System and method for de-anonymizing actions and messages on networks

    公开(公告)号:US11444956B2

    公开(公告)日:2022-09-13

    申请号:US17221779

    申请日:2021-04-03

    Abstract: A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.

    System and method for tracking users of computer applications

    公开(公告)号:US11336738B2

    公开(公告)日:2022-05-17

    申请号:US17372437

    申请日:2021-07-10

    Abstract: A monitoring system that receives messages that are exchanged with the application server. Relationships between users are posited in response to the times at which the messages are received. A relationship between two users may be posited in response to receiving, at approximately the same time, two messages from the application server that are destined, respectively, for the two users. The near-simultaneous receipt of the two messages indicates that the two messages were sent from the server at approximately the same time, which, in turn, indicates that the two messages may correlate with one another. Further indication of a correlation between the messages, which may increase the level of confidence with which the relationship between the two users is posited, may be found by examining the respective sizes of the messages, which indicate the message types.

    SYSTEM AND METHOD FOR CRYPTOCURRENCY NETWORKS

    公开(公告)号:US20210264421A1

    公开(公告)日:2021-08-26

    申请号:US17179770

    申请日:2021-02-19

    Abstract: A system and method in which one or more probing transactions are performed by transferring respective amounts of a cryptocurrency to one or more cryptocurrency addresses. The system then monitors and ascertains communications traffic exchanged with one or more IP addresses and that at least one of the probing transactions was downloaded to a particular IP address. The system then generates an output that can indicate an association between a cryptocurrency address of interest and the particular IP address.

    SYSTEM AND METHOD FOR KEYWORD SEARCHING USING BOTH STATIC AND DYNAMIC DICTIONARIES

    公开(公告)号:US20200026723A1

    公开(公告)日:2020-01-23

    申请号:US16587940

    申请日:2019-09-30

    Inventor: Yitshak Yishay

    Abstract: An apparatus and techniques for constructing and utilizing a “dynamic dictionary” that is not a compiled dictionary, and therefore does not need to be recompiled in order to be updated. The dynamic dictionary includes respective data structures that represent (i) a management automaton that includes a plurality of management nodes, and (ii) a runtime automaton that is derived from the management automaton and includes a plurality of runtime nodes. The runtime automaton may be used to search input data, such as communication traffic over a network, for keywords of interest, while the management automaton manages the addition of keywords to the dynamic dictionary. Typically, at least two (e.g., exactly two) such dynamic dictionaries are used in combination with a static dictionary.

    System and method for keyword spotting using representative dictionary

    公开(公告)号:US10198427B2

    公开(公告)日:2019-02-05

    申请号:US15704702

    申请日:2017-09-14

    Inventor: Yitshak Yishay

    Abstract: Methods and systems for keyword spotting, i.e., for identifying textual phrases of interest in input data. In the embodiments described herein, the input data comprises communication packets exchanged in a communication network. The disclosed keyword spotting techniques can be used, for example, in applications such as Data Leakage Prevention (DLP), Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS), and spam e-mail detection. A keyword spotting system holds a dictionary of textual phrases for searching input data. In a communication analytics system, for example, the dictionary defines textual phrases to be located in communication packets—such as e-mail addresses or Uniform Resource Locators (URLs).

    SYSTEMS AND METHODS FOR KEYWORD SPOTTING USING ALTERNATING SEARCH ALGORITHMS

    公开(公告)号:US20180075133A1

    公开(公告)日:2018-03-15

    申请号:US15715038

    申请日:2017-09-25

    Inventor: Yitshak Yishay

    Abstract: Systems and methods for spotting keywords in data packets are provided. In particular, input data is received to be searched for occurrences of a set of patterns, the input data being divided into multiple segments. Then the input data and the patterns are assigned to first and second pattern matching algorithms, the first pattern matching algorithm is configured to search only within each of the segments, and the second pattern matching algorithm is configured to search across boundaries between adjacent segments. Then the input data is searched using the first and second pattern matching algorithms.

    Systems and methods for keyword spotting using alternating search algorithms

    公开(公告)号:US09785701B2

    公开(公告)日:2017-10-10

    申请号:US14604137

    申请日:2015-01-23

    Inventor: Yitshak Yishay

    CPC classification number: G06F17/30675 H04L63/1416

    Abstract: Systems and methods for spotting keywords in data packets are provided. In particular, input data is received to be searched for occurrences of a set of patterns, the input data being divided into multiple segments. Then the input data and the patterns are assigned to first and second pattern matching algorithms, the first pattern matching algorithm is configured to search only within each of the segments, and the second pattern matching algorithm is configured to search across boundaries between adjacent segments. Then the input data is searched using the first and second pattern matching algorithms.

    System and method for keyword spotting using representative dictionary

    公开(公告)号:US09639520B2

    公开(公告)日:2017-05-02

    申请号:US14167052

    申请日:2014-01-29

    Inventor: Yitshak Yishay

    Abstract: Methods and systems for keyword spotting, i.e., for identifying textual phrases of interest in input data. In the embodiments described herein, the input data comprises communication packets exchanged in a communication network. The disclosed keyword spotting techniques can be used, for example, in applications such as Data Leakage Prevention (DLP), Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS), and spam e-mail detection. A keyword spotting system holds a dictionary of textual phrases for searching input data. In a communication analytics system, for example, the dictionary defines textual phrases to be located in communication packets—such as e-mail addresses or Uniform Resource Locators (URLs).

    SYSTEM AND METHOD FOR KEYWORD SEARCHING USING BOTH STATIC AND DYNAMIC DICTIONARIES

    公开(公告)号:US20170116351A1

    公开(公告)日:2017-04-27

    申请号:US15299735

    申请日:2016-10-21

    Inventor: Yitshak Yishay

    CPC classification number: G06F16/3331

    Abstract: An apparatus and techniques for constructing and utilizing a “dynamic dictionary” that is not a compiled dictionary, and therefore does not need to be recompiled in order to be updated. The dynamic dictionary includes respective data structures that represent (i) a management automaton that includes a plurality of management nodes, and (ii) a runtime automaton that is derived from the management automaton and includes a plurality of runtime nodes. The runtime automaton may be used to search input data, such as communication traffic over a network, for keywords of interest, while the management automaton manages the addition of keywords to the dynamic dictionary. Typically, at least two (e.g., exactly two) such dynamic dictionaries are used in combination with a static dictionary.

Patent Agency Ranking