-
31.
公开(公告)号:US10715641B2
公开(公告)日:2020-07-14
申请号:US16262001
申请日:2019-01-30
Applicant: Verint Systems LTD.
Inventor: Yitshak Yishay
Abstract: Methods and systems for monitoring activity on a local area networks (LAN). In particular, embodiments described herein provide systems and methods for associating packets with the devices from which they were communicated, despite the obfuscatory behavior of any network address translators (NAT). A processor first receives packets that were collectively communicated, by a plurality of devices, via a NAT-serviced LAN. The processor aggregates the packets into multiple packet aggregations on a per device basis. Fields that are contained in the respective packet headers of the packets are used. The packet aggregations may be grouped. The embodiments use unencrypted lower-level information (including, for example, IPIDs and domain names), such that aggregation and grouping may be successfully performed even if information in the application layer is encrypted.
-
公开(公告)号:US10680659B2
公开(公告)日:2020-06-09
申请号:US16154001
申请日:2018-10-08
Applicant: Verint Systems Ltd.
Inventor: Arik Poznanski , Benjamin Imanilov
Abstract: Methods and systems for decoding monitored communication signals using previously identified side information. Information, which is used for decoding a given frame and is provided to the decoder not via the main communication channel between a base station and a mobile station, is referred to herein as “side information.” The side information can also be viewed as extrinsic information that was derived during previous decoding operations. The monitoring system holds, for certain frames, a-priori information of one or more data values that are expected in these frames. Decoding using this a-priori information enables an Error Correcting Code decoder to successfully decode such frames, which would otherwise fail to decode.
-
公开(公告)号:US20200177845A1
公开(公告)日:2020-06-04
申请号:US16780239
申请日:2020-02-03
Applicant: Verint Systems Ltd.
Inventor: Itsik Horovitz , Shmuel Kiro , Or Sheffet
IPC: H04N7/18 , G06K9/00 , G06F3/0484 , G06F3/0481
Abstract: A subject can be tracking using a plurality of physical video monitoring or image acquisition devices deployed in a delimited area. A map represents the delimited area. Icons representing the physical monitoring devices can be placed and configured on the map representing the delimited area. Some or all of the placed and configured video monitoring devices can be logically linked together to form scenes. The video feed from the physical video monitoring devices may be recorded in stable storage. A layout for display of the video feeds may be selected. Upon playing the video feed, whether live or recorded, a subject can be tracked through the delimited area by selecting one of the video monitoring devices in one of the available scenes.
-
公开(公告)号:US20200169700A1
公开(公告)日:2020-05-28
申请号:US16780174
申请日:2020-02-03
Applicant: Verint Systems Ltd.
Inventor: Oren Golan , Boaz Dudovich , Shahar Daliyot , Ron Schwartz
IPC: H04N7/18
Abstract: A video system for video surveillance or video monitoring includes a video source, a video control system, and a video management system. The video management system is configured to receive configuration data and generate maps based on the configuration data, wherein at least one of the maps is associated with the video source. The video management system displays the map associated with the video source and displays a graphical symbol on the map which indicates the location of the video source. The video management system then receives a selection of the video source, receives information associated with the selected video source, and displays the received information.
-
公开(公告)号:US20200168209A1
公开(公告)日:2020-05-28
申请号:US16780340
申请日:2020-02-03
Applicant: Verint Systems Ltd.
Inventor: Jeffery Michael Iannone , Ron Wein , Omer Ziv
Abstract: Systems and methods of script identification in audio data obtained from audio data. The audio data is segmented into a plurality of utterances. A script model representative of a script text is obtained. The plurality of utterances are decoded with the script model. A determination is made if the script text occurred in the audio data.
-
公开(公告)号:US10665253B2
公开(公告)日:2020-05-26
申请号:US15959743
申请日:2018-04-23
Applicant: Verint Systems Ltd.
Inventor: Ron Wein
Abstract: Voice activity detection (VAD) is an enabling technology for a variety of speech based applications. Herein disclosed is a robust VAD algorithm that is also language independent. Rather than classifying short segments of the audio as either “speech” or “silence”, the VAD as disclosed herein employees a soft-decision mechanism. The VAD outputs a speech-presence probability, which is based on a variety of characteristics.
-
公开(公告)号:US20200159758A1
公开(公告)日:2020-05-21
申请号:US16752955
申请日:2020-01-27
Applicant: Verint Systems Ltd.
Inventor: Yitshak Yishay
Abstract: An apparatus and techniques for constructing and utilizing a “dynamic dictionary” that is not a compiled dictionary, and therefore does not need to be recompiled in order to be updated. The dynamic dictionary includes respective data structures that represent (i) a management automaton that includes a plurality of management nodes, and (ii) a runtime automaton that is derived from the management automaton and includes a plurality of runtime nodes. The runtime automaton may be used to search input data, such as communication traffic over a network, for keywords of interest, while the management automaton manages the addition of keywords to the dynamic dictionary. Typically, at least two (e.g., exactly two) such dynamic dictionaries are used in combination with a static dictionary.
-
38.
公开(公告)号:US20200128389A1
公开(公告)日:2020-04-23
申请号:US16717227
申请日:2019-12-17
Applicant: Verint Systems Ltd.
Inventor: Eithan Goldfarb , Doron Breiter , Constantin Tanasa , Victor Ciochina , Nguyen Hoang Nguyen , Tymofii Brezhniev
Abstract: Methods for obtain identifiers, such as International Mobile Subscriber Identities (IMSIs) and International Mobile Station Equipment Identities (IMEIs), of mobile communication terminals, and associate these identifiers with other items of identifying information provided by users of the terminals. A local interrogation device may be installed that imitates a legitimate base station belonging to a cellular network, at a control checkpoint. Local interrogation devices are connected to a global interrogation device in a hierarchical network, whereby the local interrogation devices are assigned a priority that is higher than that of the global interrogation device. The global interrogation device provides cellular coverage to a larger area that contains the control checkpoints, while the local interrogation devices provide more localized cellular coverage to the control checkpoints.
-
公开(公告)号:US10573297B2
公开(公告)日:2020-02-25
申请号:US15217277
申请日:2016-07-22
Applicant: Verint Systems Ltd.
Inventor: Jeffrey Michael Iannone , Ron Wein , Omer Ziv
Abstract: Systems and methods of script identification in audio data obtained from audio data. The audio data is segmented into a plurality of utterances. A script model representative of a script text is obtained. The plurality of utterances are decoded with the script model. A determination is made if the script text occurred in the audio data.
-
公开(公告)号:US10560842B2
公开(公告)日:2020-02-11
申请号:US15008375
申请日:2016-01-27
Applicant: Verint Systems Ltd.
Inventor: Eithan Goldfarb
Abstract: A monitoring system monitors authentication sessions both on the air interface between the terminals and the network, and on at least one wired network-side interface between network-side elements of the network. The monitoring system constructs a database of sets of network-side authentication parameters using network-side monitoring. Each set of network-side authentication parameters originates from a respective authentication session and is associated with the International Mobile Station Identity (IMSI) of the terminal involved in the session. In order to start decrypting the traffic of a given terminal, the system obtains the off-air authentication parameters of that terminal using off-air monitoring, and finds an entry in the database that matches the air-interface authentication parameters. From the combination of correlated network-side and off-air authentication parameters, the processor is able to extract the parameters needed for decryption.
-
-
-
-
-
-
-
-
-