Keysight Technologies Singapore (Sales) Pte. Ltd

Singapour

Retour au propriétaire

1-100 de 413 pour Keysight Technologies Singapore (Sales) Pte. Ltd Trier par
Recheche Texte
Affiner par
Juridiction
        États-Unis 411
        International 2
Date
2023 1
2021 2
2020 1
Avant 2020 409
Classe IPC
H04L 12/26 - Dispositions de surveillance; Dispositions de test 169
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 62
H04L 12/24 - Dispositions pour la maintenance ou la gestion 47
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks] 28
H04W 24/06 - Réalisation de tests en trafic simulé 27
Voir plus
Résultats pour  brevets
  1     2     3     ...     5        Prochaine page

1.

Antenna arrays for testing wireless devices

      
Numéro d'application 18226245
Numéro de brevet 12244357
Statut Délivré - en vigueur
Date de dépôt 2023-07-25
Date de la première publication 2023-11-16
Date d'octroi 2025-03-04
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) Pte. Ltd. (Singapour)
Inventeur(s) Thiruvarankan, Rajaratnam

Abrégé

A test system includes a radio frequency (RF) shielded chamber and an antenna array in the RF shielded chamber. The antenna array includes groups of antenna elements and power combiners. Each group of antenna elements is matched to a matching group of antenna elements by virtue of being coupled to a respective power combiner for both the group and the matching group. The antenna array is configured, by virtue of spacing apart the antenna elements by at least half of a wavelength of a test signal for testing a wireless device in the RF chamber, so that power delivered to output ports of the antenna array is substantially uniform regardless of where the wireless device is placed within the RF chamber.

Classes IPC  ?

  • H01Q 1/50 - Association structurale d'antennes avec commutateurs de terre, dispositions de descente d'antennes ou parafoudres
  • G01R 29/10 - Diagrammes de rayonnement d'antennes
  • H04B 17/00 - SurveillanceTests
  • H04B 17/10 - SurveillanceTests d’émetteurs

2.

Methods, systems, and computer readable media for utilizing predetermined encryption keys in a test simulation environment

      
Numéro d'application 17329033
Numéro de brevet 11831763
Statut Délivré - en vigueur
Date de dépôt 2021-05-24
Date de la première publication 2021-09-09
Date d'octroi 2023-11-28
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Cipu, Andrei
  • Badea, Alexandru
  • Ciobanu, George

Abrégé

Methods, systems, and computer readable media for utilizing predetermined encryption keys in a test simulation environment are disclosed. In one embodiment, a method includes generating, prior to an initiation of an Internet protocol security (IPsec) test session, a private key and a public key at a traffic emulation device and storing the private key and the public key in a local storage associated with the traffic emulation device. The method further includes retrieving, from the local storage, the private key and the public key upon the initiation of the IPsec test session between the traffic emulation device and a device under test (DUT) and generating a shared secret key utilizing the retrieved private key and a DUT public key received from the DUT.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/50 - Disposition de test
  • H04L 43/10 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route

3.

Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques

      
Numéro d'application 17105411
Numéro de brevet 11489666
Statut Délivré - en vigueur
Date de dépôt 2020-11-25
Date de la première publication 2021-03-18
Date d'octroi 2022-11-01
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Bergeron, Matthew R.

Abrégé

A method executed by a dynamic session key acquisition (DSKA) engine residing in a virtual environment includes receiving session decryption information extraction instructions that configure the DSKA engine to obtain session decryption information for at least one communication session involving a virtual machine and obtaining the session decryption information from the virtual machine in accordance with the session decryption information extraction instructions. The session decryption information includes cryptographic keys utilized by an application server instance in the virtual machine to establish the at least one communication session. The session decryption information obtained from the virtual machine is stored and provided to a network traffic monitoring (NTM) agent. The NTM agent utilizes the session decryption information to decrypt copies of encrypted network traffic flows belonging to the at least one communication session involving the virtual machine.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
  • H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux

4.

Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques

      
Numéro d'application 16113360
Numéro de brevet 10903985
Statut Délivré - en vigueur
Date de dépôt 2018-08-27
Date de la première publication 2020-02-27
Date d'octroi 2021-01-26
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Bergeron, Matthew R.

Abrégé

A method executed by a dynamic session key acquisition (DSKA) engine residing in a virtual environment includes receiving session decryption information extraction instructions that configure the DSKA engine to obtain session decryption information for at least one communication session involving a virtual machine and obtaining the session decryption information from the virtual machine in accordance with the session decryption information extraction instructions. The session decryption information includes cryptographic keys utilized by an application server instance in the virtual machine to establish the at least one communication session. The session decryption information obtained from the virtual machine is stored and provided to a network traffic monitoring (NTM) agent. The NTM agent utilizes the session decryption information to decrypt copies of encrypted network traffic flows belonging to the at least one communication session involving the virtual machine.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

5.

Computing label-switched data communication paths

      
Numéro d'application 16557405
Numéro de brevet 10924394
Statut Délivré - en vigueur
Date de dépôt 2019-08-30
Date de la première publication 2019-12-19
Date d'octroi 2021-02-16
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Chakraborty, Joy
  • Banerjee, Joydeep

Abrégé

Methods, systems, and computer readable media for computing label-switched data communication paths are disclosed. An example method includes receiving, by a path computation element (PCE) implemented on at least one processor, synchronization status information for routing nodes in a label-switched network. The method includes receiving, by the PCE, a request for a label-switched path (LSP) from a client. The method includes determining, by the PCE, a responsive LSP based at least in part on the synchronization status information. The method includes sending, by the PCE, an explicit route object (ERO) for the responsive LSP to the client.

Classes IPC  ?

  • H04L 12/723 - Routage par labels ou étiquettes, p.ex. commutation d’étiquettes multi-protocoles [MPLS] ou commutation d’étiquettes multiprotocoles généralisée [GMPLS]
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/717 - Routage centralisé
  • H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
  • H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
  • H04J 3/06 - Dispositions de synchronisation

6.

Antenna arrays for testing wireless devices

      
Numéro d'application 16380926
Numéro de brevet 11728908
Statut Délivré - en vigueur
Date de dépôt 2019-04-10
Date de la première publication 2019-08-01
Date d'octroi 2023-08-15
Propriétaire Keysight Technologies Singapore (Sales) Pte., Ltd. (Singapour)
Inventeur(s) Thiruvarankan, Rajaratnam

Abrégé

A test system includes a radio frequency (RF) shielded chamber and an antenna array in the RF shielded chamber. The antenna array includes groups of antenna elements and power combiners. Each group of antenna elements is matched to a matching group of antenna elements by virtue of being coupled to a respective power combiner for both the group and the matching group. The antenna array is configured, by virtue of spacing apart the antenna elements by at least half of a wavelength of a test signal for testing a wireless device in the RF chamber, so that power delivered to output ports of the antenna array is substantially uniform regardless of where the wireless device is placed within the RF chamber.

Classes IPC  ?

7.

Computing label-switched data communication paths

      
Numéro d'application 15713558
Numéro de brevet 10447587
Statut Délivré - en vigueur
Date de dépôt 2017-09-22
Date de la première publication 2019-03-28
Date d'octroi 2019-10-15
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Chakraborty, Joy
  • Banerjee, Joydeep

Abrégé

Methods, systems, and computer readable media for computing label-switched data communication paths are disclosed. An example method includes receiving, by a path computation element (PCE) implemented on at least one processor, synchronization status information for routing nodes in a label-switched network. The method includes receiving, by the PCE, a request for a label-switched path (LSP) from a client. The method includes determining, by the PCE, a responsive LSP based at least in part on the synchronization status information. The method includes sending, by the PCE, an explicit route object (ERO) for the responsive LSP to the client.

Classes IPC  ?

  • H04L 12/723 - Routage par labels ou étiquettes, p.ex. commutation d’étiquettes multi-protocoles [MPLS] ou commutation d’étiquettes multiprotocoles généralisée [GMPLS]
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
  • H04J 3/06 - Dispositions de synchronisation

8.

Correlating tapped general packet radio service (GPRS) tunneling protocol (GTP) and non-GTP packets for a subscriber's session for load balancing and filtering monitored traffic in a mobile network

      
Numéro d'application 15721073
Numéro de brevet 10278087
Statut Délivré - en vigueur
Date de dépôt 2017-09-29
Date de la première publication 2019-03-28
Date d'octroi 2019-04-30
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Ţenea, Bogdan
  • O'Connor, Robin Lee
  • Pandey, Shardendu
  • Schwenk, Alan Richard

Abrégé

The subject matter described herein includes methods, systems, and computer readable media for correlating, load balancing and filtering tapped GTP and non-GTP packets. One method for correlating, load balancing and filtering tapped GTP and non-GTP packets includes receiving GTP packets tapped from a plurality of GTP network tap points. The method further includes receiving non-GTP packets tapped from at least one non-GTP network tap point. The method further includes correlating GTP packets with non-GTP packets for a particular subscriber. The method further includes forwarding the GTP packets and non-GTP packets correlated for the particular subscriber to a network monitoring tool.

Classes IPC  ?

  • H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
  • H04W 24/08 - Réalisation de tests en trafic réel
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/46 - Interconnexion de réseaux

9.

Methods, systems and computer readable media for optimizing placement of virtual network visibility components

      
Numéro d'application 15709433
Numéro de brevet 10541901
Statut Délivré - en vigueur
Date de dépôt 2017-09-19
Date de la première publication 2019-03-21
Date d'octroi 2020-01-21
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s) Raney, Kristopher Len

Abrégé

A method for optimizing placement of virtual network visibility components includes providing a virtual network monitoring tap instance for copying packets in a network. The method further includes providing a virtual network packet broker instance for receiving and distributing the copied packets to at least one network monitoring tool instance. The method further includes analyzing a network performance or utilization parameter associated with transmission of the copied packets among the virtual network tap instance, the virtual network packet broker instance and the network monitoring tool instance. The method further includes modifying, based on results of the analyzing, placement of at least one of the virtual network packet broker instance and the virtual network monitoring tool instance.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

10.

Methods, systems, and computer readable media for monitoring encrypted network traffic flows

      
Numéro d'application 15980699
Numéro de brevet 10992652
Statut Délivré - en vigueur
Date de dépôt 2018-05-15
Date de la première publication 2019-02-28
Date d'octroi 2021-04-27
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Putatunda, Amritam
  • Majumdar, Partha

Abrégé

Methods, systems, and computer readable media for monitoring encrypted packet communications are disclosed. According to one method executed at an encryption aware visibility (EAV) device, the method includes receiving copies of encrypted network traffic flow records belonging to at least one communication session involving a monitored application and obtaining, from a secure session management (SSM) server, session decryption information (SDI) via a secure backchannel interface connection, wherein the session decryption information includes cryptographic keys generated by the SSM server to establish the at least one communication session. The method further includes using the cryptographic keys to decrypt the copies of encrypted network traffic flow records to produce decrypted network traffic flow records.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

11.

Methods, systems, and computer readable media for conducting and validating network route convergence testing

      
Numéro d'application 15640416
Numéro de brevet 10608913
Statut Délivré - en vigueur
Date de dépôt 2017-06-30
Date de la première publication 2018-12-27
Date d'octroi 2020-03-31
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s)
  • Lee, Dean Ding-Tang
  • Pandichie, Anton-Valentin
  • Niculescu, Silviu Ionut

Abrégé

A method for testing network route convergence includes receiving input for specifying a route convergence threshold and a frame loss tolerance for a route convergence test. The route convergence test is initiated by transmitting data plane traffic addressed to at least one destination to a device under test (DUT). At least one route is advertised to the DUT. A first time instance when the at least one route is advertised to the DUT is recorded. Data plane traffic routed by the DUT is monitored. It is detected when data plane traffic for the at least one route reaches the route convergence threshold. In response to detecting that the data plane traffic reaches the route convergence threshold, a second time instance is recorded and a route convergence validation test phase is initiated. During the route convergence validation test phase, an indication of frame loss for the at least one route is determined and an indication of validity or invalidity of the route convergence test is generated based on a relationship between the indication of frame loss and the frame loss tolerance.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance

12.

Drop detection and protection for network packet monitoring in virtual processing environments

      
Numéro d'application 15949578
Numéro de brevet 11012327
Statut Délivré - en vigueur
Date de dépôt 2018-04-10
Date de la première publication 2018-12-20
Date d'octroi 2021-05-18
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Raney, Kristopher
  • Bergeron, Matthew R.

