-
公开(公告)号:US10078689B2
公开(公告)日:2018-09-18
申请号:US14529103
申请日:2014-10-30
Applicant: Verint Systems Ltd.
Inventor: Roni Romano
CPC classification number: G06F16/367 , G06F16/287 , G06N5/022 , G06N20/00
Abstract: The disclosed solution uses machine learning-based methods to improve the knowledge extraction process in a specific domain or business environment. By formulizing a specific company's internal knowledge and terminology, the ontology programming accounts for linguistic meaning to surface relevant and important content for analysis. For example, the disclosed ontology programming adapts to the language used in a specific domain, including linguistic patterns and properties, such as word order, relationships between terms, and syntactical variations. Based on the self-training mechanism developed by the inventors, the ontology programming automatically trains itself to understand the domain or environment of the communication data by processing and analyzing a defined corpus of communication data.
-
公开(公告)号:US20180226071A1
公开(公告)日:2018-08-09
申请号:US15428599
申请日:2017-02-09
Applicant: Verint Systems Ltd.
Inventor: Yaron Winter , Saar Carmi
CPC classification number: H04M3/5183 , G06F17/277 , G06F17/2785 , G06F17/279 , G10L15/063 , G10L15/197 , H04M2201/40 , H04M2203/2061
Abstract: A system and method for distinguishing the sentiment of utterances in a dialog is disclosed. The system utilizes a lexicon that is expanded from a seed using unsupervised machine learning. What results is a sentiment classifier that may be optimized for a variety of environments (e.g., conversation, chat, email, etc.), each of which may communicate sentiment differently.
-
公开(公告)号:US10044861B2
公开(公告)日:2018-08-07
申请号:US15286657
申请日:2016-10-06
Applicant: Verint Systems Ltd.
Inventor: Joseph Watson , Christopher J. Jeffs , Oren Stern , Galia Zacay , Omer Ziv
Abstract: A method of evaluating scripts in an interpersonal communication includes monitoring a customer service interaction. At least one portion of a script is identified. At least one script requirement is determined. A determination is made whether the at least one portion of the script meets the at least one script requirement. An alert is generated indicative of a non-compliant script.
-
公开(公告)号:US20180158464A1
公开(公告)日:2018-06-07
申请号:US15839190
申请日:2017-12-12
Applicant: Verint Systems Ltd.
CPC classification number: G10L17/06 , G10L15/02 , G10L15/26 , G10L17/02 , G10L17/04 , G10L17/16 , G10L25/78 , G10L2015/025 , H04M3/5175 , H04M2201/41 , H04M2203/303
Abstract: In a method of diarization of audio data, audio data is segmented into a plurality of utterances. Each utterance is represented as an utterance model representative of a plurality of feature vectors. The utterance models are clustered. A plurality of speaker models are constructed from the clustered utterance models. A hidden Markov model is constructed of the plurality of speaker models. A sequence of identified speaker models is decoded.
-
公开(公告)号:US09984706B2
公开(公告)日:2018-05-29
申请号:US14449770
申请日:2014-08-01
Applicant: Verint Systems Ltd.
Inventor: Ron Wein
IPC: G10L25/78
CPC classification number: G10L25/78
Abstract: Voice activity detection (VAD) is an enabling technology for a variety of speech based applications. Herein disclosed is a robust VAD algorithm that is also language independent. Rather than classifying short segments of the audio as either “speech” or “silence”, the VAD as disclosed herein employees a soft-decision mechanism. The VAD outputs a speech-presence probability, which is based on a variety of characteristics.
-
146.
公开(公告)号:US20180109940A1
公开(公告)日:2018-04-19
申请号:US15714874
申请日:2017-09-25
Applicant: Verint Systems Ltd.
