Patent application number | Description | Published |
20100013633 | SYSTEMS AND METHODS FOR VERIFICATION OF WIRELESS TERMINALS ON BOARD VEHICLES USING COUNTRY-OF-ORIGIN INFORMATION - A security method and system for accepting identity information regarding a vehicle. The system intercepts communications between wireless communication terminals located on board a vehicle and a wireless communication network, and processes the intercepted communication so as to identify respective countries of origin of the terminals on the vehicle. A comparison is made between the countries of origin of the terminals and identity information of the vehicle to invoke an action. For example, the comparison may include detecting an inconsistency between the identity information of the vehicle and one or more of the countries of origin of the terminals. | 01-21-2010 |
20100039259 | SYSTEM AND METHOD FOR BOARDING AREA SECURITY - A security method that includes defining rules specifying permitted movements of passengers in a transportation terminal. Passengers entering the terminal may be issued a boarding pass having a Radio Frequency Identification (RFID) tag attached thereto. The location of the RFID tag may be measured and responsive to the measured location of the RFID tag, a violation of at least one of the rules by the passenger may be detected. An action with respect to the detected violation may be taken. The rules may define a region that is forbidden for access, a region in which the passengers are expected to be in motion, a region in which the passengers are expected not to be stationary for more than a given time period, etc. | 02-18-2010 |
20100144373 | METHOD AND SYSTEM FOR BORDER CONTROL - A method for location tracking that includes identifying a subset of users of a mobile communication network who are located in a predefined area of interest using a first location subsystem of the mobile communication network. One or more of the identified users are assigned to a second location subsystem of the mobile communication network, which is different from and has a higher resolution than the first location subsystem, to measure their respective locations. In variations, the locations may be passed to an operator, the subset of the users may be identified by passively monitoring location information generated in the mobile communication network, the second location subsystem may be provided with information regarding the users, and profiles of the users may be determined. | 06-10-2010 |
20100214117 | SYSTEM AND METHOD FOR PREDICTING FUTURE MEETINGS OF WIRELESS USERS - Methods and system for predicting a future location of users of wireless communications terminals. Location information indicating respective locations of multiple wireless communication terminals may be received and processed so as to predict a future meeting among respective users of the wireless communication terminals. An action may be taken with respect to the predicted future meeting. The location information may be received from a wireless communication network to obtain a Point-of-Interest (POI) that is related to one or more of the users from a characteristic location profile of the one or more users. The POI may be indicated as the likely location of the future meeting. | 08-26-2010 |
20100279656 | SYSTEMS AND METHODS FOR CORRELATING MULTIPLE LOCATION SOURCES - A system and method for correlating multiple location sources of mobile users. The method includes accepting a first location of a user from a first system, accepting a second location of the user from a second system and processing the first and second location so as to detect a violation of a predefined rule specifying a legitimate relationship between the first and second locations. An action with respect to the detected violation may then be invoked. | 11-04-2010 |
20110018995 | SYSTEMS AND METHODS FOR VIDEO- AND POSITION-BASED IDENTIFICATION - A system having interfaces to receive images from one or more cameras and location information with respect to wireless communication terminals. A notification may be received regarding an individual observed in the images. Next, wireless communication terminals located in a vicinity of the individual may be identified. From the identified wireless communication terminals, identification information applicable to the individual may be obtained. The identification information may be, e.g., personal information related to a subscriber of the given wireless communication terminal. | 01-27-2011 |
20110028162 | SYSTEMS AND METHODS FOR LOCATING COMMUNICATION TERMINALS IN CELLULAR NETWORKS - Methods and systems in a wireless communication network for determining respective distances between a given base transceiver station and one or more other base transceiver stations. An effective location of the given base transceiver station may be calculated that is different from its physical location. The effective location may be use to report an estimated location of a communication terminal communicating with the given base transceiver station. The estimated location may be provided in networks that support both a hard handover or soft handover of the communication terminal between the given base transceiver station and the one or more other base transceiver stations. | 02-03-2011 |