Abrégé

Systems and methods are disclosed for drop detection and protection with respect to packet monitoring in virtual processing environments. Tap agents monitor and capture packets from the network traffic associated with network applications running within these virtual processing environments. Sequence numbers are added in packet encapsulation before tap packets are forwarded to tool agents. The tool agents then use the sequence numbers to detect packet drops within the tap packets. After drop detection, the tool agents send drop detection messages to an agent controller, and the agent controller generates and sends reconfiguration messages to the tap agents based upon the drop detection messages. The tool agents can also send drop detection messages directly to the tap agents. The tap agents adjust their operations based upon the reconfiguration messages and/or the drop detection messages to reduce packet drops within subsequent tap packets communications.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/801 - Commande de flux ou commande de congestion
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

13.

Hash-based selection of network packets for packet flow sampling in network communication systems

      
Numéro d'application 15692152
Numéro de brevet 10715378
Statut Délivré - en vigueur
Date de dépôt 2017-08-31
Date de la première publication 2018-12-20
Date d'octroi 2020-07-14
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s) Johansson, Stefan

Abrégé

Systems and methods are disclosed for hash-based selection of network packets for packet flow sampling in network communication systems. Input packets associated with packet flows within a network communication system are received by a hash-based sampler. The hash-based sampler then generates hash values for the input packets based upon fields within the input packets. These fields are selected to identify packet flows for the input packets. The hash values for the input packets are then compared to a mask. The mask is configured to determine a subset of packet flows for which to forward packets. Based upon this comparison, certain input packets are selected to be forwarded for further processing, and non-selected packets are discarded. The further processing can include processing the selected input packets to generate flow statistics data (e.g., IPFIX) for the selected input packets.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/701 - Routage ou recherche du chemin de transmission

14.

Methods, systems, and computer readable media for monitoring encrypted packet flows within a virtual network environment

      
Numéro d'application 15608369
Numéro de brevet 10855694
Statut Délivré - en vigueur
Date de dépôt 2017-05-30
Date de la première publication 2018-12-06
Date d'octroi 2020-12-01
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Majumder, Anirban
  • Desdier, Marcel Felix

Abrégé

Methods, systems, and computer readable media for packet monitoring in a virtual environment are disclosed. According to one method executed at a virtual tap element residing in between a first virtual machine and a second virtual machine in a virtual network environment, the method includes obtaining cryptographic key information from either the first virtual machine or the second virtual machine and detecting an encrypted packet flow being communicated in the virtual network environment between the first virtual machine and the second virtual machine via the virtual tap element. The method further includes decrypting the encrypted packet flow using the cryptographic key information, generating a decrypted packet flow set comprising at least a portion of the decrypted packet flow, and sending the decrypted packet flow set to a packet analyzer.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

15.

Providing computing device configuration information via a light transmission

      
Numéro d'application 15589617
Numéro de brevet 10678745
Statut Délivré - en vigueur
Date de dépôt 2017-05-08
Date de la première publication 2018-11-08
Date d'octroi 2020-06-09
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s) Bergeron, Matthew Ryan

Abrégé

Methods, systems, and computer readable media for providing computing device configuration information via a light transmission are disclosed. According to one method, the method occurs at a computing device. The method includes receiving configuration information including an internet protocol (IP) address assigned by a network node. The method also includes sending a transmission including the configuration information, wherein the configuration information includes the IP address, wherein the transmission includes either a visible light transmission or an infrared (IR) transmission.

Classes IPC  ?

  • G06F 15/177 - Commande d'initialisation ou de configuration
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 24/08 - Réalisation de tests en trafic réel
  • H04B 10/077 - Dispositions pour la surveillance ou le test de systèmes de transmissionDispositions pour la mesure des défauts de systèmes de transmission utilisant un signal en service utilisant un signal de surveillance ou un signal supplémentaire
  • G02B 5/20 - Filtres
  • H04B 10/114 - Systèmes d’intérieur ou à courte portée
  • G06F 15/76 - Architectures de calculateurs universels à programmes enregistrés
  • H04B 10/116 - Communications par lumière visible

16.

Methods, systems, and computer readable media for testing time sensitive network (TSN) elements

      
Numéro d'application 15498452
Numéro de brevet 10425321
Statut Délivré - en vigueur
Date de dépôt 2017-04-26
Date de la première publication 2018-10-25
Date d'octroi 2019-09-24
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s)
  • Joseph, Vinod
  • Balan, Alina Crina
  • Regev, Alon
  • Ţenea, Bogdan

Abrégé

Methods, systems, and computer readable media for testing time sensitive network (TSN) elements are disclosed. According to one method for testing a TSN element, the method occurs at a test system. The method includes synchronizing a test system clock with a clock at a system under test (SUT). The method also includes receiving a sequence of messages, wherein the sequence of messages is generated using schedule rules associated with a TSN stream. The method further includes determining, using timing information associated with the test system clock, whether the schedule rules are accurately implemented by the SUT.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04J 3/06 - Dispositions de synchronisation

17.

Methods, systems, and computer readable media for testing scheduling fidelity in a time sensitive network

      
Numéro d'application 15647207
Numéro de brevet 10623297
Statut Délivré - en vigueur
Date de dépôt 2017-07-11
Date de la première publication 2018-10-25
Date d'octroi 2020-04-14
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s) Regev, Alon

Abrégé

Methods, systems, and computer readable media for testing and/or determining scheduling fidelity in a time sensitive network (TSN) are disclosed. According to one method for determining scheduling fidelity in a TSN, the method occurs in a test system. The method includes receiving, via a system under test (SUT), at least one expected receive time indicating when a test packet is expected to be received by at least one destination. The method further includes computing, using the at least one expected receive time and at least one actual receive time, a time variation metric associated with the test packet.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • G06F 11/273 - Matériel de test, c.-à-d. circuits de traitement de signaux de sortie
  • G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p. ex. essais de mise en route
  • H04J 3/06 - Dispositions de synchronisation

18.

Methods, systems, and computer readable media for monitoring, adjusting, and utilizing latency associated with accessing distributed computing resources

      
Numéro d'application 15482672
Numéro de brevet 10609054
Statut Délivré - en vigueur
Date de dépôt 2017-04-07
Date de la première publication 2018-10-11
Date d'octroi 2020-03-31
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Jackson, Stephen Samuel

Abrégé

Methods, systems, and computer readable media for monitoring, adjusting, and utilizing latency associated with accessing distributed computing resources are disclosed. One method includes measuring a first latency associated with accessing a first computing resource located at a first site. The method further includes the measuring a second latency associated with accessing a second computing resource located at a second site different from the first site. The method further includes selectively impairing transmission of packets to or processing of packets by at least one of the first and second computing resources in accordance with a performance, network security, or diagnostic goal.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • G06F 12/16 - Protection contre la perte de contenus de mémoire
  • G08B 23/00 - Alarmes réagissant à des conditions indésirables ou anormales, non spécifiées
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/841 - Actions liées à la commande de flux utilisant des données temporelles, p.ex. temps d'aller retour [RTT]

19.

Optimizing storage of application data in memory

      
Numéro d'application 15948728
Numéro de brevet 11392488
Statut Délivré - en vigueur
Date de dépôt 2018-04-09
Date de la première publication 2018-10-11
Date d'octroi 2022-07-19
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Bergeron, Matthew R.

Abrégé

Methods, systems, and computer readable media for optimizing storage of application data in memory are disclosed. According to one method for optimizing storage of application data in memory, the method includes receiving application data associated with an application. The method also includes generating, using information about the application, information about a processor, and information about a memory, a memory map indicating one or more memory locations in the memory for storing the application data. The method further includes storing, using the memory map, the application data in the one or more memory locations. The method also includes executing, using the processor, the application that uses the application data.

Classes IPC  ?

  • G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
  • G06F 12/02 - Adressage ou affectationRéadressage

20.

Methods, systems, and computer readable media for advertising network security capabilities

      
Numéro d'application 15585116
Numéro de brevet 10581802
Statut Délivré - en vigueur
Date de dépôt 2017-05-02
Date de la première publication 2018-09-20
Date d'octroi 2020-03-03
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s)
  • Banerjee, Joydeep
  • Chakraborty, Joy

Abrégé

Methods, systems, and computer readable media for advertising network security capabilities are disclosed. According to one method, the method occurs at a network node. The method includes receiving a first route advertisement message that includes network security capabilities information indicating capabilities of a network security system associated with a route. The method also includes receiving a packet associated with a packet flow. The method further includes directing the packet associated with the packet flow to a downstream network node associated with the network security system.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/751 - Mise à jour ou découverte de la topologie

21.

Methods, systems and computer readable media for providing receive port resiliency in a network equipment test device

      
Numéro d'application 15451367
Numéro de brevet 10181997
Statut Délivré - en vigueur
Date de dépôt 2017-03-06
Date de la première publication 2018-09-06
Date d'octroi 2019-01-15
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Joseph, Vinod
  • Gintis, Noah Steven

Abrégé

A system for providing test receive port resiliency includes a network equipment test device including a port module for transmitting test packets to and receiving packets from a device under test (DUT). The system further includes a port central processing unit (CPU) associated with the port module for processing packets that the CPU receives from the DUT. The system further includes a configurable pre-filter associated with the port module for pre-filtering the packets to prevent at least some of the packets from being forwarded to the port CPU. The system further includes a pre-filter rules generator for analyzing the packets forwarded to the port CPU and for automatically generating a pre-filtering rule to be used by the pre-filter for filtering subsequent packets received from the DUT.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

22.

Systems and methods to forward packets not passed by criteria-based filters in packet forwarding systems

      
Numéro d'application 15972305
Numéro de brevet 10447617
Statut Délivré - en vigueur
Date de dépôt 2018-05-07
Date de la première publication 2018-09-06
Date d'octroi 2019-10-15
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s)
  • Abkowitz, Patricia A.
  • Boyd, Ramona
  • Spooner, Andrew
  • Pleshek, Ronald A.

Abrégé

Systems and methods are disclosed to forward packets not passed by criteria-based filters in packet forwarding systems. The disclosed embodiments include one or more Not Passed By Criteria (NPBC) filters that are defined for input ports along with one or more criteria-based filters, such as for example, Pass by Criteria (PBC) filters and/or Deny by Criteria filters (DBC), that forward packets not passed by these criteria-based filters. NPBC filters include, for example, Pass Unmatched PBC filters associated with PBC filters and configured to forward packets not passed by PBC filters and/or Pass Matched DBC filters associated with DBC filters and configured to forward packets not passed by DBC filters. Using one or more NPBC filters within the disclosed embodiments, packet data that is not being passed along to output ports by the criteria-based filters can be easily passed to one or more designated output ports.

Classes IPC  ?

  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/937 - Commande de la commutation, p.ex. arbitrage

23.

Packet deduplication for network packet monitoring in virtual processing environments

      
Numéro d'application 15455215
Numéro de brevet 10142263
Statut Délivré - en vigueur
Date de dépôt 2017-03-10
Date de la première publication 2018-08-23
Date d'octroi 2018-11-27
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Raney, Kristopher

Abrégé

Systems and methods are disclosed for packet deduplication for network packet monitoring in virtual processing environments. Tap agents are installed and run with respect to network applications operating with virtual processing environments. These tap agents capture packet traffic associated within these network applications, and deduplication rules are applied so that duplicate packet capture is avoided at the tap agents themselves. In particular, deduplication rules are applied to tap agents where two network applications for which packets are being captured are talking to each other so that one of the tap agents is set to the designated agent for packet capture. Without this designation, packets captured at by the two associated packet agents would represent the same packet flow from both ends thereby leading to duplicate packet capture.

Classes IPC  ?

  • H04L 12/939 - Dispositions pour la commutation redondante, p.ex. utilisant des plans de commutation parallèles
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

24.

Methods, systems, and computer readable media for utilizing an augmented scroll bar

      
Numéro d'application 15410415
Numéro de brevet 10579249
Statut Délivré - en vigueur
Date de dépôt 2017-01-19
Date de la première publication 2018-07-19
Date d'octroi 2020-03-03
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Kristiansen, Jesper Soendergaard

Abrégé

The subject matter described herein relates to methods, systems, and computer readable media for utilizing an augmented scroll bar. In some examples, a system for utilizing an augmented scroll bar includes a processing unit, a memory accessed by the processing unit, and a scroll bar manager that is stored in memory and when executed by the processing unit is configured to display contents of a data file within a table layout of a display field. The scroll bar manager is further configured to display, within the display field, a scroll bar user interface element that includes a scrolling region and a view slider element that traverses the scrolling region, wherein the view slider element indicates a position of the table layout within a portion of the data file and the scrolling region graphically illustrates indicia corresponding to dynamic status information of data elements included in the data file.