Inventor: Eithan Goldfarb , Doron Breiter , Constantin Tanasa , Victor Ciochina , Nguyen Hoang Nguyen , Tymofii Brezhniev
Abstract: Methods for obtain identifiers, such as International Mobile Subscriber Identities (IMSIs) and International Mobile Station Equipment Identities (IMEIs), of mobile communication terminals, and associate these identifiers with other items of identifying information provided by users of the terminals. A local interrogation device may be installed that imitates a legitimate base station belonging to a cellular network, at a control checkpoint. Local interrogation devices are connected to a global interrogation device in a hierarchical network, whereby the local interrogation devices are assigned a priority that is higher than that of the global interrogation device. The global interrogation device provides cellular coverage to a larger area that contains the control checkpoints, while the local interrogation devices provide more localized cellular coverage to the control checkpoints.
-
公开(公告)号:US09942769B2
公开(公告)日:2018-04-10
申请号:US15334423
申请日:2016-10-26
Applicant: Verint Systems Ltd.
Inventor: Arik Poznanski
CPC classification number: H04W12/12 , H04W12/06 , H04W24/08 , H04W64/003
Abstract: Methods and systems for determining the identity of a genuine Base Station (BS) that serves a rogue BS, i.e., the genuine BS used by the rogue BS to exchange the communication between the solicited terminal and the cellular network. The ability to identify rogue-serving BSs is a valuable tool in combatting rogue BSs. For example, the rogue BS will often be located in close proximity to the rogue-serving BS, at least in closer proximity than other genuine BSs. Identifying the rogue-serving BS may therefore assist in locating the rogue BS. Additionally or alternatively, identifying the rogue-serving BS may assist in interfering with the operation of the rogue BS, and/or obtaining information regarding wireless terminals solicited by the rogue BS.
-
公开(公告)号:US09929920B2
公开(公告)日:2018-03-27
申请号:US14989075
申请日:2016-01-06
Applicant: Verint Systems Ltd.
Inventor: Eithan Goldfarb , Yuval Altman , Naomi Frid , Gur Yaari
CPC classification number: H04L43/026 , H04L43/04 , H04L63/0227 , H04L63/1416 , H04L63/1441 , H04L63/30 , H04L63/306
Abstract: Methods and systems for analyzing flows of communication packets. A front-end processor associates input packets with flows and forwards each flow to the appropriate unit, typically by querying a flow table that holds a respective classification for each active flow. In general, flows that are not yet classified are forwarded to the classification unit, and the resulting classification is entered in the flow table. Flows that are classified as requested for further analysis are forwarded to an appropriate flow analysis unit. Flows that are classified as not requested for analysis are not subjected to further processing, e.g., discarded or allowed to pass.
-
公开(公告)号:US09923913B2
公开(公告)日:2018-03-20
申请号:US15057164
申请日:2016-03-01
Applicant: Verint Systems, Ltd.
Inventor: Yuval Altman , Assaf Yosef Keren , Ido Krupkin
CPC classification number: H04L63/1425 , G06N99/005 , H04L63/1441 , H04L63/145
Abstract: Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The system distinguishes between malware transactions and innocent transactions using malware identification models, which it adapts using machine learning algorithms. However, the number and variety of malicious transactions that can be obtained from the protected network are often too limited for effectively training the machine learning algorithms. Therefore, the system obtains additional malicious transactions from another computer network that is known to be relatively rich in malicious activity. The system is thus able to adapt the malware identification models based on a large number of positive examples—The malicious transactions obtained from both the protected network and the infected network. As a result, the malware identification models are adapted with high speed and accuracy.
-
公开(公告)号:US20180075133A1
公开(公告)日:2018-03-15
申请号:US15715038
申请日:2017-09-25
Applicant: Verint Systems Ltd.
Inventor: Yitshak Yishay
Abstract: Systems and methods for spotting keywords in data packets are provided. In particular, input data is received to be searched for occurrences of a set of patterns, the input data being divided into multiple segments. Then the input data and the patterns are assigned to first and second pattern matching algorithms, the first pattern matching algorithm is configured to search only within each of the segments, and the second pattern matching algorithm is configured to search across boundaries between adjacent segments. Then the input data is searched using the first and second pattern matching algorithms.
-
-
-
-
-
-
-
-
-