from an external update source specified in the updatable contact data. A contact list update method includes, for each contact having an updatable contact detail, accessing an update source specified in the updatable contact detail, receiving at least one of the updated versions from the update source, and assigning the updated version to the contact. A mobile communication device includes a contact list application displaying a media clip upon communication with an entity listed as part of the contact details of a contact and an updater updating the media clip from an external update source specified as part of the contact details. | 09-11-2008 |
20090005122 | ADVERTISEMENT-BASED DIALING - A method for a mobile device includes showing an advertisement clip on the device, displaying a webpage associated with the advertisement clip and upon receipt of a click of a clickable phone number on the webpage, dialing the phone number. | 01-01-2009 |
20090054059 | ROAMING DETECTION - A method includes detecting a roaming status of a mobile communication device communicating with a server as a function of the corresponding IP address of the mobile communications device as presented to the server. | 02-26-2009 |
20110010630 | PERSONALIZATION CONTENT SHARING SYSTEM AND METHOD - A method includes enabling a user to define his/her buddies from among members of a community and enabling the user to select media content to be played on devices of his/her buddies. Another method includes providing media content chosen by a first user to be played by a media player on a device of a second user in response to an identification of the first user. | 01-13-2011 |
20110183724 | GENERATION OF VIDEO CLIPS FROM A FRIEND'S RECENT SOCIAL STREAM - A method for playing ringtones on a user's communications device includes requesting a media ringtone to be generated from at least a media stream of a friend, where the media stream is accessible to the user via a social network, receiving the media ringtone on the device, associating the media ringtone with said friend; and playing the media ringtone upon an occasion of a communications related triggering event between the user and the friend. | 07-28-2011 |
20120071142 | GENERATION OF MULTI-MEDIA RINGTONES FROM A FRIEND'S RECENT SOCIAL DATA - A communications device includes a receiver to receive social data of a friend of a user of the communications device and an animator to animate the social data for playing on the communications device upon an occasion of a communications related triggering event between the user and the friend. | 03-22-2012 |
Patent application number | Description | Published |
20100137003 | SYSTEM AND METHOD FOR TARGET LOCATION PROFILING - Methods and systems for profiling the locations of users of wireless communication terminals. A profiling engine may accept data points regarding a given target. Each data point may indicate a location of the target at a certain measurement time. The profiling engine may accumulate the data points relative to a periodic time scale having a pre-specified time period. The accumulation process produces a location profile of the target. The location profile may convey information regarding the tracked targets. For example, the profiling engine may use the location profile to improve the location accuracy of a target terminal that is idle for long period of time, to detect deviations from the characteristic location pattern of a target, to detect that a certain sensitive location is being visited regularly by a given target, and/or to identify connections among different targets by detecting similarities or correlations between their location profiles. | 06-03-2010 |
20100144373 | METHOD AND SYSTEM FOR BORDER CONTROL - A method for location tracking that includes identifying a subset of users of a mobile communication network who are located in a predefined area of interest using a first location subsystem of the mobile communication network. One or more of the identified users are assigned to a second location subsystem of the mobile communication network, which is different from and has a higher resolution than the first location subsystem, to measure their respective locations. In variations, the locations may be passed to an operator, the subset of the users may be identified by passively monitoring location information generated in the mobile communication network, the second location subsystem may be provided with information regarding the users, and profiles of the users may be determined. | 06-10-2010 |
20100313267 | SYSTEMS AND METHODS FOR EFFICIENT KEYWORD SPOTTING IN COMMUNICATION TRAFFIC - Methods and systems related to keyword searching processes. A list of keywords may be first represented by a set of short substrings. The substrings are selected such that an occurrence of a substring indicates a possible occurrence of one or more of the keywords. Input data may be initially pre-processed, so as to identify locations in the input data in which the substrings occur. Then, the identified locations are searched for occurrences of the actual keywords. The pre-processing scheme enables the keyword search process to search only in the identified locations of the substrings instead of over the entire input data. | 12-09-2010 |