Classes IPC  ?

  • G06F 3/048 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI]
  • G06F 3/0485 - Défilement ou défilement panoramique
  • G06F 17/24 - Edition, p.ex. insertion/suppression
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

25.

Active firewall control for network traffic sessions within virtual processing platforms

      
Numéro d'application 15380061
Numéro de brevet 10171425
Statut Délivré - en vigueur
Date de dépôt 2016-12-15
Date de la première publication 2018-06-21
Date d'octroi 2019-01-01
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Raney, Kristopher
  • Cox, Dennis J.
  • Paul, Santanu

Abrégé

Methods and systems are disclosed that provide active firewall control for network traffic sessions within virtual processing platforms. Client agent instances run within virtual machine (VM) platforms (e.g., hypervisor, container, etc.) within virtual processing environments and enforce access, proxy, and/or other firewall rules with respect to network traffic sessions for application instances also running within the VM platforms. For certain embodiments, the agent instances collect information about applications and services running within the VM platforms and use this collected information to automatically enforce firewall rules. Additional disclosed embodiments redirect packets from “bad” network sources to a proxied application instance that interacts with the “bad” network source. This proxied interaction allows an agent instance monitoring the proxied session to analyze and assess the actual activity by the “bad” network source without putting the original data or network service at risk. Other features and variations are also be disclosed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

26.

Methods, systems and computer readable media for network tapping and packet brokering in wireless networks

      
Numéro d'application 15383299
Numéro de brevet 10313493
Statut Délivré - en vigueur
Date de dépôt 2016-12-19
Date de la première publication 2018-06-21
Date d'octroi 2019-06-04
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Jackson, Stephen Samuel

Abrégé

A method for network tapping and packet brokering in wireless networks includes tapping a signal in a wireless network and determining whether the signal is a valid signal according to a wireless network protocol. In response to determining that the signal is a valid signal according to the wireless network protocol, the signal is demodulated into a sequence of bits arranged according to the wireless network protocol. In response to determining that the signal is not a valid signal according to the wireless network protocol, an indication that the signal is not a valid signal according to the wireless network protocol is generated. A packet in a format compatible with a network tapping and packet brokering system is generated. At least some of the bits or the indication is inserted in the packet. The packet is transmitted to the network tapping and packet brokering system.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]
  • H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie

27.

Instance based management and control for VM platforms in virtual processing environments

      
Numéro d'application 15379966
Numéro de brevet 10178003
Statut Délivré - en vigueur
Date de dépôt 2016-12-15
Date de la première publication 2018-06-21
Date d'octroi 2019-01-08
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Raney, Kristopher
  • Bergeron, Matthew R.

Abrégé

Metadata associated with client application instances running in virtual machine (VM) platforms within virtual processing environments is collected by monitor applications also running within the VM platforms. The instance metadata is transmitted to and received by a monitor control platform which in turn stores the instance metadata within a monitor instance registry. The instance metadata is updated through solicited or unsolicited updates. The instance metadata is used to identify groups of application instances, and these groups are used to determine targets instances for monitoring or management actions based upon later detected network events such as network security or threat events. Further, trust scores can be determined for components of the metadata stored in the instance registry, and composite trust scores can be generated and used to identify on or more groups of application instances.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

28.

In-session splitting of network traffic sessions for server traffic monitoring

      
Numéro d'application 15380143
Numéro de brevet 11075886
Statut Délivré - en vigueur
Date de dépôt 2016-12-15
Date de la première publication 2018-06-21
Date d'octroi 2021-07-27
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Paul, Santanu
  • Raney, Kristopher
  • Cox, Dennis J.

Abrégé

Methods and systems are disclosed that provide in-session splitting of network traffic sessions for monitoring of traffic between network clients and network servers. This in-session splitting is based upon monitoring traffic sessions for one or more events and then initiating a proxied session based upon detection of the one or more events. For further embodiments, the creation of the proxied session is implemented based upon detection of a request for a secure link within the session traffic, and the proxied session is then implemented such that original session participants are not aware of the proxied session. The encrypted secure communications between the network client and the network server are split into two connections that decrypted and re-encrypted so that the contents of the secure link can be analyzed to identify network threats and/or other desired network related activities.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

29.

Methods, systems, and computer readable media for increasing the rate of established network connections in a test simulation environment

      
Numéro d'application 15382109
Numéro de brevet 10498533
Statut Délivré - en vigueur
Date de dépôt 2016-12-16
Date de la première publication 2018-06-21
Date d'octroi 2019-12-03
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s) Mukhopadhyay, Debapriyay

Abrégé

Methods, systems, and computer readable media for increasing the rate of established network connections in a test simulation environment are disclosed. The method includes generating, by a network equipment test device in a test simulation environment, a random integer. The method further includes designating the generated random integer as a first twin prime value in the event the generated random integer is a prime number and designating, by the network equipment test device, a generated sum of the first twin prime value and a designated value as a second twin prime value in the event the generated sum is a prime number. The method also includes generating a custom key certificate pair that includes a public encryption key and a private decryption key using the first twin prime value and the second twin prime value and decrypting at least one message received from a device under test using the private decryption key.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 9/08 - Répartition de clés

30.

INSTANCE BASED MANAGEMENT AND CONTROL FOR VM PLATFORMS IN VIRTUAL PROCESSING ENVIRONMENTS

      
Numéro d'application US2017063909
Numéro de publication 2018/111567
Statut Délivré - en vigueur
Date de dépôt 2017-11-30
Date de publication 2018-06-21
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Raney, Kristopher
  • Bergeron, Matthew, R.

Abrégé

Systems and methods are disclosed for instance based management and control for virtual machine (VM) platforms in virtual processing environments. Metadata associated with client application instances running in VM platforms are collected by monitor applications also running within the VM platforms. The instance metadata is transmitted to and received by a monitor control platform which in turn stores the instance metadata within a monitor instance registry. The instance metadata is updated through solicited or unsolicited updates. The instance metadata is used to identify groups of application instances, and these groups are used to determine targets instances for monitoring or management actions based upon later detected network events such as network security or threat events. Further, trust scores can be determined for components of the metadata stored in the instance registry, and composite trust scores can be generated and used to identify on or more groups of application instances.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

31.

Deploying a networking test tool in a cloud computing system

      
Numéro d'application 15374675
Numéro de brevet 10681005
Statut Délivré - en vigueur
Date de dépôt 2016-12-09
Date de la première publication 2018-06-14
Date d'octroi 2020-06-09
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Constantinescu, Mihail Florin
  • Singh, Taran

Abrégé

Methods, systems, and computer readable media for deploying a networking test tool in a cloud computing system are disclosed. An example method includes receiving user input specifying configuration information for a networking test tool for deployment in a cloud computing system. The user input specifies a range of networking test ports. The method includes deploying a central test server in the cloud computing system and deploying one or more public test agents in the cloud computing system. The method includes configuring the central test server, the one or more public test agents, and one or more private test agents in a network outside the cloud computing system to exchange test traffic using the range of networking test ports specified by the user input. The method includes configuring a firewall for the cloud computing system to open the range of networking test ports in the firewall for the test traffic.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

32.

Methods, systems, and computer readable media for token based message capture

      
Numéro d'application 15364056
Numéro de brevet 10176068
Statut Délivré - en vigueur
Date de dépôt 2016-11-29
Date de la première publication 2018-05-31
Date d'octroi 2019-01-08
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Gintis, Noah Steven

Abrégé

Methods, systems, and computer readable media for token based message capture are disclosed. One method includes generating a test message including a token indicative of message data and a data integrity check value (DICV) computed based on at least a portion of the message data. The method also includes sending the test message to a system under test (SUT). The method further includes receiving, from the SUT, a version of the test message, wherein the version of the test message includes the token and the DICV. The method also includes storing a representation of the version of the test message using the token and the DICV.

Classes IPC  ?

  • G06F 11/263 - Génération de signaux d'entrée de test, p. ex. vecteurs, formes ou séquences de test
  • G06F 11/273 - Matériel de test, c.-à-d. circuits de traitement de signaux de sortie
  • G06F 11/10 - Détection ou correction d'erreur par introduction de redondance dans la représentation des données, p. ex. en utilisant des codes de contrôle en ajoutant des chiffres binaires ou des symboles particuliers aux données exprimées suivant un code, p. ex. contrôle de parité, exclusion des 9 ou des 11

33.

Methods, systems, and computer readable media for distributed network packet statistics collection in a test environment

      
Numéro d'application 15347756
Numéro de brevet 10193773
Statut Délivré - en vigueur
Date de dépôt 2016-11-09
Date de la première publication 2018-05-10
Date d'octroi 2019-01-29
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Ciodaru, Florin
  • Abdulamit, Serif Narcis
  • Fetche, Nicolae Sorin
  • Paramasivan, Rajesh Kumar

Abrégé

A method for distributed network packet statistics collection includes instantiating first and second operations that implement different portions of a network packet statistics collection task on processing nodes implemented on different processors in a network packet statistics collection system. The method includes utilizing an auto-discovery mechanism for the second operation to subscribe to a set of capabilities and identify the first operation as a matching operation. The method further includes establishing a channel between the first and second operations. The method further includes executing the network packet statistics collection task, where the first and second operations perform the different portions of the network packet statistics collection task.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

34.

Methods, systems, and computer readable media for obtaining power consumption data associated with packet processing

      
Numéro d'application 15291034
Numéro de brevet 10073931
Statut Délivré - en vigueur
Date de dépôt 2016-10-11
Date de la première publication 2018-04-12
Date d'octroi 2018-09-11
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Havard, Michelle Renee

Abrégé

Methods, systems, and computer readable media for obtaining power consumption data associated with packet processing are disclosed. One method for obtaining power consumption data associated with packet processing occurs at a test device. The method includes sending, via a first communications interface, at least one test packet to a system under test (SUT). The method also includes receiving, via a second communications interface, power consumption data associated with the at least one test packet. The method further includes correlating the power consumption data and test packet information.

Classes IPC  ?

  • G06F 17/50 - Conception assistée par ordinateur

35.

Cloud-based network tool optimizers for server cloud networks

      
Numéro d'application 15812067
Numéro de brevet 10389642
Statut Délivré - en vigueur
Date de dépôt 2017-11-14
Date de la première publication 2018-03-15
Date d'octroi 2019-08-20
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s) Raney, Kristopher

Abrégé

Network tool optimizers for server cloud networks and related methods are disclosed. In part, master filters are defined to segregate and control user traffic, and user filters are defined to forward the user traffic to cloud-based network tools or tool instances. A master user interface and user interfaces for each user are provided so that the master filters and user filters can be defined and managed. A filter rules compiler within the cloud-based network tool optimizer then combines the master filters with the user filters, resolves conflicts in favor of the master filters, and generates filter engine rules that are applied to filter engines within the network tool optimizer for the cloud network. The filter engines then forward packets received at input ports for the network tool optimizer to output ports for the network tool optimizer that are coupled to network tools or tool instances within the cloud network.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

36.

Methods, systems and computer readable media for quiescence-informed network testing

      
Numéro d'application 15608352
Numéro de brevet 10511516
Statut Délivré - en vigueur
Date de dépôt 2017-05-30
Date de la première publication 2018-03-01
Date d'octroi 2019-12-17
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s)
  • Rangappagowda, Madhu Hosakoppa
  • Ribault, Nicolas
  • Pragada, Vihari Durga

Abrégé

The subject matter described herein includes methods, systems, and computer readable media for quiescence-informed network testing. One method for quiescence-informed network testing includes determining, by a first test agent, a quiescence state of the network. The method further includes reporting, by the first test agent and to a test controller, the quiescence state of the network. The method further includes configuring, by the test controller, the first test agent to execute a network test. The method further includes executing, by the first test agent, the network test. The method further includes reporting results of execution of the network test to the test controller.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

37.

