SYSTEM AND METHOD FOR CELLULAR CALL MONITORING USING DOWNLINK CHANNEL CORRELATION
    191.
    发明申请
    SYSTEM AND METHOD FOR CELLULAR CALL MONITORING USING DOWNLINK CHANNEL CORRELATION 有权
    使用下行链路信道相关的蜂窝电话监控的系统和方法

    公开(公告)号:US20140024349A1

    公开(公告)日:2014-01-23

    申请号:US13872224

    申请日:2013-04-29

    Abstract: Methods and systems for monitoring communication of mobile communication terminals, such as cellular phones. An off-air monitoring system reconstructs both directions of a call conducted between two mobile terminals by receiving only downlink channels. The off-air monitoring system receives multiple downlink transmissions transmitted by base stations in a wireless communication network. The system uses the received downlink transmissions to reconstruct the bidirectional call content of calls conducted between wireless terminals. In order to reconstruct the bidirectional content of a given call, the system identifies and correlates the two downlink transmissions of that call from among the multiple received downlink transmissions.

    Abstract translation: 用于监视诸如蜂窝电话的移动通信终端的通信的方法和系统。 无线监控系统通过仅接收下行链路信道来重建在两个移动终端之间进行呼叫的两个方向。 空中监视系统在无线通信网络中接收由基站发送的多个下行链路传输。 系统使用所接收的下行链路传输来重建在无线终端之间进行的呼叫的双向呼叫内容。 为了重建给定呼叫的双向内容,系统从多个接收的下行链路传输中识别并关联该呼叫的两个下行链路传输。

    SYSTEMS AND METHODS FOR COMBINED PHYSICAL AND CYBER DATA SECURITY
    192.
    发明申请
    SYSTEMS AND METHODS FOR COMBINED PHYSICAL AND CYBER DATA SECURITY 有权
    用于组合的物理和数据安全的系统和方法

    公开(公告)号:US20130347060A1

    公开(公告)日:2013-12-26

    申请号:US13868220

    申请日:2013-04-23

    Inventor: Gideon Hazzani

    CPC classification number: G06F21/554

    Abstract: Methods and systems for protecting computer systems against intrusion. The disclosed techniques detect intrusions by jointly considering both cyber security events and physical security events. In some embodiments, a correlation subsystem receives information related to the computer system and its physical environment from various information sources in the cyber domain and in the physical domain. The correlation subsystem analyzes the information and identifies both cyber security events and physical security events. The correlation subsystem finds cyber security events and physical security events that are correlative with one another, and uses this correlation to detect intrusions.

    Abstract translation: 防止计算机系统入侵的方法和系统。 所公开的技术通过共同考虑网络安全事件和物理安全事件来检测入侵。 在一些实施例中,相关子系统从网络域和物理域中的各种信息源接收与计算机系统及其物理环境有关的信息。 相关子系统分析信息并识别网络安全事件和物理安全事件。 相关子系统发现彼此相关的网络安全事件和物理安全事件,并使用该相关性来检测入侵。

    System and Method for Target Profiling Using Social Network Analysis
    193.
    发明申请
    System and Method for Target Profiling Using Social Network Analysis 有权
    使用社交网络分析的目标分析系统和方法

    公开(公告)号:US20130151616A1

    公开(公告)日:2013-06-13

    申请号:US13663403

    申请日:2012-10-29

    CPC classification number: H04L67/22 H04L51/32 H04W4/21

    Abstract: A profile or dossier of a user is constructed based partly on data culled from a data network that reveals indirect, network-mediated relationships with other individuals and groups. The profile is assembled from information, such as properties of a target individual to build an initial social circle of the target individual. References to the target individual can be derived from the direct and indirect associations in order to compile a dossier on the target individual from the references to the target individual. The initial social circle may be expanded by building respective new social circles having new associations by crawling a plurality of web sites, and deriving additional references to the target individual from the new associations in the new social circles. According to a further aspect of the method, compiling a dossier includes extracting metadata from the references.

    Abstract translation: 用户的简档或档案部分基于从数据网络中提取的数据构建,该数据显示与其他个人和组间接的网络介入的关系。 该资料是从目标个人的财产等信息汇集而成,以建立目标个人的初始社交圈。 对目标个体的引用可以从直接和间接关联中得出,以便从目标个体的参考文献中编制目标个体的档案。 可以通过爬行多个网站建立具有新协会的新社交圈,并从新的社交圈中的新协会中引用目标个人,从而扩大初始社交圈。 根据该方法的另一方面,编译档案包括从引用中提取元数据。

    System and method for identifying relationships between users of computer applications

    公开(公告)号:US11575625B2

    公开(公告)日:2023-02-07

    申请号:US15966009

    申请日:2018-04-30

    Abstract: A monitoring system that receives messages that are exchanged with the application server. Relationships between users are posited in response to the times at which the messages are received. A relationship between two users may be posited in response to receiving, at approximately the same time, two messages from the application server that are destined, respectively, for the two users. The near-simultaneous receipt of the two messages indicates that the two messages were sent from the server at approximately the same time, which, in turn, indicates that the two messages may correlate with one another. Further indication of a correlation between the messages, which may increase the level of confidence with which the relationship between the two users is posited, may be found by examining the respective sizes of the messages, which indicate the message types.

    System and method for efficient storage of small files on file-system-based storage devices

    公开(公告)号:US11573924B2

    公开(公告)日:2023-02-07

    申请号:US16578516

    申请日:2019-09-23

    Inventor: Yossi Chai

    Abstract: Methods and systems for storing and managing large numbers of small files. A data processing system includes clients that generate large numbers be stored on a storage device managed by a File System (FS). An Archive Server (AS) receives multiple files from the client, archives the files in larger archives, and sends the archives to the FS for storage. When requested to read a file, the AS retrieves the archive in which the file is stored, extracts the file and sends it to the requesting client. In other words, the AS communicates with the clients in individual file units, and with the storage device in archive units. The AS is typically constructed as an add-on layer on top of a conventional FS, which enables the FS to handle small files efficiently without modification.

    SYSTEM AND METHOD FOR MONITORING SECURITY OF A COMPUTER NETWORK

    公开(公告)号:US20220368713A1

    公开(公告)日:2022-11-17

    申请号:US17531723

    申请日:2021-11-20

    Abstract: Methods and systems to identify the domain names that can potentially be used for delivering instructions to a bot, before bots on a computer network succeed in obtaining the instructions. The system maintains a device rating for each device that reflects a likelihood that the device is infected by malware. The system also maintains a domain-name rating for each device that reflects a likelihood that the domain name is malicious. When a device attempts to access a particular domain name, the domain-name rating of the domain name is updated in light of the device rating of the device, and/or update the device rating of the device in light of the domain-name rating.

    Labeling/names of themes
    200.
    发明授权

    公开(公告)号:US11243994B2

    公开(公告)日:2022-02-08

    申请号:US16243600

    申请日:2019-01-09

    Inventor: Roni Romano

    Abstract: By formulizing a specific company's internal knowledge and terminology, the ontology programming accounts for linguistic meaning to surface relevant and important content for analysis. The ontology is built on the premise that meaningful terms are detected in the corpus and then classified according to specific semantic concepts, or entities. Once the main terms are defined, direct relations or linkages can be formed between these terms and their associated entities. Then, the relations are grouped into themes, which are groups or abstracts that contain synonymous relations. The disclosed ontology programming adapts to the language used in a specific domain, including linguistic patterns and properties, such as word order, relationships between terms, and syntactical variations. The ontology programming automatically trains itself to understand the domain or environment of the communication data by processing and analyzing a defined corpus of communication data.

Patent Agency Ranking