Systems and methods for video monitoring using linked devices

    公开(公告)号:US10171776B2

    公开(公告)日:2019-01-01

    申请号:US15224019

    申请日:2016-07-29

    Abstract: A subject can be tracking using a plurality of physical video monitoring or image acquisition devices deployed in a delimited area. A map represents the delimited area. Icons representing the physical monitoring devices can be placed and configured on the map representing the delimited area. Some or all of the placed and configured video monitoring devices can be logically linked together to form scenes. The video feed from the physical video monitoring devices may be recorded in stable storage. A layout for display of the video feeds may be selected. Upon playing the video feed, whether live or recorded, a subject can be tracked through the delimited area by selecting one of the video monitoring devices in one of the available scenes.

    System and method for identifying imaging devices

    公开(公告)号:US10063421B2

    公开(公告)日:2018-08-28

    申请号:US15259098

    申请日:2016-09-08

    Inventor: Sharon Rousso

    Abstract: Embodiments described herein facilitate receipt of image data, by providing apparatus and methods for constructing and/or utilizing a database of networked imaging devices. Communication transmitted over a network is identified as being from an imaging device. One or more identifiers, under which the communication is transmitted, are then extracted from the communication. For example, one or more Internet Protocol (IP) addresses may be extracted. The identifiers are associated in a database with respective physical locations. When a particular area is defined as an area of interest, at least one of the identifiers is selected from the database, the selected identifier being associated with a physical location that is within, or near, the area of interest. Image data transmitted under the selected identifier is then received by the interested parties.

    System and method for malware detection

    公开(公告)号:US10061922B2

    公开(公告)日:2018-08-28

    申请号:US13874339

    申请日:2013-04-30

    CPC classification number: G06F21/56 G06F21/52 G06F21/566 H04L63/1425

    Abstract: Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In particular, the disclosed techniques distinguish between request-response transactions that carry C&C communication and request-response transactions of innocent traffic. Individual request-response transactions may be analyzed rather than entire flows, and fine-granularity features examined within the transactions. As such, these methods and systems are highly effective in distinguishing between malware C&C communication and innocent traffic, i.e., in detecting malware with high detection probability and few false alarms.

    Systems, methods, and software for merging video viewing cells

    公开(公告)号:US10057533B1

    公开(公告)日:2018-08-21

    申请号:US14855714

    申请日:2015-09-16

    Inventor: Royee Goldberg

    Abstract: Methods, systems, and software are provided herein that allow a user to view video and manipulate viewing cells on a multi-view mode. In a first example, a method of merging viewing cells in a video management system is disclosed. The method includes presenting a plurality of viewing cells to a user, where the plurality of viewing cells are capable of displaying video of a plurality of video capture devices. The method also includes receiving an instruction to merge at least two of the plurality of viewing cells into a merged viewing cell, associating the merged viewing cell with one of the plurality of video capture devices, and allowing a user to drag another viewing cell into the merged viewing cell to associate the merged viewing cell with a video capture device correlated to the other viewing cell.

    Call flow and discourse analysis
    58.
    发明授权

    公开(公告)号:US09910845B2

    公开(公告)日:2018-03-06

    申请号:US15373043

    申请日:2016-12-08

    Abstract: The disclosed solution uses machine learning-based methods to improve the knowledge extraction process in a specific domain or business environment. By formulizing a specific company's internal knowledge and terminology, the ontology programming accounts for linguistic meaning to surface relevant and important content for analysis. Based on the self-training mechanism developed by the inventors, the ontology programming automatically trains itself to understand the business environment by processing and analyzing a defined corpus of communication data. For example, the disclosed ontology programming adapts to the language used in a specific domain, including linguistic patterns and properties, such as word order, relationships between terms, and syntactical variations. The disclosed system and method further relates to leveraging the ontology to assess a dataset and conduct a funnel analysis to identify patterns, or sequences of events, in the dataset.

Patent Agency Ranking