Traffic differentiator systems and related methods including automatic packet stream order determination

      
Numéro d'application 15791997
Numéro de brevet 10680917
Statut Délivré - en vigueur
Date de dépôt 2017-10-24
Date de la première publication 2018-02-15
Date d'octroi 2020-06-09
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Johansson, Stefan
  • Mcghee, David W.

Abrégé

Traffic differentiator systems for network devices and related methods are disclosed that include automatic port order determination. The disclosed embodiments includes input ports that receive a first stream of packets and a second stream of packets and a packet difference processor that operates in a learning mode and a normal mode. In the learning mode of operation, the packet difference processor automatically determines a port order representing whether the first stream of packets for the first port or the second stream of packets for the second port represents a first in time version of received packets. In the normal mode of operation, the packet difference processor uses the port order determination to facilitate determination of difference packets between the first stream of packets and the second stream of packets.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/939 - Dispositions pour la commutation redondante, p.ex. utilisant des plans de commutation parallèles

38.

Antenna arrays for testing wireless devices

      
Numéro d'application 15234888
Numéro de brevet 10313031
Statut Délivré - en vigueur
Date de dépôt 2016-08-11
Date de la première publication 2018-02-15
Date d'octroi 2019-06-04
Propriétaire KEYSIGHT TECHNOLOGIES SIGNAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Thiruvarankan, Rajaratnam

Abrégé

A test system includes a radio frequency (RF) shielded chamber and an antenna array in the RF shielded chamber. The antenna array includes groups of antenna elements and power combiners. Each group of antenna elements is matched to a matching group of antenna elements by virtue of being coupled to a respective power combiner for both the group and the matching group. The antenna array is configured, by virtue of spacing apart the antenna elements by at least half of a wavelength of a test signal for testing a wireless device in the RF chamber, so that power delivered to output ports of the antenna array is substantially uniform regardless of where the wireless device is placed within the RF chamber.

Classes IPC  ?

  • H01Q 1/38 - Forme structurale pour éléments rayonnants, p. ex. cône, spirale, parapluie formés par une couche conductrice sur un support isolant
  • H01Q 1/50 - Association structurale d'antennes avec commutateurs de terre, dispositions de descente d'antennes ou parafoudres
  • H04B 17/10 - SurveillanceTests d’émetteurs
  • H04B 17/00 - SurveillanceTests

39.

Network tap with battery-assisted and programmable failover

      
Numéro d'application 15355013
Numéro de brevet 09998213
Statut Délivré - en vigueur
Date de dépôt 2016-11-17
Date de la première publication 2018-02-01
Date d'octroi 2018-06-12
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Fung, Randy
  • Desdier, Marcel Felix
  • Le, Ky Hong

Abrégé

A network tap with battery assisted and programmable failover is disclosed. The network tap includes a processing element, at least one optical-electrical transceiver, and at least one multiplexer/demultiplexer module. A backup battery provides power to the optical-electrical transceiver(s) and the multiplexer/demultiplexer module(s) but not the processing element when operating in a failover mode. The network tap is programmable to operate in a fail open mode in which traffic received from the network passes through the network tap during failover or a fail closed mode in which traffic receive from the network is blocked during failover.

Classes IPC  ?

  • H04B 10/032 - Dispositions pour le rétablissement de communication après défaillance utilisant des systèmes de travail et de protection
  • H04Q 11/00 - Dispositifs de sélection pour systèmes multiplex

40.

Methods, systems, and computer readable media for network test configuration using virtual local area network (VLAN) scanning

      
Numéro d'application 15208590
Numéro de brevet 10958616
Statut Délivré - en vigueur
Date de dépôt 2016-07-12
Date de la première publication 2018-01-18
Date d'octroi 2021-03-23
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Ameling, Thomas

Abrégé

Methods, systems, and computer readable media for network test configuration using VLAN scanning are disclosed. One method for network test configuration using VLAN scanning occurs at a first port of a network equipment test device. The method includes sending a plurality of address resolution protocol (ARP) requests to a system under test (SUT), wherein each of the plurality of ARP requests includes a different virtual local area network (VLAN) identifier (ID). The method also includes receiving an ARP response from the SUT, wherein the ARP response indicates a first VLAN ID associated with the SUT. The method further includes using the first VLAN ID when sending test packets to the SUT via the first port.

Classes IPC  ?

  • G06F 15/177 - Commande d'initialisation ou de configuration
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

41.

Methods, systems and computer readable media for testing network devices using variable traffic burst profiles

      
Numéro d'application 15207412
Numéro de brevet 10776535
Statut Délivré - en vigueur
Date de dépôt 2016-07-11
Date de la première publication 2018-01-11
Date d'octroi 2020-09-15
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s) Gintis, Noah Steven

Abrégé

A method for testing a network device using a variable traffic burst profile includes providing for user selection of at least one type of simulated traffic to be transmitted to a network device under test (DUT). The method further includes receiving user input regarding selection of the type of simulated traffic. The method further includes providing for user selection of a transmission rate for transmitting the simulated traffic to the DUT. The method further includes receiving user input regarding selection of the transmission rate. The method further includes transmitting the simulated traffic to the DUT according to the selected traffic type, the selected transmission rate, and a variable traffic burst profile.

Classes IPC  ?

  • G06F 30/20 - Optimisation, vérification ou simulation de l’objet conçu
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

42.

Methods, systems, and computer readable media for providing high availability support at a bypass switch

      
Numéro d'application 15169702
Numéro de brevet 10237122
Statut Délivré - en vigueur
Date de dépôt 2016-05-31
Date de la première publication 2017-11-30
Date d'octroi 2019-03-19
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Desdier, Marcel Felix
  • Quan, Wenxing
  • Rhodes, Elaine
  • Artzi, Ophir Shmuel

Abrégé

Methods, systems, and computer readable media for providing high availability support at a bypass switch are disclosed. One method occurs at a bypass switch. The method includes determining that an inline tool associated with a bypass switch is unavailable. The method also includes determining whether the inline tool is required or optional. The method further includes in response to determining that the inline tool is required, disabling at least one link associated with the bypass switch so as to trigger a switchover involving a second bypass switch.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

43.

Distributed online wireless security test system

      
Numéro d'application 15153695
Numéro de brevet 10362048
Statut Délivré - en vigueur
Date de dépôt 2016-05-12
Date de la première publication 2017-11-16
Date d'octroi 2019-07-23
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Alexander, Thomas
  • Stott, Lester Noel
  • Sundhar, Kalyan R.

Abrégé

Systems and methods are disclosed herein to provide improved online security testing of security devices and networks, including but not limited to networks containing wireless access points. In accordance with one or more embodiments and aspects thereof, a distributed online test system is disclosed that combines an online test manager with one or more remote probes to generate simulated attacks and verify their effectiveness. Such a system may offer improved capabilities such as the ability to conduct attacks over geographically distributed network topologies, the ability to assess the security functions of wireless networks, and simpler and more cost-effective online security testing.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

44.

Network packet forwarding systems and methods to push packet pre-processing tasks to network tap devices

      
Numéro d'application 15147221
Numéro de brevet 10511508
Statut Délivré - en vigueur
Date de dépôt 2016-05-05
Date de la première publication 2017-11-09
Date d'octroi 2019-12-17
Propriétaire Keysight Technologies Singapore (Sales) PTE. LTD. (Singapour)
Inventeur(s) Arora, Deepesh

Abrégé

Network packet forwarding systems and methods are disclosed to push pre-processing tasks to network tap devices. In certain embodiments, packet flows from multiple monitoring points within a packet network communication system are monitored by a plurality of network tap devices to generate tapped packet flows associated with monitored network traffic flows. The tapped packet flows are transmitted from each network tap device to a tap controller, and the tap controller generates pre-processing rules based upon the tapped packet flows. Control messages including the pre-processing rules are then transmitted from the tap controller to the network tap devices, and the tapped packet flows are pre-processed at the network tap devices using the pre-processing rules to generate pre-processed packet flows. These pre-processed packet flows are then transmitted back to the tap controller where they are further processed and output to one or more destination devices.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 12/823 - Suppression de paquets

45.

NETWORK PACKET FORWARDING SYSTEMS AND METHODS TO PUSH PACKET PRE-PROCESSING TASKS TO NETWORK TAP DEVICES

      
Numéro d'application US2017028517
Numéro de publication 2017/192272
Statut Délivré - en vigueur
Date de dépôt 2017-04-20
Date de publication 2017-11-09
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Arora, Deepesh

Abrégé

Network packet forwarding systems and methods are disclosed to push pre-processing tasks to network tap devices. In certain embodiments, packet flows from multiple monitoring points within a packet network communication system are monitored by a plurality of network tap devices to generate tapped packet flows associated with monitored network traffic flows. The tapped packet flows are transmitted from each network tap device to a tap controller, and the tap controller generates pre-processing rules based upon the tapped packet flows. Control messages including the pre-processing rules are then transmitted from the tap controller to the network tap devices, and the tapped packet flows are pre-processed at the network tap devices using the pre-processing rules to generate pre-processed packet flows. These pre-processed packet flows are then transmitted back to the tap controller where they are further processed and output to one or more destination devices.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 12/70 - Systèmes de commutation par paquets

46.

Latency-based timeouts for concurrent security processing of network packets by multiple in-line network security tools

      
Numéro d'application 15147125
Numéro de brevet 10051006
Statut Délivré - en vigueur
Date de dépôt 2016-05-05
Date de la première publication 2017-11-09
Date d'octroi 2018-08-14
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Register, Scott
  • Pandey, Shardendu
  • Chagnot, Glenn
  • Arora, Deepesh

Abrégé

Latency-based timeouts are used for concurrent security processing by multiple in-line network security tools. A network system forwards secure network packets to the tools and uses latency-based timeouts with respect to the return of processed packets from the tools. Initially, the network system measures processing latencies for the tools and sets at least one timeout threshold based upon the processing latencies. The network system then receives an input packet from a network source, generates a timestamp, concurrently sends an output packet to the tools based upon the input packet, tracks return packets from the tools, and determines whether a timeout has occurred with respect to the timeout threshold based upon a difference between the timestamp and a current timestamp. If a timeout does not occur, a secure packet is forwarded to a network destination. If a timeout does occur, return packet tracking for the input packet is ended.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

47.

Concurrent security processing of network packets by multiple in-line network security tools

      
Numéro d'application 15147174
Numéro de brevet 10333896
Statut Délivré - en vigueur
Date de dépôt 2016-05-05
Date de la première publication 2017-11-09
Date d'octroi 2019-06-25
Propriétaire Keysight Technologies Singapore (Sales) PTE. LTD. (Singapour)
Inventeur(s)
  • Register, Scott
  • Pandey, Shardendu
  • Chagnot, Glenn

Abrégé

Systems and methods provide concurrent security processing for multiple network security tools. An input packet is received at a network packet forwarding system from a network packet source, and the network packet forwarding system concurrently sends an output packet based upon the input packet to multiple security tools. Return packets are received based upon the output packet from the security tools after their respective security processing. Once return packets are received from each of the security tools, the network packet forwarding system forwards a secure packet to a packet destination. If a timeout occurs before all return packets are received, the network packet forwarding system can assume that the original packet was unsafe and discard information stored for the input packet. If security tools are configured to modify packets, these modifications can also be tracked.

Classes IPC  ?

  • H04L 29/00 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • H04L 12/761 - Routage de diffusion ou de multidiffusion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

48.

Methods, systems, and computer readable media for emulating network traffic patterns on a virtual machine

      
Numéro d'application 15092575
Numéro de brevet 10341215
Statut Délivré - en vigueur
Date de dépôt 2016-04-06
Date de la première publication 2017-10-12
Date d'octroi 2019-07-02
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Ramanath, Avinash
  • Lvov, Sergey
  • Puchiu, Gheorghe Mihai

Abrégé

Methods, systems, and computer readable media for emulating network traffic patterns on a virtual machine are disclosed. In one example, the method includes generating a user specification based on a plurality of network traffic patterns and computer processing usage patterns and receiving, at a virtual machine hosted by a DUT, the user specification containing the plurality of network traffic patterns and computer processing usage patterns. The method further includes generating a plurality of network traffic sequences based on the plurality of network traffic patterns and a plurality of computer processing usage pattern instruction sequences based on the plurality of computer processing usage patterns. The method also includes distributing each of the plurality of network traffic sequences among a plurality of virtual network interface cards (VNICs) and distributing each of the plurality of computer processing usage pattern instruction sequences among a plurality of virtual processing cores in the virtual machine.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

49.

