System and method for prediction of threatened points of interest

    公开(公告)号:US10134262B2

    公开(公告)日:2018-11-20

    申请号:US15433501

    申请日:2017-02-15

    Inventor: Gideon Hazzani

    Abstract: Embodiments that are described herein provide improved methods and systems for predicting threatened POIs. In some embodiments, an automated location tracking system tracks the locations of one or more target individuals. The locations of the target individuals may be tracked, for example, by tracking the cellular phones of the targets, or using various other automated location tracking techniques. Based on the tracked locations, a prediction system anticipates the future locations of the targets. Over time, the system uses this information to progressively narrow down the list of possibly-threatened POIs.

    SYSTEM AND METHOD FOR USER-PRIVACY-AWARE COMMUNICATION MONITORING AND ANALYSIS
    2.
    发明申请
    SYSTEM AND METHOD FOR USER-PRIVACY-AWARE COMMUNICATION MONITORING AND ANALYSIS 有权
    用于用户隐私通信监控和分析的系统和方法

    公开(公告)号:US20140177841A1

    公开(公告)日:2014-06-26

    申请号:US14058467

    申请日:2013-10-21

    Abstract: Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, content-based identifiers such as speaker recognition or keyword matching are used.

    Abstract translation: 在通信网络中监听,分析和处理语音呼叫的方法和系统。 识别系统接收在通信网络中进行的被监听的语音呼叫。 一些被监视的语音呼叫可以由预定义为嫌疑人的目标个人进行。 为了保持用户隐私,系统仅选择并保留被预先定义的目标涉嫌进行的语音通话。 本文公开的技术在目标使用的终端的网络标识符不知道或目标使用公共通信设备的情况下特别有利。 根据本公开,使用诸如说话者识别或关键字匹配之类的基于内容的标识符。

    SYSTEMS AND METHODS FOR COMBINED PHYSICAL AND CYBER DATA SECURITY
    3.
    发明申请
    SYSTEMS AND METHODS FOR COMBINED PHYSICAL AND CYBER DATA SECURITY 有权
    用于组合的物理和数据安全的系统和方法

    公开(公告)号:US20130347060A1

    公开(公告)日:2013-12-26

    申请号:US13868220

    申请日:2013-04-23

    Inventor: Gideon Hazzani

    CPC classification number: G06F21/554

    Abstract: Methods and systems for protecting computer systems against intrusion. The disclosed techniques detect intrusions by jointly considering both cyber security events and physical security events. In some embodiments, a correlation subsystem receives information related to the computer system and its physical environment from various information sources in the cyber domain and in the physical domain. The correlation subsystem analyzes the information and identifies both cyber security events and physical security events. The correlation subsystem finds cyber security events and physical security events that are correlative with one another, and uses this correlation to detect intrusions.

    Abstract translation: 防止计算机系统入侵的方法和系统。 所公开的技术通过共同考虑网络安全事件和物理安全事件来检测入侵。 在一些实施例中,相关子系统从网络域和物理域中的各种信息源接收与计算机系统及其物理环境有关的信息。 相关子系统分析信息并识别网络安全事件和物理安全事件。 相关子系统发现彼此相关的网络安全事件和物理安全事件,并使用该相关性来检测入侵。

    Systems and methods for combined physical and cyber data security

    公开(公告)号:US09767279B2

    公开(公告)日:2017-09-19

    申请号:US13868220

    申请日:2013-04-23

    Inventor: Gideon Hazzani

    CPC classification number: G06F21/554

    Abstract: Methods and systems for protecting computer systems against intrusion. The disclosed techniques detect intrusions by jointly considering both cyber security events and physical security events. In some embodiments, a correlation subsystem receives information related to the computer system and its physical environment from various information sources in the cyber domain and in the physical domain. The correlation subsystem analyzes the information and identifies both cyber security events and physical security events. The correlation subsystem finds cyber security events and physical security events that are correlative with one another, and uses this correlation to detect intrusions.

    SYSTEM AND METHOD FOR AUTOMATIC CAMERA HAND-OFF USING LOCATION MEASUREMENTS
    6.
    发明申请
    SYSTEM AND METHOD FOR AUTOMATIC CAMERA HAND-OFF USING LOCATION MEASUREMENTS 有权
    使用位置测量自动摄像机的系统和方法

    公开(公告)号:US20170013203A1

    公开(公告)日:2017-01-12

    申请号:US15163782

    申请日:2016-05-25

    Inventor: Gideon Hazzani

    Abstract: Systems and methods for receiving video images from a plurality of video cameras having respective fields of view that cover a geographical region. At a first time, first video images of an object may be output, where the images are captured by a first video camera selected from the plurality of video cameras. Location indications may be received, which specify a geographical location of the object in the geographical region and which are determined independently of the video images. At a second time subsequent to the first time, a second video camera from the plurality may be selected based on the location indications. The output may be switched to the second video images of the object, which are captured by the selected second video camera.

    Abstract translation: 用于从具有覆盖地理区域的各个视野的多个摄像机接收视频图像的系统和方法。 在第一时间,可以输出对象的第一视频图像,其中由从多个摄像机中选择的第一摄像机拍摄图像。 可以接收位置指示,其指定地理区域中对象的地理位置,并且独立于视频图像来确定。 在第一次之后的第二时间,可以基于位置指示来选择来自多个的第二摄像机。 可以将输出切换到由所选择的第二摄像机捕获的对象的第二视频图像。

    System and method for prediction of threatened points of interest

    公开(公告)号:US09607500B2

    公开(公告)日:2017-03-28

    申请号:US13868223

    申请日:2013-04-23

    Inventor: Gideon Hazzani

    Abstract: Embodiments that are described herein provide improved methods and systems for predicting threatened POIs. In some embodiments, an automated location tracking system tracks the locations of one or more target individuals. The locations of the target individuals may be tracked, for example, by tracking the cellular phones of the targets, or using various other automated location tracking techniques. Based on the tracked locations, a prediction system anticipates the future locations of the targets. Over time, the system uses this information to progressively narrow down the list of possibly-threatened POIs.

    SYSTEM AND METHOD FOR USER-PRIVACY-AWARE COMMUNICATION MONITORING AND ANALYSIS
    10.
    发明申请
    SYSTEM AND METHOD FOR USER-PRIVACY-AWARE COMMUNICATION MONITORING AND ANALYSIS 审中-公开
    用于用户隐私通信监控和分析的系统和方法

    公开(公告)号:US20160330315A1

    公开(公告)日:2016-11-10

    申请号:US15150736

    申请日:2016-05-10

    Abstract: Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, context-based identifiers such as speaker recognition or keyword matching are used.

    Abstract translation: 在通信网络中监听,分析和处理语音呼叫的方法和系统。 识别系统接收在通信网络中进行的被监听的语音呼叫。 一些被监视的语音呼叫可以由预定义为嫌疑人的目标个人进行。 为了保持用户隐私,系统仅选择并保留被预先定义的目标涉嫌进行的语音通话。 本文公开的技术在目标使用的终端的网络标识符不知道或者目标使用公共通信设备的情况下特别有利。 根据本公开,使用诸如说话者识别或关键字匹配的基于上下文的标识符。

Patent Agency Ranking