System for accessing a set of communication and transaction data associated with a user of interest sourced from multiple different network carriers and for enabling multiple analysts to independently and confidentially access the set of communication and transaction data
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-012/58
G06F-011/30
H04L-012/24
H04L-029/06
H04W-012/02
출원번호
US-0355397
(2012-01-20)
등록번호
US-9058323
(2015-06-16)
발명자
/ 주소
Le, Robert
Bean, Timothy
Huang, Henry
출원인 / 주소
SS8 NETWORKS, INC.
대리인 / 주소
Raj Abhyanker, P.C.
인용정보
피인용 횟수 :
1인용 특허 :
246
초록▼
A system, method, and apparatus for collecting data streams, such as data packets, on a network, such as the Internet, are disclosed. Evaluation of the metadata and the relationships can be performed algorithmically, as predetermined by an analyst or as provided as preset options by the network moni
A system, method, and apparatus for collecting data streams, such as data packets, on a network, such as the Internet, are disclosed. Evaluation of the metadata and the relationships can be performed algorithmically, as predetermined by an analyst or as provided as preset options by the network monitoring system (NMS). The collected data associated with the users of the network may be accessed by multiple analysts belonging to different groups having a NMS of their own. The system may allow access to multiple analysts belonging to separate groups by parsing through a single instance of the stored data. Multiple analysts belonging to different groups may allow to access to a single instance of the stored data.
대표청구항▼
1. A method comprising: capturing data streams from multiple carriers on common data lines on a Wide Area Network (WAN) to be stored within a multi-tenant capable Network Monitoring System (NMS) configured to monitor a set of activities between users of the WAN;receiving, at the NMS, an identificati
1. A method comprising: capturing data streams from multiple carriers on common data lines on a Wide Area Network (WAN) to be stored within a multi-tenant capable Network Monitoring System (NMS) configured to monitor a set of activities between users of the WAN;receiving, at the NMS, an identification of a first analyst authorized to receive data related to a known user of interest thereto, the known user of interest being a user of the WAN whose activity is monitored through the NMS;receiving, at the NMS, an identification of a second analyst also authorized to receive data related to the known user of interest;receiving, at the NMS, a known user ID associated with the known user of interest configured to be monitored at an access device communicatively coupled to the WAN from the first analyst and the second analyst;parsing, at the NMS, a data stream of the captured data streams related to the known user of interest into a common portion relevant to both the first analyst and the second analyst, a first unique portion solely relevant to the first analyst and a second unique portion solely relevant to the second analyst following the reception of the identification of the first analyst and the identification of the second analyst and the reception of the known user ID from the first analyst and the second analyst;parsing, at the NMS, a single instance of the common portion of the data stream to simultaneously retrieve the common portion for both the first analyst and the second analyst;retrieving, through the NMS, a first data stream related to the known user of interest based on the reception of the known user ID from the first analyst and the identification of the first analyst, the retrieving of the first data stream comprising retrieving both the first unique portion and the common portion;retrieving, through the NMS, a second data stream related to the known user of interest based on the reception of the known user ID from the second analyst and the identification of the second analyst, the retrieving of the second data stream comprising retrieving both the second unique portion and the common portion;transmitting the retrieved first data stream related to the known user of interest solely to the first analyst;transmitting the retrieved second data stream related to the known user of interest solely to the second analyst; andmodularizing the NMS such that the first analyst and the second analyst are provided with a capability to scale a functionality providing the data stream related to the known user of interest as per a requirement thereof. 2. The method of claim 1, further comprising: associating the identification of the first analyst with the data stream related to the known user of interest; andadditionally associating the identification of the second analyst with the data stream related to the known user of interest. 3. The method of claim 2, wherein the association is performed by a look up table (LUT) providing a cross-reference of the data stream related to the known user of interest and the identification of the first analyst and the identification of the second analyst. 4. The method of claim 1, further comprising: receiving an identification of at least one analyst other than the first analyst and the second analyst, the at least one analyst also being authorized to receive the data stream related to the known user of interest. 5. The method of claim 4, wherein each of the first analyst, the second analyst and the at least one analyst is approved to receive a unique portion of the data stream related to the known user of interest. 6. The method of claim 5, comprising parsing the data stream related to the known user of interest into different portions based on a type of approval of the first analyst, the second analyst and the at least one analyst. 7. The method of claim 1, further comprising: retrieving one of the first data stream and the second data stream at a request of a corresponding one of the first analyst and the second analyst based on an analyst ID in an LUT identifying both the first analyst and the second analyst. 8. The method of claim 1, further comprising: storing a first metadata associated with a first analysis of the data stream related to the known user of interest performed by the first analyst in a common storage server; andstoring a second metadata associated with a second analysis of the data stream related to the known user of interest performed by the second analyst in the common storage server. 9. The method of claim 1, wherein the known user ID is based on at least one of a network ID, a requesting agency ID, a network provider ID, a name of the known user of interest, and an associated information of the known user of interest. 10. The method of claim 1, further comprising duplicating output data from the NMS to provide to the first analyst and the second analyst based on the identification thereof. 