System and method for passive decoding of social network activity using replica database
    91.
    发明申请
    System and method for passive decoding of social network activity using replica database 审中-公开
    使用复制数据库对社交网络活动进行被动解码的系统和方法

    公开(公告)号:US20140095700A1

    公开(公告)日:2014-04-03

    申请号:US13953117

    申请日:2013-07-29

    Inventor: Amir Kaushansky

    Abstract: Methods and systems for obtaining reconstructing activities of target users in social networks, such as for decoding and displaying social network sessions held by a target user, or identifying other users who are associated with the target user. This analysis is typically carried out based on passive monitoring of network traffic. A social network decoding system constructs and maintains a replica database, which mimics a portion of the user profile database maintained by the social network servers. The social network decoding system monitors network traffic between users and social network servers. Based on the monitored traffic, the system gradually constructs a replica database that attempts to replicate a portion of the social network user profile database, relating to one or more predefined target users. Using the replica database, the system is able to correlate loosely-coupled information objects, events and interactions between the target users and social network pages.

    Abstract translation: 用于获得社交网络中的目标用户的重建活动的方法和系统,例如用于解码和显示由目标用户持有的社交网络会话,或识别与目标用户相关联的其他用户。 这种分析通常是基于被动监控网络流量进行的。 社交网络解码系统构建和维护副本数据库,其模拟由社交网络服务器维护的用户简档数据库的一部分。 社交网络解码系统监控用户和社交网络服务器之间的网络流量。 基于所监视的流量,系统逐渐构建复制数据库,该副本数据库尝试复制与一个或多个预定义目标用户相关的一部分社交网络用户简档数据库。 使用副本数据库,系统能够将松散耦合的信息对象,事件和目标用户与社交网络页面之间的交互相关联。

    SYSTEM AND METHOD FOR LINK ANALYSIS BASED ON IMAGE PROCESSING
    92.
    发明申请
    SYSTEM AND METHOD FOR LINK ANALYSIS BASED ON IMAGE PROCESSING 有权
    基于图像处理的链接分析系统与方法

    公开(公告)号:US20130148858A1

    公开(公告)日:2013-06-13

    申请号:US13663401

    申请日:2012-10-29

    Abstract: Methods and systems to identify relationships between individuals by analyzing digital images and automatically detecting individuals who appear together in the images. A link analysis system accepts one or more digital images, and automatically recognizes individuals who appear together in the images. The system may recognize the individuals, for example, by applying a suitable face recognition process to the images. Upon identifying individuals who appear together, the system defines a relationship between them and acts upon the relationship.

    Abstract translation: 通过分析数字图像并自动检测出现在图像中的人物来识别个人之间的关系的方法和系统。 链接分析系统接受一个或多个数字图像,并自动识别在图像中一起出现的个体。 系统可以例如通过对图像应用合适的面部识别过程来识别个体。 在确定出现在一起的个人时,系统定义了他们之间的关系,并对关系采取行动。

    Voice activity detection using a soft decision mechanism

    公开(公告)号:US11670325B2

    公开(公告)日:2023-06-06

    申请号:US16880560

    申请日:2020-05-21

    Inventor: Ron Wein

    CPC classification number: G10L25/78

    Abstract: Voice activity detection (VAD) is an enabling technology for a variety of speech based applications. Herein disclosed is a robust VAD algorithm that is also language independent. Rather than classifying short segments of the audio as either “speech” or “silence”, the VAD as disclosed herein employees a soft-decision mechanism. The VAD outputs a speech-presence probability, which is based on a variety of characteristics.

    Ontology expansion using entity-association rules and abstract relations

    公开(公告)号:US11663411B2

    公开(公告)日:2023-05-30

    申请号:US17225589

    申请日:2021-04-08

    CPC classification number: G06F40/289 G06F16/367 G06F40/284

    Abstract: A method for expanding an initial ontology via processing of communication data, wherein the initial ontology is a structural representation of language elements comprising a set of entities, a set of terms, a set of term-entity associations, a set of entity-association rules, a set of abstract relations, and a set of relation instances. A method for extracting a set of significant phrases and a set of significant phrase co-occurrences from an input set of documents further includes utilizing the terms to identify relations within the training set of communication data, wherein a relation is a pair of terms that appear in proximity to one another.

    System and method for de-anonymizing actions and messages on networks

    公开(公告)号:US11444956B2

    公开(公告)日:2022-09-13

    申请号:US17221779

    申请日:2021-04-03

    Abstract: A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.

    System and method for decrypting communication exchanged on a wireless local area network

    公开(公告)号:US11381977B2

    公开(公告)日:2022-07-05

    申请号:US16994928

    申请日:2020-08-17

    Inventor: Eithan Goldfarb

    Abstract: Systems and methods for obtaining authentication vectors issued, for use by a mobile communication terminal, by a Home Location Register (HLR) that serves a cellular communication network independently of any cooperation with the cellular network. Further to obtaining the authentication vectors, a terminal is caused to communicate over a WiFi WLAN using an encryption key derived from the obtained authentication vectors, e.g., per the EAP-SIM or EAP-AKA protocol. Since the encryption key is known, communication from the terminal is decrypted. The authentication vectors may be obtained by (i) an “impersonating” Visitor Location Register (VLR) server that does not serve the cellular network; (ii) an interrogation device which, by imitating a legitimate base station serving the cellular network, solicits the mobile communication terminal to associate with the interrogation device; or (iii) an SS7 probe, which obtains authentication vectors communicated from the HLR server to other entities on the SS7 network.

    LABELING/NAMES OF THEMES
    99.
    发明申请

    公开(公告)号:US20220156305A1

    公开(公告)日:2022-05-19

    申请号:US17666388

    申请日:2022-02-07

    Inventor: Roni Romano

    Abstract: By formulizing a specific company's internal knowledge and terminology, the ontology programming accounts for linguistic meaning to surface relevant and important content for analysis. The ontology is built on the premise that meaningful terms are detected in the corpus and then classified according to specific semantic concepts, or entities. Once the main terms are defined, direct relations or linkages can be formed between these terms and their associated entities. Then, the relations are grouped into themes, which are groups or abstracts that contain synonymous relations. The disclosed ontology programming adapts to the language used in a specific domain, including linguistic patterns and properties, such as word order, relationships between terms, and syntactical variations. The ontology programming automatically trains itself to understand the domain or environment of the communication data by processing and analyzing a defined corpus of communication data.

Patent Agency Ranking