20110069172 | SYSTEMS AND METHODS FOR LOCATION-BASED MULTIMEDIA - Systems and methods for receiving location indications of a communication terminal engaged in a communication session with a communication network, and selecting from a plurality of cameras having different respective fields of view within a geographical region that contains the geographical location, at least one camera whose field of view covers the geographical location. Images are output of the geographical location captured during the session by the at least one selected camera. The images may be correlated with the location indications by a switch in the communication network. | 03-24-2011 |
20110069173 | SYSTEM AND METHOD FOR AUTOMATIC CAMERA HAND-OFF USING LOCATION MEASUREMENTS - Systems and methods for receiving video images from a plurality of video cameras having respective fields of view that cover a geographical region. At a first time, first video images of an object may be output, where the images are captured by a first video camera selected from the plurality of video cameras. Location indications may be received, which specify a geographical location of the object in the geographical region and which are determined independently of the video images. At a second time subsequent to the first time, a second video camera from the plurality may be selected based on the location indications. The output may be switched to the second video images of the object, which are captured by the selected second video camera. | 03-24-2011 |
20110207474 | SYSTEM AND METHOD FOR MASS CALIBRATION OF RADIO FREQUENCY FINGERPRINT (RF-FP) LOCATION MEASUREMENTS - Systems and methods for location tracking in a communication network. Base stations transmit downlink signals to a plurality of subscriber terminals to define a mapping between geographical locations and respective sets of signal strengths of the downlink signals received from the base stations at the geographical locations. A subset of the subscriber terminals may be selected, and for each subscriber terminal in the subset, first measurements of a geographical location of the subscriber terminal irrespective of the downlink signals is made. Second measurements of the downlink signals received at the subscriber terminal at the geographical location is made and the mapping of the subscribers terminals is updated responsively to the first and second measurements. The geographical locations of the subscriber terminals is updated using the updated mapping. | 08-25-2011 |
20110208630 | METHODS AND SYSTEMS FOR DETECTION OF FINANCIAL CRIME - Systems and methods for evaluating financial transactions. Methods include receiving first indications of financial transactions related to a target user from a financial system, and receiving second indications of communication events, which are related to the target user but are not directly related to any financial transactions. Forensic criterion are evaluated defined over the first and second indications to issue and alert upon meeting the criterion. The forensic criterion may include detecting a money laundering event, a fraud event, or a financial transaction that is not related to the target user. | 08-25-2011 |
20130342346 | SYSTEM AND METHOD FOR PREDICTION OF THREATENED POINTS OF INTEREST - Embodiments that are described herein provide improved methods and systems for predicting threatened POIs. In some embodiments, an automated location tracking system tracks the locations of one or more target individuals. The locations of the target individuals may be tracked, for example, by tracking the cellular phones of the targets, or using various other automated location tracking techniques. Based on the tracked locations, a prediction system anticipates the future locations of the targets. Over time, the system uses this information to progressively narrow down the list of possibly-threatened POIs. | 12-26-2013 |
20130347060 | SYSTEMS AND METHODS FOR COMBINED PHYSICAL AND CYBER DATA SECURITY - Methods and systems for protecting computer systems against intrusion. The disclosed techniques detect intrusions by jointly considering both cyber security events and physical security events. In some embodiments, a correlation subsystem receives information related to the computer system and its physical environment from various information sources in the cyber domain and in the physical domain. The correlation subsystem analyzes the information and identifies both cyber security events and physical security events. The correlation subsystem finds cyber security events and physical security events that are correlative with one another, and uses this correlation to detect intrusions. | 12-26-2013 |
20140177841 | SYSTEM AND METHOD FOR USER-PRIVACY-AWARE COMMUNICATION MONITORING AND ANALYSIS - Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, content-based identifiers such as speaker recognition or keyword matching are used. | 06-26-2014 |