Methods, systems, and computer readable media for testing network equipment devices using connection-oriented protocols

      
Numéro d'application 15095025
Numéro de brevet 10212125
Statut Délivré - en vigueur
Date de dépôt 2016-04-09
Date de la première publication 2017-10-12
Date d'octroi 2019-02-19
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Badea, Alexandru
  • Ciobanu, George
  • Filipescu, Emilian-Mihai
  • Ionescu, Marius-Gabriel

Abrégé

The subject matter described herein relates to methods, systems, and computer readable media for testing network equipment devices using connection-oriented protocols. In some examples, a method for testing a network equipment device under test (DUT) includes executing, by a network equipment test device, a test script to test the network equipment DUT using a connection-oriented protocol. The method includes inserting, during a connection establishment process of the connection-oriented protocol for a network flow to the network equipment DUT, a flow-identifying sequence number into a sequence number field of a first message of the network flow. The flow-identifying sequence number is a number uniquely identifying the network flow from other network flows. The method includes receiving a second message from the network equipment DUT and determining that the second message belongs to the network flow by extracting the flow-identifying sequence number from the second message.

Classes IPC  ?

  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/801 - Commande de flux ou commande de congestion

50.

Methods, systems, and computer readable media for providing an anticipated data integrity check

      
Numéro d'application 15079016
Numéro de brevet 10191826
Statut Délivré - en vigueur
Date de dépôt 2016-03-23
Date de la première publication 2017-09-28
Date d'octroi 2019-01-29
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Regev, Alon
  • Gintis, Noah Steven

Abrégé

Methods, systems, and computer readable media for providing an anticipated data integrity check are disclosed. According to one method, the method includes generating a test message including an anticipated data integrity check value (ADICV), wherein the ADICV is computed using at least one value based on at least one expected modification to message data in the test message by at least one system under test (SUT), and sending the test message to the at least one SUT.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 11/263 - Génération de signaux d'entrée de test, p. ex. vecteurs, formes ou séquences de test
  • G06F 11/273 - Matériel de test, c.-à-d. circuits de traitement de signaux de sortie

51.

Methods, systems, and computer readable media for testing network equipment devices using connectionless protocols

      
Numéro d'application 15077832
Numéro de brevet 10178015
Statut Délivré - en vigueur
Date de dépôt 2016-03-22
Date de la première publication 2017-09-21
Date d'octroi 2019-01-08
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Badea, Alexandru
  • Bulboaca, Radu
  • Filipescu, Emilian-Mihai
  • Ionescu, Marius-Gabriel

Abrégé

The subject matter described herein relates to methods, systems, and computer readable media for testing network equipment devices using connectionless protocols. In some examples, a method for testing a network equipment device under test (DUT) includes transmitting a first message using a connectionless protocol for a network flow to the network equipment DUT according to a test script. The method includes storing a record for the network flow including a first flow identifier for the flow based on a first payload of the first message. The method includes receiving a second message from the network equipment DUT and determining that the second message belongs to the network flow by determining a second flow identifier based on a second payload of the second message and matching the second flow identifier to the first flow identifier.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

52.

Wireless communication test system arrangement

      
Numéro d'application 15067117
Numéro de brevet 10003517
Statut Délivré - en vigueur
Date de dépôt 2016-03-10
Date de la première publication 2017-09-14
Date d'octroi 2018-06-19
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Lakkavalli, Shashidhar Viswanatha

Abrégé

Systems and methods are disclosed herein to provide improved data communication test systems for the testing of wireless data communication devices and systems. A flexible arrangement of physical layer interfaces, hardware traffic generator/analyzers and software traffic generator/analyzers is disclosed that partitions the data communication test system into interfacing and processing modules. Such a system may offer improved capabilities such as a lower-cost and more efficient test system, a reduction in redundant processing capabilities, and a dynamic balancing of interfaces and processing power.

Classes IPC  ?

  • H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04W 24/06 - Réalisation de tests en trafic simulé
  • H04W 24/08 - Réalisation de tests en trafic réel

53.

Methods, systems, and computer readable media for adaptively calibrating test systems for different interconnects

      
Numéro d'application 15062015
Numéro de brevet 09910125
Statut Délivré - en vigueur
Date de dépôt 2016-03-04
Date de la première publication 2017-09-07
Date d'octroi 2018-03-06
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Leduc, Jason Marcel
  • Tavares, Clifford
  • Ramanath, Avinash
  • Jethra, Anupkumar Mohanial
  • Jain, Rajanish
  • Johnson, Lewis Ajax

Abrégé

The subject matter described herein relates to methods, systems, and computer readable media for adaptive calibration of test systems to interconnects. In some examples, a control circuit performs a method for adaptive calibration including determining, for each configurable calibration parameter of a number of configurable calibration parameters for a receiver for processing a received signal from an interconnect coupled to the receiver, a range of valid values for the configurable calibration parameter. The method further includes for each configurable calibration parameter: sweeping the configurable calibration parameter across a subset of values from the range of valid values for the configurable calibration parameter; and testing the received signal from the interconnect for each value in the subset of values and storing a result of the testing for the value. The method further includes determining a set of calibrated values for the configurable calibration parameters based on the results of the testing.

Classes IPC  ?

  • G01R 35/00 - Test ou étalonnage des appareils couverts par les autres groupes de la présente sous-classe
  • G01R 31/00 - Dispositions pour tester les propriétés électriquesDispositions pour la localisation des pannes électriquesDispositions pour tests électriques caractérisées par ce qui est testé, non prévues ailleurs

54.

Methods, systems, and computer readable media for distributing monitored network traffic

      
Numéro d'application 15052812
Numéro de brevet 09961588
Statut Délivré - en vigueur
Date de dépôt 2016-02-24
Date de la première publication 2017-08-24
Date d'octroi 2018-05-01
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Nambi Raj, Avinash Raj
  • Schwenk, Alan Richard
  • Chiriacescu, Gabriel

Abrégé

The subject matter described herein relates to methods, systems, and computer readable media for test system connection resiliency. In some examples, a method for distributing monitored network traffic includes monitoring S1-MME traffic and S6a traffic in a core network of a telecommunications network. The method includes decrypting encrypted S1-MME traffic using information extracted from the S6a traffic. The method includes load balancing between a plurality of monitoring nodes using the decrypted S1-MME traffic.

Classes IPC  ?

  • H04W 28/08 - Équilibrage ou répartition des charges
  • H04W 24/08 - Réalisation de tests en trafic réel

55.

Methods, systems, and computer readable media for testing wireless devices in wireless environments

      
Numéro d'application 15167971
Numéro de brevet 09743297
Statut Délivré - en vigueur
Date de dépôt 2016-05-27
Date de la première publication 2017-08-22
Date d'octroi 2017-08-22
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Jackson, Stephen Samuel

Abrégé

Methods, systems, and computer readable media for testing wireless devices is disclosed. In some examples, a system for testing wireless devices in wireless environments comprises a test server and a wireless device tester implemented on the test server. The test server includes at least one processor and memory storing, for each wireless device of different types of wireless devices, a wireless emulation waveform received from the wireless device during operation of the wireless device. The wireless device tester is configured for receiving emulation requests specifying wireless devices and wireless environments for testing. The wireless device tester is configured for transmitting, for each request, a responsive wireless emulation waveform to a wireless device emulator physically located in the specified wireless environment and determining a performance metric for the wireless device within the specified wireless environment.

Classes IPC  ?

56.

TCP connections resiliency system for testing networks in unstable environments

      
Numéro d'application 15046419
Numéro de brevet 10116541
Statut Délivré - en vigueur
Date de dépôt 2016-02-17
Date de la première publication 2017-08-17
Date d'octroi 2018-10-30
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Nistor, Marius Pavel
  • Constantinescu, Mihail Florin

Abrégé

The subject matter described herein relates to methods, systems, and computer readable media for test system connection resiliency. In some examples, a method for testing a network device under test (DUT) includes exchanging a sequence of data packages over a transmission control protocol (TCP) connection between a client and a server and through the network DUT. The method includes storing client sequence identifiers and server sequence identifiers. The method includes synchronizing, in response to detecting an error on the TCP connection, the client and the server to a last data package exchanged prior to the error using the client sequence identifiers and the server sequence identifiers and resuming a test script at a next data package after the last data package exchanged prior to the error in the sequence of data packages.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

57.

Methods, systems, and computer readable media for assessing attack vulnerability of radio access network equipment

      
Numéro d'application 14984359
Numéro de brevet 09774618
Statut Délivré - en vigueur
Date de dépôt 2015-12-30
Date de la première publication 2017-07-06
Date d'octroi 2017-09-26
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Sundhar, Kalyan R.
  • Rao, Bijith Raghunandan

Abrégé

The subject matter described herein relates to methods, systems, and computer readable media for assessing attack vulnerability of radio access network equipment. One method for assessing the attack vulnerability of a radio access network device includes emulating at least one good UE. The method further includes emulating at least one bad UE. The method further includes transmitting traffic from the emulated good and bad UEs to a non-simulated radio access network device under test. The method further includes monitoring a response of the radio access network device under test to the emulated good UEs. The method further includes generating output indicative of attack vulnerability of the device under test.

Classes IPC  ?

  • H04W 24/04 - Configurations pour maintenir l'état de fonctionnement
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/12 - Détection ou prévention de fraudes
  • H04W 24/06 - Réalisation de tests en trafic simulé
  • H04W 88/08 - Dispositifs formant point d'accès

58.

Systems and methods for channel state information exchange

      
Numéro d'application 14988707
Numéro de brevet 09876543
Statut Délivré - en vigueur
Date de dépôt 2016-01-05
Date de la première publication 2017-07-06
Date d'octroi 2018-01-23
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Alexander, Thomas
  • Stott, Lester Noel

Abrégé

Systems and methods are disclosed herein to provide improved channel estimation and channel state information (CSI) transfer in a wireless data communication system, including but not limited to Multiple Input Multiple Output (MIMO) communication systems. In accordance with one or more embodiments and aspects thereof, a channel estimation and CSI transfer system is disclosed that extends and utilizes existing frame transfer elements to accomplish estimation and transfer. Such a system may offer improved capabilities such as a lower overhead CSI transfer, reduced data transfer latency, and more frequent CSI measurements.

Classes IPC  ?

  • H04L 1/16 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue en utilisant un canal de retour dans lesquelles le canal de retour transporte des signaux de contrôle, p. ex. répétition de signaux de demande
  • H04B 7/0417 - Systèmes de rétroaction
  • H04B 7/06 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission

59.

Methods, systems, and computer readable media for network diagnostics

      
Numéro d'application 14984459
Numéro de brevet 10425320
Statut Délivré - en vigueur
Date de dépôt 2015-12-30
Date de la première publication 2017-06-22
Date d'octroi 2019-09-24
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Nistor, Marius Pavel
  • Niculescu, Silviu Ionut
  • Stefan, Alexandru-Bogdam

Abrégé

Methods, systems, and computer readable media for network diagnostics are disclosed. According to one method, the method occurs at a diagnostics controller implemented using at least one processor. The method includes configuring a plurality of diagnostics nodes to observe traffic behavior associated with a system under test (SUT). The method also includes observing, using the diagnostics nodes, traffic behavior associated with the SUT. The method further includes detecting, using the traffic behavior, a SUT issue. The method also includes identifying, using SUT topology information, a network node in the SUT associated with the SUT issue. The method further includes triggering one of the diagnostics nodes to obtain node related information from the network node, wherein the diagnostics node uses at least one communications protocol to poll the network node for the node related information. The method also includes diagnosing, using the node related information, the SUT issue.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel

60.

Systems and methods to recreate real world application level test packets for network testing

      
Numéro d'application 14964019
Numéro de brevet 10511505
Statut Délivré - en vigueur
Date de dépôt 2015-12-09
Date de la première publication 2017-06-15
Date d'octroi 2019-12-17
Propriétaire Keysight Technologies Singapore (Sales) PTE. LTD. (Singapour)
Inventeur(s)
  • Das, Soumava
  • Reeves, Eric
  • Chitradurga, Rohan
  • Naskar, Rudrarup

Abrégé

Systems and methods are disclosed to recreate real world application level test packets for network testing. Live network traffic is monitored within a live network infrastructure, and live traffic meta-data is then collected for this live traffic. Application level meta-data is then extracted from the live traffic meta-data and stored in one or more data storage systems. Subsequently, the application level meta-data is received from the one or more data storage systems, and application level test packets for network testing are then generated based upon the application level meta-data. Further, application level meta-data collected during a time slot can be segmented in multiple different data segments associated with different time periods within the time slot, and application level test packets can be generated using these different data segments. Further, the live traffic meta-data collection can occur within multiple time slots.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

61.

