Patents by Inventor Offri GIL

Offri GIL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230118927
    Abstract: The present disclosure provides method and system for tracking cellular devices by a processor configured to receiving communications via communications interface of cellular communication packets exchanged over a cellular network and fixed-network communication packets exchanged with a router connected to a fixed network; identifying, in the cellular communication packets, data items exchanged with a cellular device at a cellular-communication time. The method and system then identifies the data item in the fixed-network communication packets, and in response to identifying the data item in both the cellular communication packets and the fixed-network communication packets, and based on a difference between the cellular-communication time and a fixed-network-communication time at which the data item was exchanged with the router, calculate a likelihood that the cellular device was connected to the fixed network via the router at the fixed-network-communication time, and output the likelihood.
    Type: Application
    Filed: August 11, 2022
    Publication date: April 20, 2023
    Inventors: Zeev Kalyuzhner, Yitshak Yishay, Itsik Horovitz, Offri Gil, Eithan Goldfarb
  • Publication number: 20230121479
    Abstract: The present disclosure provides method and system for a processor configured to receive, via a communication interface, cellular communication exchanged over at least one cellular network and fixed-network communication exchanged with a router connected to a fixed network. The method and system further correlating between the cellular communication and the fixed-network communication, and computing respective likelihoods for multiple cellular devices having connected to the fixed network via the router. In response to computing the likelihoods, compute one or more estimated properties associated with the router, and output the estimated properties.
    Type: Application
    Filed: August 11, 2022
    Publication date: April 20, 2023
    Inventors: Zeev Kalyuzhner, Yitshak Yishay, Itsik Horovitz, Offri Gil, Eithan Goldfarb
  • Patent number: 11444956
    Abstract: A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
    Type: Grant
    Filed: April 3, 2021
    Date of Patent: September 13, 2022
    Assignee: COGNYTE TECHNOLOGIES ISRAEL LTD.
    Inventors: Offri Gil, Omer Ziv, Yuval Altman, Yaron Gvilli, Hodaya Shabtay, Omri David, Yitshak Yishay
  • Patent number: 11403559
    Abstract: Machine learning techniques for classifying encrypted traffic with a high degree of accuracy. The techniques do not require decrypting any traffic and may not require any manually-labeled traffic samples. An automated system uses an application of interest to perform a large number of user actions of various types. The system further records, in a log, the respective times at which the actions were performed. The system further receives the encrypted traffic exchanged between the system and the application server, and records properties of this traffic in a time series. Subsequently, by correlating between the times in the log and the times at which the traffic was received, the system matches each of the user actions with a corresponding portion of the traffic, which is assumed to have been generated by the user action. The system thus automatically builds a labeled training set, which may be used to train a network-traffic classifier.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: August 2, 2022
    Assignee: COGNYTE TECHNOLOGIES ISRAEL LTD.
    Inventors: Gal Fridman, Offri Gil, Omer Ziv
  • Patent number: 11336609
    Abstract: Systems and methods for passive monitoring of computer communication that does not require performing any decryption. A monitoring system receives the traffic exchanged with each relevant application server, and identifies, in the traffic, sequences of messages—or “n-grams”—that appear to belong to a communication session between a pair of users. Subsequently, based on the numbers and types of identified n-grams, the system identifies each pair of users that are likely to be related to one another via the application, in that these users used the application to communicate (actively and/or passively) with one another. The system may identify those sequences of messages that, by virtue of the sizes of the messages in the sequence, and/or other properties of the messages that are readily discernable, indicate a possible user-pair relationship.
    Type: Grant
    Filed: January 27, 2021
    Date of Patent: May 17, 2022
    Assignee: COGNYTE TECHNOLOGIES ISRAEL LTD.
    Inventors: Offri Gil, Pinchas Birenbaum, Yitshak Yishay
  • Publication number: 20220038466
    Abstract: A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
    Type: Application
    Filed: April 3, 2021
    Publication date: February 3, 2022
    Inventors: Offri Gil, Omer Ziv, Yuval Altman, Yaron Gvilli, Hodaya Shabtay, Omri David, Yitshak Yishay
  • Publication number: 20210152512
    Abstract: Systems and methods for passive monitoring of computer communication that does not require performing any decryption. A monitoring system receives the traffic exchanged with each relevant application server, and identifies, in the traffic, sequences of messages—or “n-grams”—that appear to belong to a communication session between a pair of users. Subsequently, based on the numbers and types of identified n-grams, the system identifies each pair of users that are likely to be related to one another via the application, in that these users used the application to communicate (actively and/or passively) with one another. The system may identify those sequences of messages that, by virtue of the sizes of the messages in the sequence, and/or other properties of the messages that are readily discernable, indicate a possible user-pair relationship.