20110131208 | SYSTEMS AND METHODS FOR LARGE-SCALE LINK ANALYSIS - Systems and methods for accepting relationship indications based on interaction among entities, where each relationship indication specifies that a respective pair of the entities may be related. A single entity record may be constructed that indicates all the linked entities that have been identified as being related to the entity. The entities may include an individual, a set of individuals, a communication terminal, a plurality of communication terminals, an organization, an e-mail address, a Web-site, a bank account and a home address. An analytics operation may performed, such as identifying a shortest sequence of interrelated entities that relate a first entity with a second entity, and acting upon the identified sequence. | 06-02-2011 |
20110142217 | METHODS AND SYSTEMS FOR MASS LINK ANALYSIS USING RULE ENGINES - A substantially real-time graph-based rule engine that analyzes connectivities, both direct and indirect relationships, between entities stored in a database as the database is updated (e.g., with CDR or financial transaction data). The rule engine uses pre-defined rules to detect events (i.e., the database updates) that influence the relationship between entities in the database. When the database is updated with events (e.g., CDRs), the real-time rule engine compares the update to any relevant rules. If the real-time based rule engine finds a match between a rule and an update to the database, then the rule engine generates a notification, such as an alert. The alerts may be used to provide notification of, e.g, fraudulent activities. | 06-16-2011 |
20110207474 | SYSTEM AND METHOD FOR MASS CALIBRATION OF RADIO FREQUENCY FINGERPRINT (RF-FP) LOCATION MEASUREMENTS - Systems and methods for location tracking in a communication network. Base stations transmit downlink signals to a plurality of subscriber terminals to define a mapping between geographical locations and respective sets of signal strengths of the downlink signals received from the base stations at the geographical locations. A subset of the subscriber terminals may be selected, and for each subscriber terminal in the subset, first measurements of a geographical location of the subscriber terminal irrespective of the downlink signals is made. Second measurements of the downlink signals received at the subscriber terminal at the geographical location is made and the mapping of the subscribers terminals is updated responsively to the first and second measurements. The geographical locations of the subscriber terminals is updated using the updated mapping. | 08-25-2011 |
20110319052 | SYSTEM AND METHOD FOR DETERMINING COMMONLY USED COMMUNICATION TERMINALS AND FOR IDENTIFYING NOISY ENTITIES IN LARGE-SCALE LINK ANALYSIS - Systems and methods for identifying and characterizing relationships based on communication traffic. The methods may include accepting indications of communication conducted among entities over a communication network, and using a link processor, analyzing the indications so as to identify that two or more of the entities are interrelated by detecting one or more intermediate entities with which the two or more entities communicate. A criterion may be evaluated with respect to the indications associated with a given entity, responsively to meeting the criterion, disqualifying the given entity from serving as an intermediate entity in analyzing the indications. | 12-29-2011 |
20120015626 | SYSTEM AND METHOD FOR DETERMINING COMMONLY USED COMMUNICATION TERMINALS AND FOR IDENTIFYING NOISY ENTITIES IN LARGE-SCALE LINK ANALYSIS - Methods and systems for determining mobile communication terminals (mobiles) that have a common user, or that have a group of users in common. The methods and systems examine change-of-association events of mobiles operating in a network, and correlate the events to determine common mobiles, i.e., mobiles that have the same or similar change-of-association events. The events described are generated by the mobiles themselves automatically, by virtue of the fact that the mobiles are operating in the network. There is thus no need for, and the embodiments described herein do not require, user intervention to generate the events. | 01-19-2012 |
20120116762 | SYSTEM AND METHOD FOR COMMUNICATION TERMINAL SURVEILLANCE BASED ON SPEAKER RECOGNITION - A Candidate Isolation System (CIS) detects subscribers of phone call services as candidates to be surveillance targets. A Voice Matching System (VMS) then decides whether or not a given candidate Communication Terminals (CTs) should be tracked by determining, using speaker recognition techniques, whether the subscriber operating the candidate CT is a known target subscriber. The CIS receives from the network call event data that relate to CTs in the network. The CIS detects candidate CTs using a unique candidate isolation process, which applies predefined selection criteria to the received call events data | 05-10-2012 |
