-
公开(公告)号:US10999295B2
公开(公告)日:2021-05-04
申请号:US16823421
申请日:2020-03-19
Applicant: Verint Systems Ltd.
Inventor: Offri Gil , Omer Ziv , Yuval Altman , Yaron Gvili , Hodaya Shabtay , Omri David , Yitshak Yishay
IPC: H04L29/06 , H04L29/12 , H04L9/06 , G06F16/951 , H04L29/08
Abstract: A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
-
公开(公告)号:US10958613B2
公开(公告)日:2021-03-23
申请号:US16228929
申请日:2018-12-21
Applicant: Verint Systems LTD.
Inventor: Offri Gil , Pinchas Birenbaum , Yitshak Yishay
Abstract: Systems and methods for passive monitoring of computer communication that does not require performing any decryption. A monitoring system receives the traffic exchanged with each relevant application server, and identifies, in the traffic, sequences of messages—or “n-grams”—that appear to belong to a communication session between a pair of users. Subsequently, based on the numbers and types of identified n-grams, the system identifies each pair of users that are likely to be related to one another via the application, in that these users used the application to communicate (actively and/or passively) with one another. The system may identify those sequences of messages that, by virtue of the sizes of the messages in the sequence, and/or other properties of the messages that are readily discernable, indicate a possible user-pair relationship.
-
公开(公告)号:US10936641B2
公开(公告)日:2021-03-02
申请号:US15985157
申请日:2018-05-21
Applicant: Verint Systems Ltd.
Inventor: Roni Romano , Galia Zacay , Rahm Fehr
Abstract: A faster and more streamlined system for providing summary and analysis of large amounts of communication data is described. System and methods are disclosed that employ an ontology to automatically summarize communication data and present the summary to the user in a form that does not require the user to listen to the communication data. In one embodiment, the summary is presented as written snippets, or short fragments, of relevant communication data that capture the meaning of the data relating to a search performed by the user. Such snippets may be based on theme and meaning unit identification.
-
公开(公告)号:US10860566B1
公开(公告)日:2020-12-08
申请号:US15623827
申请日:2017-06-15
Applicant: Verint Systems Ltd.
Inventor: Roni Romano , Yair Horesh
IPC: G06F16/23 , G06F16/2457
Abstract: An embodiment of the method of processing communication data to identify one or more themes within the communication data includes identifying terms in a set of communication data, wherein a term is a word or short phrase, and defining relations in the set of communication data based on the terms, wherein the relation is a pair of terms that appear in proximity to one another. The method further includes identifying themes in the set of communication data based on the relations, wherein a theme is a group of one or more relations that have similar meanings, and storing the terms, the relations, and the themes in the database.
-
25.
公开(公告)号:US20200382322A1
公开(公告)日:2020-12-03
申请号:US16994928
申请日:2020-08-17
Applicant: Verint Systems Ltd.
Inventor: Eithan Goldfarb
Abstract: Systems and methods for obtaining authentication vectors issued, for use by a mobile communication terminal, by a Home Location Register (HLR) that serves a cellular communication network independently of any cooperation with the cellular network. Further to obtaining the authentication vectors, a terminal is caused to communicate over a WiFi WLAN using an encryption key derived from the obtained authentication vectors, e.g., per the EAP-SIM or EAP-AKA protocol. Since the encryption key is known, communication from the terminal is decrypted. The authentication vectors may be obtained by (i) an “impersonating” Visitor Location Register (VLR) server that does not serve the cellular network; (ii) an interrogation device which, by imitating a legitimate base station serving the cellular network, solicits the mobile communication terminal to associate with the interrogation device; or (iii) an SS7 probe, which obtains authentication vectors communicated from the HLR server to other entities on the SS7 network.
-
公开(公告)号:US20200320106A1
公开(公告)日:2020-10-08
申请号:US16833762
申请日:2020-03-30
Applicant: Verint Systems Ltd.
