SYSTEM AND METHOD FOR INTERCEPTION OF IP TRAFFIC BASED ON IMAGE PROCESSING
First Claim
1. A method, comprising:
- monitoring communication sessions conducted in a communication network;
extracting from a monitored communication session a digital image and a communication identifier; and
recognizing a known target individual appearing in the extracted image, and associating the target individual with the communication identifier.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for monitoring communication traffic in communication networks, such as Internet Protocol (IP) traffic transferred over the Internet or over a wireless network. The disclosed techniques identify communication traffic that is associated with target individuals, by extracting digital images from the traffic and recognizing target individuals who appear in the images. A correlation system monitors communication sessions that are conducted in a communication network to identify known target individuals who appear in images. Upon recognizing a target individual in an image extracted from a certain session, the system correlates this target user with one or more of the communication identifiers used in the session. The system automatically identifies IP addresses or other identifiers that are used by target individuals, and enable subsequent tracking of such identifiers.
51 Citations
20 Claims
-
1. A method, comprising:
-
monitoring communication sessions conducted in a communication network; extracting from a monitored communication session a digital image and a communication identifier; and recognizing a known target individual appearing in the extracted image, and associating the target individual with the communication identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. Apparatus, comprising:
-
an interface, which is connected to a communication network and is configured to monitor communication sessions conducted in the network; and a processor, which is configured to extract from a monitored communication session a digital image and a communication identifier, to recognize a known target individual appearing in the extracted image, and to associate the target individual with the communication identifier. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer software product, the product comprising a tangible non-transitory computer-readable medium, in which program instructions are stored, which instructions, when read by a computer, cause the computer to monitor communication sessions conducted in a communication network, to extract from a monitored communication session a digital image and a communication identifier, to recognize a known target individual appearing in the extracted image, and to associate the target individual with the communication identifier.
Specification