11. A multi-tenant capable NMS configured to monitor a set of activities between users of a WAN comprising: at least one memory; andat least one processor communicatively coupled to the at least one memory, the at least one processor being configured to execute instructions to: capture data streams from multiple carriers on common data lines on the WAN to be stored within the at least one memory,receive an identification of a first analyst authorized to receive data related to a known user of interest thereto, the known user of interest being a user of the WAN whose activity is monitored through the NMS,receive an identification of a second analyst also authorized to receive data related to the known user of interest,receive a known user ID associated with the known user of interest configured to be monitored at an access device communicatively coupled to the WAN from the first analyst and the second analyst,parse a data stream of the captured data streams related to the known user of interest into a common portion relevant to both the first analyst and the second analyst, a first unique portion solely relevant to the first analyst and a second unique portion solely relevant to the second analyst following the reception of the identification of the first analyst and the identification of the second analyst and the reception of the known user ID from the first analyst and the second analyst,parse a single instance of the common portion of the data stream to simultaneously retrieve the common portion for both the first analyst and the second analyst,retrieve a first data stream related to the known user of interest based on the reception of the known user ID from the first analyst and the identification of the first analyst, the retrieving of the first data stream comprising retrieving both the first unique portion and the common portion,retrieve a second data stream related to the known user of interest based on the reception of the known user ID from the second analyst and the identification of the second analyst, the retrieving of the second data stream comprising retrieving both the second unique portion and the common portion,transmit the retrieved first data stream related to the known user of interest solely to the first analyst, andtransmit the retrieved second data stream related to the known user of interest solely to the second analyst,wherein the NMS is modularized such that the first analyst and the second analyst are provided with a capability to scale a functionality providing the data stream related to the known user of interest as per a requirement thereof. 12. The NMS of claim 11, wherein the at least one processor is further configured to execute instructions to cross-reference the data stream related to the known user of interest through an LUT and perform the identification of the first analyst and the second analyst. 13. The NMS of claim 11, wherein the at least one processor is configured to execute instructions to approve each of the first analyst and the second analyst to receive unique portions of the data stream related to the known user of interest. 14. The NMS of claim 13, wherein the at least one processor is configured to enable parsing the data stream related to the known user of interest into different portions based on a type of approval of the first analyst and the second analyst. 15. A system comprising: a WAN; anda multi-tenant capable NMS configured to monitor a set of activities between users of the WAN through access devices thereof communicatively coupled to the WAN, the NMS further being configured to: capture data streams from multiple carriers on common data lines on the WAN to be stored therewithin,receive an identification of a first analyst authorized to receive data related to a known user of interest thereto, the known user of interest being a user of the WAN whose activity is monitored through the NMS,receive an identification of a second analyst also authorized to receive data related to the known user of interest,receive a known user ID associated with the known user of interest configured to be monitored at an access device communicatively coupled to the WAN from the first analyst and the second analyst,parse a data stream of the captured data streams related to the known user of interest into a common portion relevant to both the first analyst and the second analyst, a first unique portion solely relevant to the first analyst and a second unique portion solely relevant to the second analyst following the reception of the identification of the first analyst and the identification of the second analyst and the reception of the known user ID from the first analyst and the second analyst,parse a single instance of the common portion of the data stream to simultaneously retrieve the common portion for both the first analyst and the second analyst,retrieve a first data stream related to the known user of interest based on the reception of the known user ID from the first analyst and the identification of the first analyst, the retrieving of the first data stream comprising retrieving both the first unique portion and the common portion,retrieve a second data stream related to the known user of interest based on the reception of the known user ID from the second analyst and the identification of the second analyst, the retrieving of the second data stream comprising retrieving both the second unique portion and the common portion,transmit the retrieved first data stream elated to thr known user of interest solely to the first analyst, andtransmit the retrieved second data stream related to the known user of interest solely to the second analyst,wherein the NMS is modularized such that the first analyst and the second analyst are provided with a capability to scale a functionality providing the data stream related to the known user of interest as per a requirement thereof. 16. The system of claim 15, wherein the NMS is further configured to perform a cross-reference of the data stream related to the known user of interest through an LUT. 17. The system of claim 15, wherein the NMS is further configured to receive an identification of at least one analyst other than the first analyst and the second analyst, the at least one analyst also being authorized to receive the data stream related to the known user of interest, 18. The system of claim 17, wherein the NMS is further configured to approve each of the first analyst, the second analyst and the at least one analyst to receive a unique portion of the data stream related to the known user of interest. 19. The system of claim 18, wherein the NMS is configured to parse the data stream related to the known user of interest into different portions based on a type of approval of the first analyst, the second analyst and the at least one analyst. 20. The system of claim 15, wherein the NMS is configured to retrieve one of the first data stream and the second data stream in accordance with a request from a corresponding one of the first analyst and the second analyst based on an analyst ID in an LUT identifying both the first analyst and the second analyst.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (246)
Raizen, Helen S.; Reiner, David Stephen; Pellowski, Robert J.; Sandstrom, Harold M.; Roberts, Harrison K., Adaptive optimization across information technology infrastructure.
