System and method for accurate location of wireless terminals using mobile interrogation device

    公开(公告)号:US10560806B2

    公开(公告)日:2020-02-11

    申请号:US16351932

    申请日:2019-03-13

    Abstract: A method includes moving an interrogation device through multiple geographical positions. At each geographical position of the interrogation device, a wireless communication terminal is solicited to establish temporary communication with the interrogation device, and a distance value indicative of a distance between the wireless communication terminal and the interrogation device as well as a velocity of the interrogation device is estimated using the temporary communication. A geographical location of the wireless communication terminal is calculated based on multiple estimated distance values and velocities of the interrogation device corresponding to the respective multiple geographical positions of the interrogation device.

    SYSTEM AND METHOD FOR USING A USER-ACTION LOG TO LEARN TO CLASSIFY ENCRYPTED TRAFFIC

    公开(公告)号:US20200042897A1

    公开(公告)日:2020-02-06

    申请号:US16527373

    申请日:2019-07-31

    Abstract: Machine learning techniques for classifying encrypted traffic with a high degree of accuracy. The techniques do not require decrypting any traffic and may not require any manually-labeled traffic samples. An automated system uses an application of interest to perform a large number of user actions of various types. The system further records, in a log, the respective times at which the actions were performed. The system further receives the encrypted traffic exchanged between the system and the application server, and records properties of this traffic in a time series. Subsequently, by correlating between the times in the log and the times at which the traffic was received, the system matches each of the user actions with a corresponding portion of the traffic, which is assumed to have been generated by the user action. The system thus automatically builds a labeled training set, which may be used to train a network-traffic classifier.

    Systems and methods for managing and displaying video sources

    公开(公告)号:US10554934B2

    公开(公告)日:2020-02-04

    申请号:US16111377

    申请日:2018-08-24

    Abstract: A video system for video surveillance or video monitoring includes a video source, a video control system, and a video management system. The video management system is configured to receive configuration data and generate maps based on the configuration data, wherein at least one of the maps is associated with the video source. The video management system displays the map associated with the video source and displays a graphical symbol on the map which indicates the location of the video source. The video management system then receives a selection of the video source, receives information associated with the selected video source, and displays the received information.

    DIARIZATION USING LINGUISTIC LABELING
    44.
    发明申请

    公开(公告)号:US20200035245A1

    公开(公告)日:2020-01-30

    申请号:US16587518

    申请日:2019-09-30

    Abstract: Systems and methods of diarization using linguistic labeling include receiving a set of diarized textual transcripts. A least one heuristic is automatedly applied to the diarized textual transcripts to select transcripts likely to be associated with an identified group of speakers. The selected transcripts are analyzed to create at least one linguistic model. The linguistic model is applied to transcripted audio data to label a portion of the transcripted audio data as having been spoken by the identified group of speakers. Still further embodiments of diarization using linguistic labeling may serve to label agent speech and customer speech in a recorded and transcripted customer service interaction.

    SYSTEM AND METHOD FOR IMPROVED DECODING USING IDENTIFIED RECURRING SIDE INFORMATION

    公开(公告)号:US20190123767A1

    公开(公告)日:2019-04-25

    申请号:US16154001

    申请日:2018-10-08

    CPC classification number: H03M13/41 H03M13/3723 H04L1/0054

    Abstract: Methods and systems for decoding monitored communication signals using previously identified side information. Information, which is used for decoding a given frame and is provided to the decoder not via the main communication channel between a base station and a mobile station, is referred to herein as “side information.” The side information can also be viewed as extrinsic information that was derived during previous decoding operations. The monitoring system holds, for certain frames, a-priori information of one or more data values that are expected in these frames. Decoding using this a-priori information enables an Error Correcting Code decoder to successfully decode such frames, which would otherwise fail to decode.

    Tagging relations with N-best
    46.
    发明授权

    公开(公告)号:US10255346B2

    公开(公告)日:2019-04-09

    申请号:US14608737

    申请日:2015-01-29

    Abstract: Systems, methods, and media for developing ontologies and analyzing communication data are provided herein. In an example implementation, the method includes: identifying terms in in a set of communication data; identifying a list of possible relations of the identified terms; scoring the possible relations according to a set of predefined merits; ranking the possible relations into a list of possible relations in descending order according to their score; and tagging relations in the set of communication data. The relations may be tagged by identifying the possible relations in the communication data in order corresponding with the list of possible relations. The possible relations that have lower rankings that conflict with higher ranking relations are not tagged. The conflicts may be determined by a predefined set of conflict criteria.

    SYSTEM AND METHOD FOR IDENTIFYING IMAGING DEVICES

    公开(公告)号:US20190068450A1

    公开(公告)日:2019-02-28

    申请号:US16113950

    申请日:2018-08-27

    Inventor: Sharon Rousso

    Abstract: Embodiments described herein facilitate receipt of image data, by providing apparatus and methods for constructing and/or utilizing a database of networked imaging devices. Communication transmitted over a network is identified as being from an imaging device. One or more identifiers, under which the communication is transmitted, are then extracted from the communication. For example, one or more Internet Protocol (IP) addresses may be extracted. The identifiers are associated in a database with respective physical locations. When a particular area is defined as an area of interest, at least one of the identifiers is selected from the database, the selected identifier being associated with a physical location that is within, or near, the area of interest. Image data transmitted under the selected identifier is then received by the interested parties.

    SYSTEM AND METHOD FOR IDENTIFYING COMMUNICATION SESSION PARTICIPANTS BASED ON TRAFFIC PATTERNS

    公开(公告)号:US20190052713A1

    公开(公告)日:2019-02-14

    申请号:US16165216

    申请日:2018-10-19

    Inventor: Haim Zlatokrilov

    Abstract: A monitoring system monitors traffic flows that are exchanged over a communication network. The system characterizes the flows in terms of their temporal traffic features, and uses this characterization to identify communication devices that participate in the same communication session. By identifying the communication devices that serve as endpoints in the same session, the system establishes correlations between the users of these communication devices. The monitoring system characterizes the flows using traffic features such as flow start time, flow end time, inter-burst time and burst size, and/or statistical properties of such features. The system typically generates compressed-form representations (“signatures”) for the traffic flows based on the temporal traffic features, and finds matching flows by finding similarities between signatures.

    SYSTEM AND METHOD FOR MALWARE DETECTION
    50.
    发明申请

    公开(公告)号:US20190034631A1

    公开(公告)日:2019-01-31

    申请号:US16057143

    申请日:2018-08-07

    Abstract: Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In particular, the disclosed techniques distinguish between request-response transactions that carry C&C communication and request-response transactions of innocent traffic. Individual request-response transactions may be analyzed rather than entire flows, and fine-granularity features examined within the transactions. As such, these methods and systems are highly effective in distinguishing between malware C&C communication and innocent traffic, i.e., in detecting malware with high detection probability and few false alarms.

Patent Agency Ranking