×

System and method for interception of IP traffic based on image processing

  • US 9,742,812 B2
  • Filed: 10/29/2012
  • Issued: 08/22/2017
  • Est. Priority Date: 10/31/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • monitoring, by an interface operatively coupled to a processor of a first computing system, using a Man in The Middle (MITM) protocol, remote communication sessions conducted in a communication network, wherein each monitored communication session comprises an exchange of communication traffic exchanged between communication terminals of the communication network;

    extracting, by the processor of the first computing system, a digital image and a first and second communication identifiers from a monitored communication session, wherein the first communication identifier identifies at least one of the communication terminals of the monitored communication session, wherein the second identifier is an application-layer communication identifier comprising an e-mail address or chat nickname used in the monitored communication session;

    detecting, by the processor of the first computing system, whether a known target individual appears in the extracted image, wherein the detecting comprises comparing, by the processor, the extracted image to images previously identified as being of the known target individual; and

    upon the detection identifying that the known target individual appears in the extracted image;

    establishing, by the processor of the first computing system, a correlation between the known target individual and the extracted communication identifiers, andreporting to a second computing system, by the processor of the first computing, the established correlation, wherein the second computing system is separate from the first computing system, and wherein the second computing system is configured to utilize the reported established correlation to track subsequent communication sessions that include the first or second communication identifiers, wherein the correlation between the known target individual and the communication identifiers is not known to the second computing system prior to the first computing system reporting the correlation to the second computing system.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×