Trajectory matching across disjointed video views

    公开(公告)号:US10095954B1

    公开(公告)日:2018-10-09

    申请号:US13743635

    申请日:2013-01-17

    Abstract: Embodiments disclosed herein provide systems and methods for matching trajectories across disjointed video views. In a particular embodiment, a method provides receiving a plurality of tagged trajectories that are tagged with an indicator of which trajectory pairs of the plurality of tagged trajectories are matching trajectory pairs and processing each of the trajectory pairs using each of a plurality of trajectory matching algorithms. The method further provides creating a model for matching trajectories based on the output of each of the plurality of trajectory matching algorithms for each of the pairs. The method further provides receiving a pair of trajectories and processing the pair of trajectories using each of the plurality of the trajectory matching algorithms. The method further provides processing the output of each of the plurality of the trajectory matching algorithms for the pair of trajectories using the model to determine whether the pair of trajectories is matching.

    SYSTEM AND METHOD FOR MALWARE DETECTION LEARNING

    公开(公告)号:US20180278636A1

    公开(公告)日:2018-09-27

    申请号:US15924859

    申请日:2018-03-19

    CPC classification number: H04L63/1425 G06N20/00 H04L63/1441 H04L63/145

    Abstract: Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The system distinguishes between malware transactions and innocent transactions using malware identification models, which it adapts using machine learning algorithms. However, the number and variety of malicious transactions that can be obtained from the protected network are often too limited for effectively training the machine learning algorithms. Therefore, the system obtains additional malicious transactions from another computer network that is known to be relatively rich in malicious activity. The system is thus able to adapt the malware identification models based on a large number of positive examples—The malicious transactions obtained from both the protected network and the infected network. As a result, the malware identification models are adapted with high speed and accuracy.

    Live streaming video over 3D
    234.
    发明授权

    公开(公告)号:US10084994B2

    公开(公告)日:2018-09-25

    申请号:US14104147

    申请日:2013-12-12

    CPC classification number: H04N7/181 G06T19/006 H04N13/156 H04N13/275

    Abstract: A video monitoring system and method comprises a first camera at a first camera location configured to video record a first monitored area, wherein a georeference location of the first monitored area is known, and a virtual 3D model of the monitored zone that includes the first camera location and the first monitored area, wherein the virtual 3D model is georeferenced to a physical location. The system further comprises a processor configured to receive the video recording of the first monitored area and to overlay the video recording of the first monitored area onto a part of the virtual 3D model that corresponds to the georeference location of the first monitored area. A display is also connected to the processor and configured to display the virtual 3D model of the monitored zone overlaid with the video recording of the first monitored area.

    Call summary
    237.
    发明授权

    公开(公告)号:US09977830B2

    公开(公告)日:2018-05-22

    申请号:US14610249

    申请日:2015-01-30

    CPC classification number: G06F17/30719 G06N5/022 G06Q10/10 G06Q30/016

    Abstract: A faster and more streamlined system for providing summary and analysis of large amounts of communication data is described. System and methods are disclosed that employ an ontology to automatically summarize communication data and present the summary to the user in a form that does not require the user to listen to the communication data. In one embodiment, the summary is presented as written snippets, or short fragments, of relevant communication data that capture the meaning of the data relating to a search performed by the user. Such snippets may be based on theme and meaning unit identification.

    Funnel analysis
    239.
    发明授权

    公开(公告)号:US09904927B2

    公开(公告)日:2018-02-27

    申请号:US15409921

    申请日:2017-01-19

    CPC classification number: G06Q30/016 G06N5/022 G06N99/005 G06Q10/0637

    Abstract: Systems, methods, and media for the application of funnel analysis using desktop analytics and textual analytics to map and analyze the flow of customer service interactions. In an example implementation, the method includes: defining at least one flow that is representative of a series of events comprising at least one speech event, at least one Data Processing Activity (DPA) event, and at least one Computer Telephone Integration (CTI) event; receiving customer service interaction data comprising communication data, DPA metadata, and CTI metadata; applying the at least one flow to the customer service interaction data; determining if the customer service interaction data meets the at least one flow; and producing an automated indication based upon the determination.

Patent Agency Ranking