20120213074 | SYSTEM AND METHOD FOR FLOW TABLE MANAGEMENT - Methods and systems for managing the actions that are applied to packet flows by packet processing systems. A packet processing system maintains a flow table, i.e., a list of active flows and respective actions to be applied to the flows. The system classifies each incoming packet into a respective flow, and processes the packet in accordance with the action that is specified for this flow in the flow table. Typically, the system deletes a packet flow from the flow table when it becomes inactive, e.g., when no packets belonging to the flow arrive within a certain time-out period. | 08-23-2012 |
20120215909 | SYSTEM AND METHOD FOR EFFICIENT CLASSIFICATION AND PROCESSING OF NETWORK TRAFFIC - Methods and systems for analyzing flows of communication packets. A front-end processor associates input packets with flows and forwards each flow to the appropriate unit, typically by querying a flow table that holds a respective classification for each active flow. In general, flows that are not yet classified are forwarded to the classification unit, and the resulting classification is entered in the flow table. Flows that are classified as requested for further analysis are forwarded to an appropriate flow analysis unit. Flows that are classified as not requested for analysis are not subjected to further processing, e.g., discarded or allowed to pass. | 08-23-2012 |
20120220271 | SYSTEM AND METHOD FOR SELECTIVE MONITORING OF MOBILE COMMUNICATION TERMINALS BASED ON SPEECH KEY-PHRASES - Methods and systems for monitoring mobile communication terminals. A correlation system selects candidate communication terminals to be monitored, and then attempts to identify whether the candidate terminals are indeed operated by target users. Following successful correlation of a candidate terminal with a target user, various surveillance actions can be performed with respect to the terminal. Correlation of candidate communication terminals with target users is based on identification of speech key-phrases. When evaluating a given candidate terminal, the system analyzes speech that is communicated via the candidate terminal and attempts to detect one or more of the speech key-phrases in the analyzed speech. | 08-30-2012 |
20120303648 | SYSTEM AND METHOD FOR KEYWORD SPOTTING USING MULTIPLE CHARACTER ENCODING SCHEMES - Methods and systems for finding search phrases in a body of data that is encoded using any of multiple possible character encoding schemes. An analytics system accepts an input search phrase for searching in a certain body of data. The system identifies two or more candidate character encoding schemes, which may have been used for encoding the body of data. Having determined the candidate encoding schemes, the system translates the input search phrase into multiple encoding-specific search phrases that represent the input search phrase in the respective candidate encoding schemes. The system then searches the body of data for occurrences of the input search phrase using the multiple encoding-specific search phrases. | 11-29-2012 |
20130344844 | SYSTEMS AND METHODS FOR IDENTIFYING ROGUE BASE STATIONS - Methods and systems for identifying one or more rogue devices within a wireless communication network over a particular geographic location. A rogue base station detection system receives air interface transmissions from base stations belonging to a wireless communication network, as well as from one or more rogue base stations that do not belong to the network and are used for monitoring (e.g., hacking or eavesdropping) communication terminals communicating in the network. The system typically searches for signaling channels and converts the RF signal into GSM/UMTS messages including overcoming the different encryption methods used. The system than analyzes the received transmissions so as to identify suspicious transmissions that may be transmitted by the rogue base stations. | 12-26-2013 |
20140089498 | SYSTEM AND METHOD OF HIGH VOLUME RULE ENGINE - A rule engine configured with at least one hash table which summarizes the rules managed by the engine. The rule engine receives rules and automatically adjusts the hash table in order to relate to added rules and/or in order to remove cancelled rules. The adjustment may be performed while the rule engine is filtering packets, without stopping. The rules may be grouped into a plurality of rule types and for each rule type the rule engine performs one or more accesses to at least one hash table to determine whether any of the rules of that type match the packet. In some embodiments, the rule engine may automatically select the rule types responsive to a set of rules provided to the rule engine and adapt its operation to the specific rules it is currently handling, while not spending resources on checking rule types not currently used. | 03-27-2014 |
