System and method for identifying devices behind network address translators based on TCP timestamps

    公开(公告)号:US10715641B2

    公开(公告)日:2020-07-14

    申请号:US16262001

    申请日:2019-01-30

    Inventor: Yitshak Yishay

    Abstract: Methods and systems for monitoring activity on a local area networks (LAN). In particular, embodiments described herein provide systems and methods for associating packets with the devices from which they were communicated, despite the obfuscatory behavior of any network address translators (NAT). A processor first receives packets that were collectively communicated, by a plurality of devices, via a NAT-serviced LAN. The processor aggregates the packets into multiple packet aggregations on a per device basis. Fields that are contained in the respective packet headers of the packets are used. The packet aggregations may be grouped. The embodiments use unencrypted lower-level information (including, for example, IPIDs and domain names), such that aggregation and grouping may be successfully performed even if information in the application layer is encrypted.

    System and method for improved decoding using identified recurring side information

    公开(公告)号:US10680659B2

    公开(公告)日:2020-06-09

    申请号:US16154001

    申请日:2018-10-08

    Abstract: Methods and systems for decoding monitored communication signals using previously identified side information. Information, which is used for decoding a given frame and is provided to the decoder not via the main communication channel between a base station and a mobile station, is referred to herein as “side information.” The side information can also be viewed as extrinsic information that was derived during previous decoding operations. The monitoring system holds, for certain frames, a-priori information of one or more data values that are expected in these frames. Decoding using this a-priori information enables an Error Correcting Code decoder to successfully decode such frames, which would otherwise fail to decode.

    SYSTEMS AND METHODS FOR VIDEO MONITORING USING LINKED DEVICES

    公开(公告)号:US20200177845A1

    公开(公告)日:2020-06-04

    申请号:US16780239

    申请日:2020-02-03

    Abstract: A subject can be tracking using a plurality of physical video monitoring or image acquisition devices deployed in a delimited area. A map represents the delimited area. Icons representing the physical monitoring devices can be placed and configured on the map representing the delimited area. Some or all of the placed and configured video monitoring devices can be logically linked together to form scenes. The video feed from the physical video monitoring devices may be recorded in stable storage. A layout for display of the video feeds may be selected. Upon playing the video feed, whether live or recorded, a subject can be tracked through the delimited area by selecting one of the video monitoring devices in one of the available scenes.

    SYSTEMS AND METHODS FOR MANAGING AND DISPLAYING VIDEO SOURCES

    公开(公告)号:US20200169700A1

    公开(公告)日:2020-05-28

    申请号:US16780174

    申请日:2020-02-03

    Abstract: A video system for video surveillance or video monitoring includes a video source, a video control system, and a video management system. The video management system is configured to receive configuration data and generate maps based on the configuration data, wherein at least one of the maps is associated with the video source. The video management system displays the map associated with the video source and displays a graphical symbol on the map which indicates the location of the video source. The video management system then receives a selection of the video source, receives information associated with the selected video source, and displays the received information.

    Voice activity detection using a soft decision mechanism

    公开(公告)号:US10665253B2

    公开(公告)日:2020-05-26

    申请号:US15959743

    申请日:2018-04-23

    Inventor: Ron Wein

    Abstract: Voice activity detection (VAD) is an enabling technology for a variety of speech based applications. Herein disclosed is a robust VAD algorithm that is also language independent. Rather than classifying short segments of the audio as either “speech” or “silence”, the VAD as disclosed herein employees a soft-decision mechanism. The VAD outputs a speech-presence probability, which is based on a variety of characteristics.

    SYSTEM AND METHOD FOR MAINTAINING A DYNAMIC DICTIONARY

    公开(公告)号:US20200159758A1

    公开(公告)日:2020-05-21

    申请号:US16752955

    申请日:2020-01-27

    Inventor: Yitshak Yishay

    Abstract: An apparatus and techniques for constructing and utilizing a “dynamic dictionary” that is not a compiled dictionary, and therefore does not need to be recompiled in order to be updated. The dynamic dictionary includes respective data structures that represent (i) a management automaton that includes a plurality of management nodes, and (ii) a runtime automaton that is derived from the management automaton and includes a plurality of runtime nodes. The runtime automaton may be used to search input data, such as communication traffic over a network, for keywords of interest, while the management automaton manages the addition of keywords to the dynamic dictionary. Typically, at least two (e.g., exactly two) such dynamic dictionaries are used in combination with a static dictionary.

    System and method for combined network-side and off-air monitoring of wireless networks

    公开(公告)号:US10560842B2

    公开(公告)日:2020-02-11

    申请号:US15008375

    申请日:2016-01-27

    Inventor: Eithan Goldfarb

    Abstract: A monitoring system monitors authentication sessions both on the air interface between the terminals and the network, and on at least one wired network-side interface between network-side elements of the network. The monitoring system constructs a database of sets of network-side authentication parameters using network-side monitoring. Each set of network-side authentication parameters originates from a respective authentication session and is associated with the International Mobile Station Identity (IMSI) of the terminal involved in the session. In order to start decrypting the traffic of a given terminal, the system obtains the off-air authentication parameters of that terminal using off-air monitoring, and finds an entry in the database that matches the air-interface authentication parameters. From the combination of correlated network-side and off-air authentication parameters, the processor is able to extract the parameters needed for decryption.

Patent Agency Ranking