Methods, systems, and computer readable media for reducing the size of a cryptographic key in a test simulation environment

      
Numéro d'application 14966552
Numéro de brevet 10205590
Statut Délivré - en vigueur
Date de dépôt 2015-12-11
Date de la première publication 2017-06-15
Date d'octroi 2019-02-12
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Cipu, Andrei
  • Badea, Alexandru

Abrégé

Methods and systems for reducing the size of a cryptographic key in a test simulation environment are disclosed. In one example, a method includes determining a minimum key size value and maximum key size value for a private cryptographic key for each of a plurality of key exchange value pairs and deriving, for each of the plurality of key exchange value pairs, a key sizing constant based on the minimum key size value and the maximum key size value. The method further includes storing each of the plurality of selected key exchange value pairs and associated key sizing constant in a data store, selecting a key exchange value pair to be applied to a test simulation session conducted between a first test simulation endpoint and a second test simulation endpoint, and generating a private cryptographic key based on the key sizing constant associated with the selected key exchange value pair.

Classes IPC  ?

62.

Methods, systems, and computer readable media for packet monitoring in a virtual environment

      
Numéro d'application 14960865
Numéro de brevet 09967165
Statut Délivré - en vigueur
Date de dépôt 2015-12-07
Date de la première publication 2017-06-08
Date d'octroi 2018-05-08
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Arora, Deepesh Satish
  • Majumder, Anirban

Abrégé

Methods, systems, and computer readable media for packet monitoring in a virtual environment are disclosed. According to one method, the method occurs at a virtual tap controller implemented using at least one processor. The method includes sending, to a virtual tap in a virtual environment implemented using at least one computing platform, at least one summarization rule for generating summary packet information about packet traffic associated with the virtual environment. The method also includes receiving, from the virtual tap, the summary packet information generated using the at least one summarization rule. The method further includes generating, using the summary packet information, at least one processing rule for copying or forwarding packet data associated with the virtual environment and sending, to the virtual tap, the at least one processing rule.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

63.

Automatic multiple input multiple output (MIMO) transmitter order detection

      
Numéro d'application 14988700
Numéro de brevet 09674007
Statut Délivré - en vigueur
Date de dépôt 2016-01-05
Date de la première publication 2017-06-06
Date d'octroi 2017-06-06
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Wicker, Jr., David Jennings

Abrégé

Systems and methods are disclosed herein to provide automatic identification of radio frequency (RF) transmitter chains during the testing of wireless data communication devices and systems, including Multiple Input Multiple Output (MIMO) devices and systems utilizing beamforming. In accordance with one or more embodiments, a signal analysis function is disclosed that identifies the ordinal index of each MIMO RF transmitter chain associated with a Device Under Test (DUT) using the Cyclic Shift Delay (CSD) imposed on the transmitted MIMO signal. Such a system may offer improved capabilities such as automated detection of mis-cabled test setups, automated recovery from mis-cabling, and automated adaptation of transmitted test signals to counteract the effects of mis-cabling.

Classes IPC  ?

  • H04B 7/04 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées
  • H04L 25/03 - Réseaux de mise en forme pour émetteur ou récepteur, p. ex. réseaux de mise en forme adaptatifs
  • H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
  • H04L 27/26 - Systèmes utilisant des codes à fréquences multiples
  • H04B 7/0413 - Systèmes MIMO

64.

Methods, systems, and computer readable media for testing network function virtualization (NFV)

      
Numéro d'application 14939674
Numéro de brevet 10135702
Statut Délivré - en vigueur
Date de dépôt 2015-11-12
Date de la première publication 2017-05-18
Date d'octroi 2018-11-20
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Lahiri, Abhijit

Abrégé

Methods, systems, and computer readable media for testing network function virtualization (NFV) are disclosed. According to one method, the method occurs at a network test controller implemented using at least one processor. The method includes determining, using network configuration information, a first insertion point for inserting a first network function tester (NFT) into a service chain comprising a plurality of virtualized network functions (VNFs). The method also includes configuring the first NFT to analyze or ignore traffic matching filtering information, wherein the traffic traverses the first NFT from at least one VNF of the plurality of VNFs. The method further includes inserting, at the first insertion point, the first NFT into the service chain.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

65.

Trigger information exchange between wireless systems

      
Numéro d'application 14927365
Numéro de brevet 10305713
Statut Délivré - en vigueur
Date de dépôt 2015-10-29
Date de la première publication 2017-05-04
Date d'octroi 2019-05-28
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Stott, Lester Noel

Abrégé

Systems and methods are disclosed herein to provide efficient support for the exchange of trigger information between wireless data communication devices and systems, including Multi-User Multiple Input Multiple Output (MU-MIMO) devices and systems that may utilize Orthogonal Frequency Division Multiple Access (OFDMA). In accordance with one or more embodiments, a trigger information exchange mechanism is disclosed that transfers trigger data as part of a pre-existing data frame handshake. Such a system may offer improved capabilities such as a reduced channel overhead incurred due to the trigger information exchange.

Classes IPC  ?

  • H04L 27/26 - Systèmes utilisant des codes à fréquences multiples
  • H04B 7/26 - Systèmes de transmission radio, c.-à-d. utilisant un champ de rayonnement pour communication entre plusieurs postes dont au moins un est mobile
  • H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]

66.

System and method for programmable control instruments, test and measurement hardware configuration

      
Numéro d'application 15232775
Numéro de brevet 10324436
Statut Délivré - en vigueur
Date de dépôt 2016-08-09
Date de la première publication 2017-05-04
Date d'octroi 2019-06-18
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s)
  • Oliverio, Nestor Hugo
  • Parra, Marc Almendros

Abrégé

A system of hardware configuration of a programmable control instrument, test and measure that includes an integrated FPGA is disclosed. The FPGA includes a static section comprising at least one static logic FPGA preset; a dynamic section comprising at least one dynamic logic FPGA programmable by a user; and a logical interface that connects the static section and dynamic section.

Classes IPC  ?

  • G05B 19/042 - Commande à programme autre que la commande numérique, c.-à-d. dans des automatismes à séquence ou dans des automates à logique utilisant des processeurs numériques

67.

On demand packet traffic monitoring for network packet communications within virtual processing environments

      
Numéro d'application 14922391
Numéro de brevet 10142212
Statut Délivré - en vigueur
Date de dépôt 2015-10-26
Date de la première publication 2017-04-27
Date d'octroi 2018-11-27
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Majumder, Anirban
  • Desdier, Marcel
  • Arora, Deepesh

Abrégé

Systems and methods are disclosed to provide on demand packet traffic monitoring for packet communications within virtual packet processing environments. Virtual TAPs (test access ports) within virtualization layers for VM (virtual machine) host hardware systems are controlled by external controllers to configure watch filters for VM platforms operating within the virtualization layer based upon trigger events determined within packet flow data and/or based upon other external trigger events. The virtual TAP controller then periodically receives watch filter packet data updates from the virtual TAP and further controls the virtual TAP to configure more detailed focus filters for the VM platforms based upon watch filter trigger events. The virtual TAP controller can further communicate one or more VM action commands (e.g., stop VM, stop application, etc.) to the virtual TAP for application to the VM platforms based upon trigger events associated with this more detailed focus filter data.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

68.

Taps for bidirectional high-speed data on optical fibers

      
Numéro d'application 14918538
Numéro de brevet 09735870
Statut Délivré - en vigueur
Date de dépôt 2015-10-20
Date de la première publication 2017-04-20
Date d'octroi 2017-08-15
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Fung, Randy
  • Desdier, Marcel Felix

Abrégé

A system for monitoring data traversing a bidirectional optical fiber includes a network tap. The network tap includes first and second network ports for bidirectional data transmission over a first optical fiber. The device includes first and second tap ports respectively associated with the first and second network ports. The first network port receives data transmitted in a first direction over the first optical fiber and at a first wavelength and provides the data to the second network port and to the first tap port. The second network port receives data transmitted in a second direction opposite the first direction over the first optical fiber and at a second wavelength different from the first wavelength and provides the data to the first network port and to the second tap port. The first and second tap the first and second tap ports provide the data to one or more network monitoring devices.

Classes IPC  ?

  • H04J 14/02 - Systèmes multiplex à division de longueur d'onde
  • G02B 6/02 - Fibres optiques avec revêtement
  • G02B 6/28 - Moyens de couplage optique ayant des bus de données, c.-à-d. plusieurs guides d'ondes interconnectés et assurant un système bidirectionnel par nature en mélangeant et divisant les signaux
  • H04B 10/25 - Dispositions spécifiques à la transmission par fibres
  • H04B 10/079 - Dispositions pour la surveillance ou le test de systèmes de transmissionDispositions pour la mesure des défauts de systèmes de transmission utilisant un signal en service utilisant des mesures du signal de données

69.

Test apparatus for a telecommunication network and method for testing a telecommunication network

      
Numéro d'application 15294636
Numéro de brevet 10264479
Statut Délivré - en vigueur
Date de dépôt 2016-10-14
Date de la première publication 2017-04-20
Date d'octroi 2019-04-16
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Marini, Paolo
  • Binda, Lodovico
  • Travaglini, Luigi
  • Bendinelli, Enrico

Abrégé

A test apparatus for a telecommunication network includes: simulated mobile terminals, which supply respective bit streams; and SDR stages, which receive the bit streams of respective simulated mobile terminals that communicate with respective base stations and have respective SDR uplink stages and SDR downlink stages. An SDR uplink stage includes: at least one processing branch, which converts the bit stream of a respective mobile terminal into a baseband signal; a mapping module, which generates a respective uplink sub-carrier vector via a mapping of the baseband signals; an inter-cell interference module, which combines the sub-carrier vector with the uplink sub-carrier vectors of at least one of the other SDR stages; and an inverse-transform module, which performs an inverse transform of the baseband signals.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04W 16/22 - Outils ou modèles de simulation de trafic
  • H04W 24/06 - Réalisation de tests en trafic simulé
  • H04W 88/08 - Dispositifs formant point d'accès

70.

Egress port overload protection for network packet forwarding systems

      
Numéro d'application 14879203
Numéro de brevet 10003537
Statut Délivré - en vigueur
Date de dépôt 2015-10-09
Date de la première publication 2017-04-06
Date d'octroi 2018-06-19
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • O'Connor, Robin
  • Corciu, Costel
  • Manaila, Vlad

Abrégé

Systems and methods are disclosed to provide egress port overload protection for network packet forwarding systems. Input packets are received at one or more ingress ports and load balanced among a plurality of egress ports for the packet forwarding system. Load balanced packets associated with each egress port are then sampled to generate sampled load balanced packets that are output from the egress port. For certain embodiments, a sampling percentage is used for the packet sampling, and the sampling percentage for each egress port is set based upon a comparison of a current traffic rate for the egress port to a threshold rate for the egress port. The threshold rates for the egress ports are allowed to be configured through a user interface. Further, session and non-session traffic can be identified, and session aware load balancing and/or per-port packet sampling can be applied.

Classes IPC  ?

  • H04L 12/803 - Commande de flux ou commande de congestion Équilibrage de charge, p.ex. répartition du trafic entre multiples liens
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

71.

Network traffic pre-classification within VM platforms in virtual processing environments

      
Numéro d'application 15342170
Numéro de brevet 10652112
Statut Délivré - en vigueur
Date de dépôt 2016-11-03
Date de la première publication 2017-04-06
Date d'octroi 2020-05-12
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Raney, Kristopher

Abrégé

Methods and systems are disclosed that pre-classify network traffic monitored within virtual machine (VM) platforms. Client packet monitor applications operate within client VM platforms to monitor network packets, generate monitored packets representing traffic of interest, determine packet classifications for the monitored packets based upon packet contents, identify tags associated with the packet classifications, encapsulate monitored packets with encapsulation headers including the tags to form encapsulated packets, and forward the encapsulated packets to tool VM platforms. Tool packet monitor applications operate within the tool VM platforms to receive the encapsulated packets, identify packet classifications associated with the tags, remove the encapsulation headers from the encapsulated packets, and forward de-encapsulated packets to network destinations based upon the packet classifications. The tool packet monitor applications can also aggregate de-encapsulated packets having the same packet classification prior to forwarding the aggregated packets to one or more network destinations.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

72.