Bantz, David F; Chefalas, Thomas E; Jalan, Srikant; Mastrianni, Steven J; Pickover, Clifford Alan, Apparatus and methods for activity-based management of computer systems.
Kracht, James E., Approaches for determining actual physical topology of network based on gathered configuration information representing true neighboring devices.
Chheda, Mahendra M.; Heidel, Shawn E.; Jaye, Robert B.; Brindley-Koonce, Justin K.; Brandwine, Eric Jason, Best practice analysis, third-party plug-ins.
Cai, Yigang; Chen, Xu, Call control component employment of one or more criteria for internet protocol call selection for eavesdrop component monitoring.
Gardenswartz Will H. ; Banker David W. ; Goidel Melissa B., Communicating with a computer based on an updated purchase behavior classification of a particular consumer.
Bondy,William M.; Jones,Wesley Stuart; Silverman,Shmuel; Wiatrak,Bruce Martin; Liss,Raymond M.; Moran,Timothy L.; Nodell,Howard; Hug,Robert Gerald, Communication network with a collection gateway and method for providing surveillance services.
Flewallen, Steven Adams; Johnson, David Nephi; Burch, Lloyd Leon; Fjeldsted, Benjamin Clark; Beus, David Kent; Sriram, Thiruvarangam Viswanathan, Control of communication ports of computing devices using policy-based decisions.
Redlich, Ron M.; Nemzow, Martin A., Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor.
Adelstein, Frank N.; Powers, Judson; Joyce, Robert A.; Bronner, Derek, Extensible software tool for investigating peer-to-peer usage on a target device.
Tanimoto, Yoshifumi, File server device arranged in a local area network and being communicable with an external server arranged in a wide area network.
Barney Matthew F., Intelligent agent for identifying intellectual property infringement issues in computer network sites and method of operation thereof.
Shen, Jennifer Iting; Shahine, Omar H.; Kafka, Steven D.; Telehowski, Jennie Park; Gillum, Eliot; Yang, Sara Liu, Leveraging communications to identify social network friends.
Sim-Tang, Siew Yong; Fraisl, Daniel J.; Hoeber, Anthony N., Management interface for a system that provides automated, real-time, continuous data protection.
Moisand, Jerome Pascal; Onishi, Steven; Kokot, Mathias; DeRuijter, Denis Henk, Managing a network flow using application classification information and active signaling relay.
James E. Kracht, Mechanism for determining actual physical topology of network based on gathered configuration information representing true neighboring devices.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support exper.
Knight Greg ; Nicholson Robert Bruce, Method and apparatus for analyzing a storage network based on incomplete information from multiple respective controllers.
Cohen,Ron; Snir,Yoram; Schnizlein,John, Method and apparatus for automatically establishing bi-directional differentiated services treatment of flows in a network.
Aggarwal Ajay (Somersworth NH) Scott Walter (Salem NH) Rustici Eric (Londonderry NH) Bucciero David (Nashua NH) Haskins Andrew (Lee NH) Matthews Wallace (Exeter NH), Method and apparatus for determining a communications path between two nodes in an Internet Protocol (IP) network.
Arad Naveh ; Itzhak Parnafes ; Shai Mohaban ; Steven M. Woo, Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs.
Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
Sutou, Hiromi; Kontani, Tsutomu, Method and apparatus for remotely controlling a terminal by a control terminal and storing control history information at the terminal being remotely controlled.
Barclay, Deborah Lewandowski; Benco, David S.; Mahajan, Sanjeev; McRoberts, Thomas Lee; Ruggerio, Raymond Leroy, Method and apparatus for surveillance of voice over internet protocol communications.
Wheeler, Maxon R.; Camp, II, William N.; Mamitsuka, Lien T.; Mitra, Christopher A.; Putterman, Scott I.; Wei, Kai, Method and system for intermediating content provider website and mobile device.
Duimovich,Frank; Godin,Benoit; Col찼sante,Frederico; Hashim,Mohamed, Method and system for managing performance of data transfers for a data access system.