    Type: Application
    Filed: January 27, 2021
    Publication date: May 20, 2021
    Inventors: Offri Gil, Pinchas Birenbaum, Yitshak Yishay
  • Patent number: 10999295
    Abstract: A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
    Type: Grant
    Filed: March 19, 2020
    Date of Patent: May 4, 2021
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Offri Gil, Omer Ziv, Yuval Altman, Yaron Gvili, Hodaya Shabtay, Omri David, Yitshak Yishay
  • Patent number: 10958613
    Abstract: Systems and methods for passive monitoring of computer communication that does not require performing any decryption. A monitoring system receives the traffic exchanged with each relevant application server, and identifies, in the traffic, sequences of messages—or “n-grams”—that appear to belong to a communication session between a pair of users. Subsequently, based on the numbers and types of identified n-grams, the system identifies each pair of users that are likely to be related to one another via the application, in that these users used the application to communicate (actively and/or passively) with one another. The system may identify those sequences of messages that, by virtue of the sizes of the messages in the sequence, and/or other properties of the messages that are readily discernable, indicate a possible user-pair relationship.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: March 23, 2021
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Offri Gil, Pinchas Birenbaum, Yitshak Yishay
  • Publication number: 20200304519
    Abstract: A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
    Type: Application
    Filed: March 19, 2020
    Publication date: September 24, 2020
    Inventors: Offri Gil, Omer Ziv, Yuval Altman
  • Publication number: 20200042897
    Abstract: Machine learning techniques for classifying encrypted traffic with a high degree of accuracy. The techniques do not require decrypting any traffic and may not require any manually-labeled traffic samples. An automated system uses an application of interest to perform a large number of user actions of various types. The system further records, in a log, the respective times at which the actions were performed. The system further receives the encrypted traffic exchanged between the system and the application server, and records properties of this traffic in a time series. Subsequently, by correlating between the times in the log and the times at which the traffic was received, the system matches each of the user actions with a corresponding portion of the traffic, which is assumed to have been generated by the user action. The system thus automatically builds a labeled training set, which may be used to train a network-traffic classifier.
    Type: Application
    Filed: July 31, 2019
    Publication date: February 6, 2020
    Inventors: Gal Fridman, Offri Gil, Omer Ziv
  • Publication number: 20190215293
    Abstract: Systems and methods for passive monitoring of computer communication that does not require performing any decryption. A monitoring system receives the traffic exchanged with each relevant application server, and identifies, in the traffic, sequences of messages—or “n-grams”—that appear to belong to a communication session between a pair of users. Subsequently, based on the numbers and types of identified n-grams, the system identifies each pair of users that are likely to be related to one another via the application, in that these users used the application to communicate (actively and/or passively) with one another. The system may identify those sequences of messages that, by virtue of the sizes of the messages in the sequence, and/or other properties of the messages that are readily discernable, indicate a possible user-pair relationship.
    Type: Application
    Filed: December 21, 2018
    Publication date: July 11, 2019
    Inventors: Offri Gil, Pinhas Birenbaum, Itzhak Yishai
  • Publication number: 20150257166
    Abstract: A method for maintaining the best available quality of a connection between to wireless-enabled devices in a local wireless network, comprises providing: (a) a link (session) tracking subsystem, for tracking the link (session) quality between PtP devices; and, (b) channel and route selection subsystem, for choosing the best channel and route between session peers; and switching to a different channel and/or route when a measured quality indicator triggers a change.
    Type: Application
    Filed: March 4, 2014
    Publication date: September 10, 2015
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Yaniv WEIZMAN, NELLY ANDRUSIER, Offri GIL, Itai AHIRAZ, DAN SHIRRON
  • Publication number: 20150058441
    Abstract: A pull or push based caching management method that delivers retrieved content over a wireless data network. In its pull mode, distributed cache(s) and mapping modes are deployed, a request for content is received and classified to generate a quality of service (QoS) identifier. The QoS is attached with an identifier for requested content to a content mapping request message. The handling of the mapping request message is scheduled on the mapping node. The content mapping request message transmits to a selected mapping node. The requesting node receives a content mapping reply message. The content request is scheduled on the caching node and a content retrieval request message is transmitted from the requesting node to the one or more target caching nodes. A content retrieval reply message is received in return. In a push mode, instructions are provided for triggering a content retrieval operation and also QoS parameters.
    Type: Application
    Filed: August 20, 2013
    Publication date: February 26, 2015
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Yaniv WEIZMAN, Itai AHIRAZ, Offri GIL
  • Publication number: 20140222988
    Abstract: In a method for the dynamic content discovery in a distributed caching network the distribution of content popularity and its access frequency rate are used to determine the most appropriate mapping method(s) to use.
    Type: Application
    Filed: February 4, 2013
    Publication date: August 7, 2014
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Oz SHLOMO, Roy FRIEDMAN, Dan SHIRRON, Yaniv WEIZMAN, Itai AHIRAZ, Offri GIL