Methods, systems, and computer readable media for providing traffic generation or forwarding device that compensates for skew between electrical lanes in a manner that allows coherent detection of transmitted data

      
Numéro d'application 15284109
Numéro de brevet 09935707
Statut Délivré - en vigueur
Date de dépôt 2016-10-03
Date de la première publication 2017-04-06
Date d'octroi 2018-04-03
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Pepper, Gerald Raymond
  • Hutchison, Michael D.

Abrégé

A method for transmitting and coherently detecting data transmitted over electrical lanes that experience different amounts of skew includes, at a traffic generation or forwarding device, self calibrating transmit and receive-side components of the traffic generation or forwarding device to account for skew between electrical lanes and setting per-electrical lane delays based on the calibration. Data to be transmitted to a network device is generated. The data to be transmitted is spread, using one of the transmit-side components, over a first number of electrical lanes. The data is multiplexed from the electrical lanes onto a second number of optical lanes, the second number being different from the first number. Data is transmitted to and received from the network device over the optical lanes. Transmitted data is reconstructed from the received data using the receive-side components.

Classes IPC  ?

  • H04B 10/00 - Systèmes de transmission utilisant des ondes électromagnétiques autres que les ondes hertziennes, p. ex. les infrarouges, la lumière visible ou ultraviolette, ou utilisant des radiations corpusculaires, p. ex. les communications quantiques
  • H04B 10/079 - Dispositions pour la surveillance ou le test de systèmes de transmissionDispositions pour la mesure des défauts de systèmes de transmission utilisant un signal en service utilisant des mesures du signal de données
  • H04B 10/58 - Compensation pour sortie d’émetteur non linéaire
  • H04B 10/61 - Récepteurs cohérents
  • H04J 14/00 - Systèmes multiplex optiques

73.

Parallel match processing of network packets to identify packet data for masking or other actions

      
Numéro d'application 14868611
Numéro de brevet 10063474
Statut Délivré - en vigueur
Date de dépôt 2015-09-29
Date de la première publication 2017-03-30
Date d'octroi 2018-08-28
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Mcghee, David W.
  • Wright, Cary J.

Abrégé

Systems and methods are disclosed for parallel match processing of network packets to identify data for masking or other actions. In part, the disclosed embodiments receive packets and identify packet data, such as sensitive data, by rapid parallel matching of packet data being communicated in multi-byte wide data paths to match parameters in order to generate match vectors. The match vectors are then used to generate control vectors that are subsequently used by packet processing circuitry to perform desired actions for this packet data (e.g., mask data) and/or for related packets (e.g., drop packets). For example, data identified through the match processing can be masked, and control vectors can be mask control vectors applied to parallel multiplexers. In certain embodiments, the parallel data multiplexers are controlled by the mask control vectors to selectively output either original packet data or mask data that obscures original packet data.

Classes IPC  ?

  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 12/743 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance par des techniques de hachage
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/861 - Mise en mémoire tampon de paquets ou mise en file d’attente; Ordonnancement de file d’attente

74.

Methods, systems, and computer readable media for detecting physical link intrusions

      
Numéro d'application 14860630
Numéro de brevet 09800595
Statut Délivré - en vigueur
Date de dépôt 2015-09-21
Date de la première publication 2017-03-23
Date d'octroi 2017-10-24
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Jackson, Stephen Samuel

Abrégé

The subject matter described herein relates to method, systems, and computer readable media for detecting physical link intrusions. A method for detecting physical link intrusions includes monitoring a link delay signature associated with a physical link based on one-way link delay measurements obtained using at least one network tap. The method also includes determining whether a change in the link delay signature has met or exceeded a threshold value. The method further includes in response to determining that the change in the link delay signature has met or exceeded the threshold value, determining that a physical link intrusion has occurred.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

75.

Methods, systems, and computer readable media for vendor-neutral testing and scoring of systems under test

      
Numéro d'application 14838335
Numéro de brevet 11086752
Statut Délivré - en vigueur
Date de dépôt 2015-08-27
Date de la première publication 2017-03-02
Date d'octroi 2021-08-10
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Ramanath, Avinash

Abrégé

The subject matter described herein relates to vendor-neutral testing and scoring of a system under test. One method for vendor-neutral scoring of a system under test includes generating a pre-testing snapshot of a system under test. The method further includes executing vendor-neutral testing of plural different subsystems of the system under test. The method further includes generating a vendor-neutral score based on the testing. The method further includes generating a post-testing snapshot of the system under test.

Classes IPC  ?

  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

76.

Modeling a clock

      
Numéro d'application 14819337
Numéro de brevet 09813226
Statut Délivré - en vigueur
Date de dépôt 2015-08-05
Date de la première publication 2017-02-09
Date d'octroi 2017-11-07
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Bergeron, Matthew R.

Abrégé

Methods, systems, and computer readable media for modeling a clock are disclosed. According to one exemplary method, the method occurs at a monitoring module associated with a first node. The method includes receiving packets from a second node, extracting timestamps from at least two of the packets, and generating, using the timestamps, clock related information for generating a local clock model indicative of a precision of a local clock at the first node relative to a clock at the second node.

Classes IPC  ?

  • H04L 7/00 - Dispositions pour synchroniser le récepteur avec l'émetteur

77.

Methods and apparatuses for validating network packet brokers

      
Numéro d'application 14475511
Numéro de brevet 10116527
Statut Délivré - en vigueur
Date de dépôt 2014-09-02
Date de la première publication 2017-02-09
Date d'octroi 2018-10-30
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Rhodes, Elaine

Abrégé

A method for validating a network packet broker is disclosed. The method includes configuring in software at least one of a on filter and a load balancer, processing a packet capture file containing data packets using the at least one filter and the load balancer such that data packets processed is output from an output port of the network packet broker. The method also includes analyzing, using a protocol analyzer, the data packets output by the output port of the network packet broker to validate the network packet broker.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
  • G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect

78.

Methods and systems for switching network traffic in a communications network

      
Numéro d'application 14804300
Numéro de brevet 09729389
Statut Délivré - en vigueur
Date de dépôt 2015-07-20
Date de la première publication 2017-01-26
Date d'octroi 2017-08-08
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Lian, Wei
  • Quan, Wenxing
  • Fung, Randy
  • Desdier, Marcel Felix

Abrégé

A switching system includes memory and a switching circuit. The memory stores a port priority table and a trigger source and condition table. The switching circuit for switches network traffic between a number of ports based on the port priority table, the trigger source and condition table, and port health status data. Switching network traffic includes: determining a priority path for a first port using the port health status data and the trigger source and condition table; determining a second port specified as a destination for network traffic arriving at the first port by the port priority table for the priority path; and routing incoming network traffic from the first port to the second port.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/701 - Routage ou recherche du chemin de transmission

79.

Packet copy management for service chain processing within virtual processing systems

      
Numéro d'application 14750248
Numéro de brevet 09838277
Statut Délivré - en vigueur
Date de dépôt 2015-06-25
Date de la première publication 2016-12-29
Date d'octroi 2017-12-05
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Raney, Kristopher

Abrégé

Systems and methods are disclosed to provide packet copy management for service chain processing within virtual processing systems. A packet manager virtual machine (VM) controls access to shared memory that stores packet data for packets being processed by service chain VMs operating within a virtual processing environment. For certain embodiments, the packet manager VM is configured to appear as a destination NIC (network interface controller), and virtual NICs (vNICs) within the service chain VMs are configured to process packet data using pointers to access the packet data within the shared memory. Once packet data is processed by one service chain VM, the next service chain VM within the service chain is able to access the processed packet data within the shared memory through the packet manager VM. Once all service chain processing has completed, the resulting packet data is available from the shared memory for further use or processing.

Classes IPC  ?

  • G06F 15/167 - Communication entre processeurs utilisant une mémoire commune, p. ex. boîte aux lettres électronique
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

80.

Methods and systems for creating a supplemental communication signal

      
Numéro d'application 14754163
Numéro de brevet 09722827
Statut Délivré - en vigueur
Date de dépôt 2015-06-29
Date de la première publication 2016-12-29
Date d'octroi 2017-08-01
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Jackson, Stephen Samuel

Abrégé

A wireless access point or other transmitter can be configured to inject a supplemental signal into a data modulated carrier signal. In some examples, a transmitter system includes an antenna, a primary modulator, and a supplemental modulator. The primary modulator receives a baseband data signal and a carrier signal and outputting to the antenna a data modulated carrier signal according to a communications protocol. The supplemental modulator injects a supplemental signal into the data modulated carrier signal by distorting the data modulated carrier signal within an error bound of the communications protocol. A corresponding receiving system includes an antenna and a supplemental signal detector for detecting the supplemental signal by detecting the distortion within the data modulated carrier signal.

Classes IPC  ?

81.

Systems and methods for mobility testing of MU-MIMO

      
Numéro d'application 14746733
Numéro de brevet 09661517
Statut Délivré - en vigueur
Date de dépôt 2015-06-22
Date de la première publication 2016-12-22
Date d'octroi 2017-05-23
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Stott, Lester Noel
  • Alexander, Thomas

Abrégé

Systems and methods are disclosed herein to provide communication test systems for the mobility testing of multi-user multiple-input multiple-output (MU-MIMO) radio frequency wireless data communication devices, systems and networks. In accordance with one or more embodiments, a test system containing an MU-MIMO traffic generator and analyzer is disclosed that includes a mobility effects scheduler operative in conjunction with a channel impairment simulator to perform tests related to mobile MU-MIMO devices such as wireless clients and terminals. Such a test system may offer improved capabilities, such as flexible measurements of mobility performance, more accurate assessments of MU-MIMO wireless channel utilization and data throughput, measurements on MU-MIMO devices under mobility stress, and automated measurements of MU-MIMO mobility testing.

Classes IPC  ?

  • H04W 24/08 - Réalisation de tests en trafic réel
  • H04W 24/06 - Réalisation de tests en trafic simulé
  • H04B 7/04 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées
  • H04B 17/336 - Rapport signal/interférence ou rapport porteuse/interférence
  • H04B 7/0452 - Systèmes MIMO à plusieurs utilisateurs

82.

Methods, systems, and computer readable media for microburst testing

      
Numéro d'application 14796441
Numéro de brevet 09749213
Statut Délivré - en vigueur
Date de dépôt 2015-07-10
Date de la première publication 2016-12-22
Date d'octroi 2017-08-29
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Gintis, Noah Steven
  • Joseph, Vinod
  • Pandichie, Anton-Valentin
  • Iordache, Cristian Florin

Abrégé

Methods, systems, and computer readable media for microburst testing are disclosed. According to one method, the method includes defining a test that is divided into one or more test cycles, wherein each test cycle includes a plurality of time intervals for providing packets to destination ports of N ports of the network equipment test device via a plurality of ports of a network switch under test, wherein N is an integer. The method further includes initializing a replication count. The method also includes executing an instance of the test using the replication count. The method further includes monitoring packets switched by each port of the network switch under test to determine an indication of buffering capacity of each port of the network switch under test.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

83.

Cloud-based network tool optimizers for server cloud networks

      
Numéro d'application 15251529
Numéro de brevet 09847947
Statut Délivré - en vigueur
Date de dépôt 2016-08-30
Date de la première publication 2016-12-22
Date d'octroi 2017-12-19
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Raney, Kristopher

Abrégé

Network tool optimizers for server cloud networks and related methods are disclosed. In part, master filters are defined to segregate and control user traffic, and user filters are defined to forward the user traffic to cloud-based network tools or tool instances. A master user interface and user interfaces for each user are provided so that the master filters and user filters can be defined and managed. A filter rules compiler within the cloud-based network tool optimizer then combines the master filters with the user filters, resolves conflicts in favor of the master filters, and generates filter engine rules that are applied to filter engines within the network tool optimizer for the cloud network. The filter engines then forward packets received at input ports for the network tool optimizer to output ports for the network tool optimizer that are coupled to network tools or tool instances within the cloud network.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

84.

