System and method for link analysis based on image processing
First Claim
Patent Images
1. A method, comprising:
- monitoring, by an interface coupled to a processor, communication conducted in a communication network;
extracting, by the interface, a plurality of digital images from a monitored communication session;
automatically recognizing, by the processor, first and second individuals who appear in first and second ones of the extracted digital images;
defining, by the processor, a relationship between the recognized first and second individuals; and
maintaining, by the processor, a relationship map as a data structure in a database, wherein the relationship map includes the defined relationship between the recognized first and second individuals;
wherein monitoring communication conducted in a communication network includes;
intercepting communication traffic conducted in the communication network such that communication traffic is diverted to pass through the interface before reaching the communication traffic'"'"'s intended destination;
detecting whether the communication traffic is encrypted in accordance with a cryptographic transport-layer protocol,upon detecting that the communication traffic is encrypted in accordance with a cryptographic transport-layer protocol, decrypting the transport-layer encryption before extracting the plurality of digital images; and
after decrypting the communication traffic, re-encrypting the communication traffic with the transport-layer encryption and sending the re-encrypted traffic to the intended destination; and
comprising assigning a confidence score to the relationship,wherein assigning the confidence score comprises setting the confidence score depending on a source from which the first images are obtained, wherein the confidence score is set higher for images that are obtained from seized equipment as compared to images that are obtained from public websites.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems to identify relationships between individuals by analyzing digital images and automatically detecting individuals who appear together in the images. A link analysis system accepts one or more digital images, and automatically recognizes individuals who appear together in the images. The system may recognize the individuals, for example, by applying a suitable face recognition process to the images. Upon identifying individuals who appear together, the system defines a relationship between them and acts upon the relationship.
19 Citations
13 Claims
-
1. A method, comprising:
-
monitoring, by an interface coupled to a processor, communication conducted in a communication network; extracting, by the interface, a plurality of digital images from a monitored communication session; automatically recognizing, by the processor, first and second individuals who appear in first and second ones of the extracted digital images; defining, by the processor, a relationship between the recognized first and second individuals; and maintaining, by the processor, a relationship map as a data structure in a database, wherein the relationship map includes the defined relationship between the recognized first and second individuals; wherein monitoring communication conducted in a communication network includes; intercepting communication traffic conducted in the communication network such that communication traffic is diverted to pass through the interface before reaching the communication traffic'"'"'s intended destination; detecting whether the communication traffic is encrypted in accordance with a cryptographic transport-layer protocol, upon detecting that the communication traffic is encrypted in accordance with a cryptographic transport-layer protocol, decrypting the transport-layer encryption before extracting the plurality of digital images; and
after decrypting the communication traffic, re-encrypting the communication traffic with the transport-layer encryption and sending the re-encrypted traffic to the intended destination; andcomprising assigning a confidence score to the relationship, wherein assigning the confidence score comprises setting the confidence score depending on a source from which the first images are obtained, wherein the confidence score is set higher for images that are obtained from seized equipment as compared to images that are obtained from public websites. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. Apparatus, comprising:
-
an interface that monitors communication conducted in a communication network and extracts a plurality of digital images from a monitored communication session; and a processor that; automatically recognizes first and second individuals who appear in first and second ones of the extracted digital images; defines a relationship between the recognized first and second individuals; and maintains a relationship map which includes the defined relationship between the recognized first and second individuals; wherein the interface performs the monitoring by at least; intercepting communication traffic conducted in the communication network such that communication traffic is diverted to pass through the apparatus before reaching the communication traffic'"'"'s intended destination, detecting whether the communication traffic is encrypted in accordance with a cryptographic transport-layer protocol; upon detecting that the communication traffic is encrypted in accordance with a cryptographic transport-layer protocol, decrypting the transport-layer encryption before extracting the plurality of digital images; and after decrypting the communication traffic, re-encrypting the communication traffic with the transport-layer encryption and sending the re-encrypted traffic to the intended destination; wherein the processor is configured to assign a confidence score to the relationship, wherein the processor is configured to set the confidence score depending on a source from which the images are obtained, wherein the confidence score is set higher for images that are obtained from seized equipment as compared to images that are obtained from public websites. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
Specification