20140221004 | SYSTEM AND METHOD FOR GEOGRAPHY-BASED CORRELATION OF CELLULAR AND WLAN IDENTIFIERS - Methods and systems for tracking mobile communication terminals based on their identifiers. The disclosed techniques identify cellular terminals and Wireless Local Area Network (WLAN) terminals that are likely to be carried by the same individual, or cellular and WLAN identifiers that belong to the same multi-mode terminal. A correlation system is connected to a cellular network and to a WLAN. The system receives location coordinates of cellular identifiers used by mobile terminals in the cellular network, and location coordinates of WLAN identifiers used by mobile terminals in the WLAN. Based on the location coordinates, the system is able to construct routes that are traversed by the terminals having the various cellular and WLAN identifiers. The system attempts to find correlations in time and space between the routes. | 08-07-2014 |
20150134768 | SYSTEM AND METHOD FOR CONDITIONAL ANALYSIS OF NETWORK TRAFFIC - Embodiments that are described herein provide improved methods and systems for analyzing network traffic. The disclosed embodiments enable an analytics system to perform complex processing to only new, first occurrences of received content, while refraining from processing duplicate instances of that content. In a typical embodiment, the analytics results regarding the first occurring content are reported and cached in association with the content. For any duplicate instance of the content, the analytics results are retrieved from the cache without re-processing of the duplicate content. When using the disclosed techniques, the system still processes all first occurring content but not duplicate instances of content that was previously received and processed. In the embodiments described herein, input data comprises communication packets exchanged in a communication network. | 05-14-2015 |
20150140997 | SYSTEMS AND METHODS FOR PROTOCOL-BASED IDENTIFICATION OF ROGUE BASE STATIONS - A rogue base station detection system that establishes a communication session with a suspected base station, and verifies whether the base station is rogue or innocent by testing which advanced communication features are supported by the base station. The detection system holds a definition of one or more communication features that are supported by innocent base stations and not by rogue base stations. During a communication session with a suspected base station, the detection system requests the base station to activate these communication features. If the base station does not support the features in question, it is likely to be rogue. | 05-21-2015 |
20150215893 | SYSTEM AND METHOD FOR FINE-RESOLUTION MAPPING OF CELLULAR NETWORK COVERAGE AND CAPACITY - Systems and methods for fine-resolution mapping of cellular network coverage and capacity are described herein. An example method can include passively monitoring communication of multiple communication terminals in a cellular communication network, extracting from the monitored communication multiple data points and cell identifiers, and mapping an actual geographical coverage of at least a given cell of the cellular network based on the multiple data points. In particular, the multiple data points can comprise geographical positions that are measured and reported by the communication terminals while served by respective cells of the cellular communication network. | 07-30-2015 |
20150356581 | SYSTEM AND METHOD FOR DEMOGRAPHIC PROFILING OF MOBILE TERMINAL USERS BASED ON NETWORK-CENTRIC ESTIMATION OF INSTALLED MOBILE APPLICATIONS AND THEIR USAGE PATTERNS - Methods and systems for creating demographic profiles of mobile communication network users. A demographic classification system analyzes network traffic, so as to estimate the specific combination of application classes installed on a given terminal, and usage patterns of the applications over time. This combination of application classes and their respective usage patterns are a highly personalized choice made by the user, and is therefore used by the system to deduce the user's demographic profile. The demographic classification system operates on monitored network traffic, as opposed to obtaining explicit and accurate information regarding the installed applications from the terminal. The system then deduces the demographic profile of the user from the list of estimated application classes. | 12-10-2015 |
20160050537 | SYSTEM AND METHOD FOR GEOGRAPHY-BASED CORRELATION OF CELLULAR AND WLAN IDENTIFIERS - Methods and systems for tracking mobile communication terminals based on their identifiers. The disclosed techniques identify cellular terminals and Wireless Local Area Network (WLAN) terminals that are likely to be carried by the same individual, or cellular and WLAN identifiers that belong to the same multi-mode terminal. A correlation system is connected to a cellular network and to a WLAN. The system receives location coordinates of cellular identifiers used by mobile terminals in the cellular network, and location coordinates of WLAN identifiers used by mobile terminals in the WLAN. Based on the location coordinates, the system is able to construct routes that are traversed by the terminals having the various cellular and WLAN identifiers. The system attempts to find correlations in time and space between the routes. | 02-18-2016 |