Inventor: Eithan Goldfarb
IPC: G06F16/28 , G06F16/901 , G06F16/29
Abstract: An anomaly-detection system that gathers information relating to the relationships between entities and represents these relationships in a graph that interconnects each pair of related entities. The graph may represent a computer network, in which each node corresponds to a respective device in the network and each edge between two nodes indicates that the devices represented by the nodes exchanged communication with one another in the past. the system monitors each of the entities in the graph, by continually computing a single-entity anomaly score (SEAS) for the entity. If the SEAS exceeds a first threshold the system generates an alert. Otherwise, the system checks whether the SEAS exceeds a second, lower threshold. If so, the system computes a subgraph anomaly score (SAS) for the entity's subgraph. If the SAS exceeds a SAS threshold, an alert is generated. By computing the SAS in this manner resources are conserved.
-
公开(公告)号:US10796155B2
公开(公告)日:2020-10-06
申请号:US15913141
申请日:2018-03-06
Applicant: Verint Systems Ltd.
Inventor: Yaron Ostrovsky-Berman , Ran Gur , Nir Naor , Ran Wronsky , Michael Milman
IPC: G06K9/00 , G06Q10/10 , G06T7/70 , G06F40/103 , G06F40/186
Abstract: Systems and methods of detecting irregular events include the extraction of values for measure in each of a plurality of notifications. The extracted values are stored in a measures database and a distribution is calculated for the values of each of the measures. The extracted values are compared to the calculated distributions to determine if an irregular event has occurred. An irregularity alert is produced if an irregular event has occurred.
-
28.
公开(公告)号:US20200304414A9
公开(公告)日:2020-09-24
申请号:US15411369
申请日:2017-01-20
Applicant: Verint Systems Ltd.
Inventor: Yitshak Yishay
IPC: H04L12/813 , G06N5/04 , G06F17/30 , H04L12/851 , H04L12/26
Abstract: Methods and systems for keyword spotting, i.e., for identifying textual phrases of interest in input data. The input data may be communication packets exchanged in a communication network. A keyword spotting system holds a dictionary (or dictionaries) of textual phrases for searching input data. The input data and the patterns are assigned to multiple different pattern matching algorithms. For example, a share of the traffic is handled by one algorithm and smaller traffic shares may be handled by the others. The system monitors the algorithms performance as they process the data to search for a match. The ratio of traffic splitting among the algorithms is dynamically reassigned or adjusted to maximize the overall performance.
-
公开(公告)号:US20200267067A1
公开(公告)日:2020-08-20
申请号:US16802986
申请日:2020-02-27
Applicant: Verint Systems Ltd.
Inventor: Naomi Frid
Abstract: A packet broker that performs a health-status check of a proxy server while the proxy server processes one or more proxy connections. The packet broker may attempt to exchange a heartbeat signal with the proxy server, and if unsuccessful, the proxy server is assumed to be failing. In such cases, a failover is desirable. Rather than implementing a “hard” failover, in which no further communication packets are directed to the proxy server, a “soft” failover is performed where the packet broker prevents new proxy connections from being processed by the proxy server, but maintains at least one (e.g., all) of the current proxy connections that are being processed by the proxy server.
-
公开(公告)号:US10719540B2
公开(公告)日:2020-07-21
申请号:US15715038
申请日:2017-09-25
Applicant: Verint Systems Ltd.
Inventor: Yitshak Yishay
Abstract: Systems and methods for spotting keywords in data packets are provided. In particular, input data is received to be searched for occurrences of a set of patterns, the input data being divided into multiple segments. Then the input data and the patterns are assigned to first and second pattern matching algorithms, the first pattern matching algorithm is configured to search only within each of the segments, and the second pattern matching algorithm is configured to search across boundaries between adjacent segments. Then the input data is searched using the first and second pattern matching algorithms.
-
-
-
-
-
-
-
-
-