SYSTEMS AND METHODS FOR WEB DECODING
    81.
    发明申请
    SYSTEMS AND METHODS FOR WEB DECODING 审中-公开
    网络解码的系统与方法

    公开(公告)号:US20110238723A1

    公开(公告)日:2011-09-29

    申请号:US13016998

    申请日:2011-01-29

    CPC classification number: G06Q30/02 H04L67/025 H04L67/22

    Abstract: Reconstructing web sessions of target users may be performed by accepting communication packets exchanged over a network during at least one network session associated with a target user. The packets may be processed so as to identify web pages viewed by the target user during the network session and interactions between the target user and the viewed web pages. The network session may be reconstructed as viewed by the target user over time, based on the identified web pages and interactions. The reconstructed network session may be presented to an operator. The interactions may be identified by a pattern of one or more packets that matches a given interaction selected from a set of possible interactions that are available in a given viewed web page.

    Abstract translation: 可以通过接受在与目标用户相关联的至少一个网络会话期间通过网络交换的通信分组来执行目标用户的网络会话的重构。 可以处理分组以便在网络会话期间识别目标用户查看的网页以及目标用户和所查看的网页之间的交互。 基于所识别的网页和交互,网络会话可以被目标用户随着时间的推移来重构。 可以将重建的网络会话呈现给运营商。 可以通过与在给定的所查看的网页中可用的一组可能的交互中选择的给定的交互匹配的一个或多个分组的模式来识别交互。

    SYSTEM AND METHOD FOR PREDICTING FUTURE MEETINGS OF WIRELESS USERS
    82.
    发明申请
    SYSTEM AND METHOD FOR PREDICTING FUTURE MEETINGS OF WIRELESS USERS 有权
    用于预测无线用户未来会议的系统和方法

    公开(公告)号:US20100214117A1

    公开(公告)日:2010-08-26

    申请号:US12708558

    申请日:2010-02-19

    Applicant: Gideon Hazzani

    Inventor: Gideon Hazzani

    Abstract: Methods and system for predicting a future location of users of wireless communications terminals. Location information indicating respective locations of multiple wireless communication terminals may be received and processed so as to predict a future meeting among respective users of the wireless communication terminals. An action may be taken with respect to the predicted future meeting. The location information may be received from a wireless communication network to obtain a Point-of-Interest (POI) that is related to one or more of the users from a characteristic location profile of the one or more users. The POI may be indicated as the likely location of the future meeting.

    Abstract translation: 用于预测无线通信终端用户未来位置的方法和系统。 可以接收并处理指示多个无线通信终端的相应位置的位置信息,以预测无线通信终端的各个用户之间的将来会议。 可能会对未来的预测会议采取行动。 可以从无线通信网络接收位置信息,以从一个或多个用户的特征位置简档获得与一个或多个用户相关的兴趣点(POI)。 POI可能被指示为未来会议的可能位置。

    SYSTEM AND METHOD FOR BOARDING AREA SECURITY
    83.
    发明申请
    SYSTEM AND METHOD FOR BOARDING AREA SECURITY 有权
    用于安全区域安全的系统和方法

    公开(公告)号:US20100039259A1

    公开(公告)日:2010-02-18

    申请号:US12539640

    申请日:2009-08-12

    Applicant: Gideon Hazzani

    Inventor: Gideon Hazzani

    Abstract: A security method that includes defining rules specifying permitted movements of passengers in a transportation terminal. Passengers entering the terminal may be issued a boarding pass having a Radio Frequency Identification (RFID) tag attached thereto. The location of the RFID tag may be measured and responsive to the measured location of the RFID tag, a violation of at least one of the rules by the passenger may be detected. An action with respect to the detected violation may be taken. The rules may define a region that is forbidden for access, a region in which the passengers are expected to be in motion, a region in which the passengers are expected not to be stationary for more than a given time period, etc.

    Abstract translation: 一种安全方法,包括规定指定运输终端中乘客允许的移动的规则。 进入终端的乘客可以发出附有射频识别(RFID)标签的登机牌。 可以测量RFID标签的位置并响应于RFID标签的测量位置,可以检测乘客违反至少一条规则。 可以采取关于检测到的违规的动作。 规则可以定义禁止进入的区域,预计乘客处于运动状态的区域,预期乘客在不超过给定时间段的情况下不会静止的区域等。

    System and method for range matching

    公开(公告)号:US11463360B2

    公开(公告)日:2022-10-04

    申请号:US16853312

    申请日:2020-04-20

    Inventor: Yitshak Yishay

    Abstract: Methods and systems for range matching. The system holds a definition of one or more ranges of Internet Protocol (IP) addresses. The definition may specify any desired number of ranges of any suitable size, and some ranges may overlap one another or be contained in one another. The definition may also specify certain returned values and/or relative priorities for the various ranges. In a pre-processing phase, a hash table that is subsequently queried with addresses to be range-matched. The hash table may be updated at run-time. During operation, the system receives addresses (e.g., extracts addresses from monitored communication traffic) and identifies by querying the hash table, for each address, whether the address falls within any of the ranges.

    System and method for identifying devices behind network address translators based on TCP timestamps

    公开(公告)号:US11303736B2

    公开(公告)日:2022-04-12

    申请号:US16927036

    申请日:2020-07-13

    Inventor: Yitshak Yishay

    Abstract: Methods and systems for monitoring activity on a local area networks (LAN). In particular, embodiments described herein provide systems and methods for associating packets with the devices from which they were communicated, despite the obfuscatory behavior of any network address translators (NAT). A processor first receives packets that were collectively communicated, by a plurality of devices, via a NAT-serviced LAN. The processor aggregates the packets into multiple packet aggregations on a per device basis. Fields that are contained in the respective packet headers of the packets are used. The packet aggregations may be grouped. The embodiments use unencrypted lower-level information (including, for example, IPIDs and domain names), such that aggregation and grouping may be successfully performed even if information in the application layer is encrypted.

    SYSTEM AND METHOD FOR AUTOMATIC FORENSIC INVESTIGATION

    公开(公告)号:US20220006832A1

    公开(公告)日:2022-01-06

    申请号:US17180799

    申请日:2021-02-21

    Abstract: Automatic forensic investigation techniques to more effectively differentiate false positives from true positives. An incident is automatically investigated by a processor that communicates instructions to a device on a network and analyzes information received from the device in response to the instructions. In response to analyzing, the processor raises or lowers its level of confidence in the incident. If the processor's level of confidence in the incident is sufficiently high, the processor generates an output that indicates that the security of the network has been compromised. Otherwise, the processor ascertains that the incident is a false positive and may modify a criteria for alert generation.

Patent Agency Ranking