US 12,437,032 B2
Deepfake attack identification system
Shmuel Ur, Shorashim (IL)
Assigned to Shmuel Ur Innovation LTD., Shorashim (IL)
Filed by Shmuel Ur Innovation LTD., Shorashim (IL)
Filed on Aug. 14, 2023, as Appl. No. 18/233,672.
Application 18/233,672 is a continuation in part of application No. 17/723,528, filed on Apr. 19, 2022, granted, now 11,755,692.
Application 17/723,528 is a continuation of application No. 17/079,475, filed on Oct. 25, 2020, granted, now 11,334,649, issued on May 17, 2022.
Application 17/079,475 is a continuation of application No. 16/902,287, filed on Jun. 16, 2020, granted, now 10,860,692, issued on Dec. 8, 2020.
Claims priority of provisional application 62/862,071, filed on Jun. 16, 2019.
Prior Publication US 2023/0385385 A1, Nov. 30, 2023
Int. Cl. G06F 21/10 (2013.01); G06F 16/435 (2019.01); H04L 65/75 (2022.01); H04N 7/15 (2006.01)
CPC G06F 21/10 (2013.01) [G06F 16/435 (2019.01); H04L 65/765 (2022.05); H04N 7/15 (2013.01); G06F 21/1062 (2023.08)] 8 Claims
OG exemplary drawing
 
1. A communication system enabling holding a video conference between at least a first participant and a second participant, said communication system comprising:
a first computer used by the first participant, the first computer comprising a first media capturing device, and a first media output device, wherein the first media capturing device is utilized to capture media of the first participant, wherein the first media output device is configured to output to the first participant a media of at least the second participant;
a second computer used by the second participant, the second computer comprising a second media capturing device, and a second media output device, wherein the second media capturing device is utilized to capture media of the second participant, wherein the second media output device is configured to output to the second participant a media of at least the first participant;
a verification platform, the verification platform is configured to determine whether the media transmitted by the first computer is a part of a deepfake attack, the deepfake attack comprises provisioning of a deepfake media of the first participant, the deepfake media is generated using deepfake technique and not in real-time; and
said second computer is configured to provide to the second participant, using said second media output device, a verification message indicating whether the verification identified the deepfake attack, whereby warning the second participant of the deepfake attack.