Patents by Inventor Verint Systems Ltd.

Verint Systems Ltd. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140024349
    Abstract: Methods and systems for monitoring communication of mobile communication terminals, such as cellular phones. An off-air monitoring system reconstructs both directions of a call conducted between two mobile terminals by receiving only downlink channels. The off-air monitoring system receives multiple downlink transmissions transmitted by base stations in a wireless communication network. The system uses the received downlink transmissions to reconstruct the bidirectional call content of calls conducted between wireless terminals. In order to reconstruct the bidirectional content of a given call, the system identifies and correlates the two downlink transmissions of that call from among the multiple received downlink transmissions.
    Type: Application
    Filed: April 29, 2013
    Publication date: January 23, 2014
    Applicant: Verint Systems Ltd.
    Inventor: Verint Systems Ltd.
  • Publication number: 20130344844
    Abstract: Methods and systems for identifying one or more rogue devices within a wireless communication network over a particular geographic location. A rogue base station detection system receives air interface transmissions from base stations belonging to a wireless communication network, as well as from one or more rogue base stations that do not belong to the network and are used for monitoring (e.g., hacking or eavesdropping) communication terminals communicating in the network. The system typically searches for signaling channels and converts the RF signal into GSM/UMTS messages including overcoming the different encryption methods used. The system than analyzes the received transmissions so as to identify suspicious transmissions that may be transmitted by the rogue base stations.
    Type: Application
    Filed: April 30, 2013
    Publication date: December 26, 2013
    Applicant: Verint Systems Ltd.
    Inventor: Verint Systems Ltd.
  • Publication number: 20130347114
    Abstract: Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In particular, the disclosed techniques distinguish between request-response transactions that carry C&C communication and request-response transactions of innocent traffic. Individual request-response transactions may be analyzed rather than entire flows, and fine-granularity features examined within the transactions. As such, these methods and systems are highly effective in distinguishing between malware C&C communication and innocent traffic, i.e., in detecting malware with high detection probability and few false alarms.
    Type: Application
    Filed: April 30, 2013
    Publication date: December 26, 2013
    Applicant: Verint Systems Ltd.
    Inventor: Verint Systems Ltd.
  • Publication number: 20130212260
    Abstract: The disclosed techniques apply automatic prioritization to communication sessions conducted by users of a communication network, and present the sessions to an operator in accordance with the priorities. Each session is assigned an initial priority depending on the user who conducts the session (referred to as “target user”). The priority is then adjusted in accordance with a set of rules defined for that target user, and possibly based on activities of the target user as analyzed using the reconstructed communication. The rules typically consider metadata of the session. The sessions are typically held in a queue and presented to an operator in accordance with their respective priorities.
    Type: Application
    Filed: January 30, 2013
    Publication date: August 15, 2013
    Applicant: VERINT SYSTEMS LTD.
    Inventor: Verint Systems Ltd.
  • Publication number: 20130108114
    Abstract: Methods and systems for monitoring communication traffic in communication networks, such as Internet Protocol (IP) traffic transferred over the Internet or over a wireless network. The disclosed techniques identify communication traffic that is associated with target individuals, by extracting digital images from the traffic and recognizing target individuals who appear in the images. A correlation system monitors communication sessions that are conducted in a communication network to identify known target individuals who appear in images. Upon recognizing a target individual in an image extracted from a certain session, the system correlates this target user with one or more of the communication identifiers used in the session. The system automatically identifies IP addresses or other identifiers that are used by target individuals, and enable subsequent tracking of such identifiers.
    Type: Application
    Filed: October 29, 2012
    Publication date: May 2, 2013
    Applicant: VERINT SYSTEMS LTD.
    Inventor: Verint Systems Ltd.