Boysko, Glenn J.; Hurwood, William; Li, Benjamin Z.; Warikoo, Abhimanyu, Method and system for security and user account integration by reporting systems with remote repositories.
Brown, Martin; Griffith, Tim Peter; Knibb, David Evans; Heritage, Ian Derek, Method and system for simulating latency between layers of multi-tier applications.
Ramakrishnan, Karthik; Collett, Ian Gordon; Rahim, Rubens, Method for implementing an internet protocol (IP) charging and rating middleware platform and gateway system.
Hao,Ming C.; Dayal,Umeshwar; Cotting,Daniel; Gross,Markus; Holenstein,Thomas; Ono,Brian; Karp,Alan, Method for visualizing graphical data sets having a non-uniform graphical density for display.
Cadiou, Jean-François; Bonnamy, Jean-Michel; Hamchaoui, Isabelle; Chaplain, René, Method of configuring parameters for managing data packets of a data stream.
Logan, James D.; Palmer, Mark; Call, Charles G., Methods and apparatus for creating, combining, distributing and reproducing program content for groups of participating users.
Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
Kayashima,Makoto; Fujiyama,Tatsuya; Terada,Masato; Watanabe,Yoshinori; Ogino,Takaaki, Network management system for generating setup information for a plurality of devices based on common meta-level information.
O'Steen,Roberta R.; Reddick,Linda; Hodges, Jr.,Charles Y.; Walters,Jon Timothy; Huff,Leslie, System and method for automated network element database population.
Nielsen Christopher Robbins ; Poston Ricky Lee ; Stair Stephen Gray ; Tsao I-Hsing, System and method for displaying the contents of a web page based on a user's interests.
Martinez, Ronald; Davis, Marc Eliot; Spiegelman, Michael; Paretti, Christopher T.; Ghezzi, Nicola Stefano; Higgins, Christopher William; Kalaboukis, Chris, System and method for distributing media related to a location.
Jamjoom, Hani T.; Podlaseck, Mark E.; Qu, Huiming; Ruan, Yaoping; Shae, Zon-Yin; Sheopuri, Anshul, System and method for dynamic rescheduling of multiple varying resources with user social mapping.
Jamjoom, Hani T.; Podlaseck, Mark E.; Qu, Huiming; Ruan, Yaoping; Shae, Zon-Yin; Sheopuri, Anshul, System and method for dynamic rescheduling of multiple varying resources with user social mapping.
Soles, William E.; Leon E. Morgan Jr.; Anth, Arthur J.; Thompson, Marion B.; O'Shea, Edward T.; Garguilo, Frank E.; Bowlin, Amy H.; Morgan, Joseph, System and method for evaluating the performance of a computer application.
Schuetze, Hinrich; Chen, Francine R.; Pirolli, Peter L.; Pitkow, James E.; Chi, Ed H.; Li, Jun, System and method for identifying similarities among objects in a collection.
Glade, Bradford B.; Harvey, David W.; Kemeny, John; Waxman, Matthew D., System and method for managing provisioning of storage resources in a network with virtualization of resources in such a network.
Johnson Charles George ; Lakshmi-Ratan Ramnath A. ; Lanning Steven G. ; Renger Bernard S L, System and method for monitoring information flow and performing data collection.
Davis,Owen; Jain,Vidyut, System and method for monitoring the use of a resource by a client connected to a computer network having one or more servers in communication with one or more clients.
Wittenstein, Andreas; Eynon, Mike; Mather, Laura; Lloyd, Jim; Frantz, Matt, System and method for network security including detection of attacks through partner websites.
Begeja, Lee; Liu, Zhu; Renger, Bernard S.; Shahraray, Behzad; Basso, Andrea; Gibbon, David C.; Kumar, Sumit; Zavesky, Eric, System and method for notification of events of interest during a video conference.
Zilberstein, Moshe; Matsliach, Gaby; Ronen, Avner; Ventura, Ronen; Rousso, Benny; Buber, Shai, System and method for processing and presenting internet usage information.
Ignatius,Paul; Prahlad,Anand; Tyagarajan,Mahesh; Vijayan Retnamma,Manoj; Amarendran,Arun; Kottomtharayil,Rajiv, System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device.
Agarwal Neeraj ; Perret Pierre ; McMenemy Michael G., Systems and methods for monitoring distributed applications including an interface running in an operating system kernel.
Bardsley,Jeffrey S.; Brock,Ashley A.; Davis, III,Charles K.; Kim,Nathaniel W.; McKenna,John J.; Villegas,Carlos F., Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system.
Ansell Steven T. ; Cherenson Andrew R., Territorial determination of remote computer location in a wide area network for conditional delivery of digitized products.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.