Methods, systems, and computer readable media for enhanced channel control element (CCE) decoding in LTE networks

      
Numéro d'application 14735083
Numéro de brevet 09661513
Statut Délivré - en vigueur
Date de dépôt 2015-06-09
Date de la première publication 2016-12-15
Date d'octroi 2017-05-23
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Devarasetty, Prasada Rao

Abrégé

Methods, systems, and computer readable media for enhanced channel control element (CCE) decoding are disclosed. According to one method that occurs in a multi-UE simulator, the method includes receiving physical downlink control channel (PDCCH) data from an evolved node B (eNode B) under test and decoding, using CCE avoidance information for avoiding at least a first CCE successfully identified as being associated with at least a first UE simulated by the multi-UE simulator, a second CCE associated with a second UE simulated by the multi-UE simulator.

Classes IPC  ?

  • H04W 24/06 - Réalisation de tests en trafic simulé
  • H04W 76/04 - Traitement de la connexion
  • H04W 48/12 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant un canal de commande descendant
  • H04W 74/00 - Accès au canal sans fil
  • H04W 88/02 - Dispositifs terminaux

85.

Methods, systems, and computer readable media for application session sharing

      
Numéro d'application 14735089
Numéro de brevet 09936027
Statut Délivré - en vigueur
Date de dépôt 2015-06-09
Date de la première publication 2016-12-08
Date d'octroi 2018-04-03
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Balogh, Andrey John
  • Gintis, Noah
  • Srivastava, Alok Kumar
  • Stefan, Alexandru-Bogdan

Abrégé

Methods, systems, and computer readable media for application session sharing are disclosed. According to one method, the method includes receiving, from a first client node, a request for initiating a remote application session for interacting with an application instance by one or more users. The method also includes initiating the remote application session and configuring a remote control server for interacting with the remote application session. The method further includes providing communications between the first client node and the application instance associated with the remote application session using the remote control server.

Classes IPC  ?

  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

86.

Systems and methods to forward packets not passed by criteria-based filters in packet forwarding systems

      
Numéro d'application 14722459
Numéro de brevet 09992134
Statut Délivré - en vigueur
Date de dépôt 2015-05-27
Date de la première publication 2016-12-01
Date d'octroi 2018-06-05
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Abkowitz, Patricia A.
  • Boyd, Ramona
  • Spooner, Andrew
  • Pleshek, Ronald A.

Abrégé

Systems and methods are disclosed to forward packets not passed by criteria-based filters in packet forwarding systems. The disclosed embodiments include one or more Not Passed By Criteria (NPBC) filters that are defined for input ports along with one or more criteria-based filters, such as for example, Pass by Criteria (PBC) filters and/or Deny by Criteria filters (DBC), that forward packets not passed by these criteria-based filters. NPBC filters include, for example, Pass Unmatched PBC filters associated with PBC filters and configured to forward packets not passed by PBC filters and/or Pass Matched DBC filters associated with DBC filters and configured to forward packets not passed by DBC filters. Using one or more NPBC filters within the disclosed embodiments, packet data that is not being passed along to output ports by the criteria-based filters can be easily passed to one or more designated output ports.

Classes IPC  ?

  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/937 - Commande de la commutation, p.ex. arbitrage

87.

Methods, systems, and computer readable media for emulating computer processing usage patterns on a virtual machine

      
Numéro d'application 14749606
Numéro de brevet 09507616
Statut Délivré - en vigueur
Date de dépôt 2015-06-24
Date de la première publication 2016-11-29
Date d'octroi 2016-11-29
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Ramanath, Avinash
  • Lvov, Sergey
  • Puchiu, Gheorghe Mihai

Abrégé

According to one aspect, the disclosed subject matter describes herein a method for emulating computer processing usage patterns on a virtual machine that includes generating a usage pattern specification based on a plurality of computer processing usage patterns provided by a user and receiving, by a virtual machine hosted by a device under test (DUT), the usage pattern specification containing the plurality of computer processing usage patterns. The method also includes generating a plurality of pattern instruction sequences using execution parameters included in each of the plurality of computer processing usage patterns and distributing each of the plurality of pattern instruction sequences among a plurality of virtual processing cores of the virtual machine. The method further includes emulating the operation of the application on the virtual machine by executing the pattern instruction sequences on the virtual processing cores in a manner specified by the execution parameters.

Classes IPC  ?

  • G06F 9/46 - Dispositions pour la multiprogrammation
  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 11/26 - Tests fonctionnels
  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel

88.

Method, device and test setup for implementing carrier aggregation

      
Numéro d'application 15109806
Numéro de brevet 10182464
Statut Délivré - en vigueur
Date de dépôt 2015-02-03
Date de la première publication 2016-11-10
Date d'octroi 2019-01-15
Propriétaire Keysight Technologies Singapore (Sales) Pte. Ltd. (Singapour)
Inventeur(s) Mathew, Binu

Abrégé

There is provided a method of implementing carrier aggregation on a first transceiver. The method comprises receiving and decoding, during a first subframe, channel quality information from user equipment and transferring, before the expiry of a second subframe immediately following the first subframe, the decoded channel quality information over a direct physical link to a second transceiver, for use in decoding further channel quality information from the user equipment.

Classes IPC  ?

  • H04W 76/15 - Établissement de connexions à liens multiples sans fil
  • H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
  • H04B 7/06 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
  • H04L 1/24 - Tests pour s'assurer du fonctionnement correct
  • H04W 76/02 - Établissement de la connexion
  • H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue

89.

Signature-based latency extraction systems and related methods for network packet communications

      
Numéro d'application 14699056
Numéro de brevet 09800482
Statut Délivré - en vigueur
Date de dépôt 2015-04-29
Date de la première publication 2016-11-03
Date d'octroi 2017-10-24
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Pandey, Shardendu
  • Register, Scott

Abrégé

Signature-based latency extraction systems and related methods are disclosed for network packet communications. Disclosed embodiments generate packet signatures (e.g., hash values) for packets received with respect to points within a network packet communication system. For each received packet, its packet signature is compared to packet signatures stored for previously received packets. If no match is found, the packet signature and a timestamp associated with the newly received packet are stored within one or more packet data tables. If a match is found, then the difference between the timestamp associated with the newly received packet and a timestamp stored with the matching packet signature are used to determine a latency value. The latency values can then be used to determine a variety of latency-related parameters for the network infrastructure being measured, and classification information can also be used to generate latency-related histograms. A variety of embodiments can be implemented.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

90.

Methods, systems, and computer readable media for testing recovered clock quality

      
Numéro d'application 14809513
Numéro de brevet 09923656
Statut Délivré - en vigueur
Date de dépôt 2015-07-27
Date de la première publication 2016-10-27
Date d'octroi 2018-03-20
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Tenea, Bogdan
  • Regev, Alon

Abrégé

A system for testing recovered clock quality includes a test device for operating as a timing synchronization protocol master for communicating with a device under test functioning as a timing synchronization protocol slave or a timing synchronization protocol boundary clock to synchronize a clock of the device under test with a clock of the test device. The system further includes a recovered clock quality tester for receiving, from the device under test, a reverse synchronization message including clock information and for using the clock information to quantify a synchronization error between the clock of the device under test and the clock of the test device.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04J 3/06 - Dispositions de synchronisation
  • H04J 3/14 - Dispositifs de contrôle
  • G01R 31/319 - Matériel de test, c.-à-d. circuits de traitement de signaux de sortie

91.

Methods, systems, and computer readable media for synchronizing timing among network interface cards (NICS) in a network equipment test device

      
Numéro d'application 14688630
Numéro de brevet 09736804
Statut Délivré - en vigueur
Date de dépôt 2015-04-16
Date de la première publication 2016-10-20
Date d'octroi 2017-08-15
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Regev, Alon

Abrégé

Methods, systems, and computer readable media for synchronizing timing among network interface cards in a network equipment test device are disclosed. One method includes generating and sending timing synchronization measurement signals to the management network interface card and a test network interface card in the network equipment test device. The method further includes recording times of receipt of the timing synchronization measurement signals at the management network interface card and the test network interface card. The method further includes adjusting timing of the test network interface card using the times of receipt of the timing synchronization measurement signals.

Classes IPC  ?

  • H04W 56/00 - Dispositions de synchronisation
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

92.

Methods, systems, and computer readable media for emulating network devices with different clocks

      
Numéro d'application 14688644
Numéro de brevet 10019333
Statut Délivré - en vigueur
Date de dépôt 2015-04-16
Date de la première publication 2016-10-20
Date d'octroi 2018-07-10
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Regev, Alon

Abrégé

The subject matter described herein relates to methods, systems, and computer readable media for emulating network devices with different clocks. One method includes steps occurring in a network equipment test device. The steps include generating or obtaining timing information. The steps further include obtaining clock modification information. The steps further include emulating a plurality of different clocks using the timing information and the clock modification information. The method further includes emulating at least one network device that transmits test packets to a device under test using the different clocks.

Classes IPC  ?

  • G06F 11/26 - Tests fonctionnels
  • G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p. ex. essais de mise en route
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

93.

Methods, systems, and computer readable media for one-way link delay measurement

      
Numéro d'application 14685552
Numéro de brevet 09699051
Statut Délivré - en vigueur
Date de dépôt 2015-04-13
Date de la première publication 2016-10-13
Date d'octroi 2017-07-04
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Rat{hacek Over (a)}, Marian
  • R{hacek Over (a)}doi, Codrut Dumitru
  • Stanciu, Vlad
  • Tenea, Bogdan

Abrégé

A method for measuring one-way link delay includes transmitting a first packet from a first network device. The first packet is passively intercepted, a first copy of the first packet is transmitted to the first network device, and a second copy of the first packet is transmitted to a second network device. A time of receipt of the first copy of the first packet is recorded as an origin timestamp at the first network device. A time of receipt of the second copy of the first packet is recorded as a receive timestamp at the second network device. A second packet including the origin timestamp is transmitted from the first network device. The second packet is passively intercepted, and a first copy of the second packet is transmitted to the second network device. The first copy of the second packet is received at the second network device, and the origin timestamp is extracted from the first copy of the second packet. Link delay from the first network device to the second network device is calculated using the origin timestamp and the receive timestamp.

Classes IPC  ?

  • H04J 1/16 - Dispositions de contrôle
  • H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

94.

Methods, systems, and computer readable media for simplistic visual representation of complex interdependent network protocol fields for network protocol fuzzing and graphical framework for reporting instantaneous system level progress

      
Numéro d'application 14658860
Numéro de brevet 09917924
Statut Délivré - en vigueur
Date de dépôt 2015-03-16
Date de la première publication 2016-09-22
Date d'octroi 2018-03-13
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Mandal, Kingshuk

Abrégé

A method for visualizing interdependent network protocol fields for fuzzing and progress reporting includes providing a graphical user interface including a stacked representation of network protocol fields to be fuzzed. The method further includes displaying, in the stacked representation, an indication of network protocol fields that can or cannot be fuzzed. The method further includes receiving, via the stacked representation, selections of network protocol fields to be fuzzed and specifications of fuzzed parameter values for the selections. The method further includes generating and sending to a device under test network protocol packets with fuzzed parameter values according the selections and specifications.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

95.

Pre-sorter systems and methods for distributing GTP packets

      
Numéro d'application 15168428
Numéro de brevet 10230667
Statut Délivré - en vigueur
Date de dépôt 2016-05-31
Date de la première publication 2016-09-22
Date d'octroi 2019-03-12
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Johansson, Stefan
  • O'Connor, Robin

Abrégé

Pre-sorter systems and methods are disclosed for distributing GTP packets. The pre-sorter forwards GTP packets based upon entries within one or more pre-sort tables, and the entries associate F-TEIDs with output ports that can be coupled to GTP sessions controllers and/or other external systems. The F-TEIDs represent a combination of a destination IP address and a tunnel endpoint identifier (TEID) for each GTP packet. For some embodiments, GTP session controllers analyze the GTP packets and determine F-TEIDs that are created, modified, and/or dropped for user sessions, and the GTP session controllers send control messages to the pre-sorter to determine the entries stored within the pre-sort table(s). For other embodiments, other external systems such as network monitoring tools are coupled to the GTP packet pre-sorter rather than GTP session controllers. Pre-sorters having multiple pre-sort modules with local pre-sort tables, as well as two-stage pre-sort architectures, can also be used.

Classes IPC  ?

  • H04W 40/00 - Acheminement ou recherche d'itinéraire pour la communication
  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

96.

Optimized message processing

      
Numéro d'application 14640959
Numéro de brevet 09807204
Statut Délivré - en vigueur
Date de dépôt 2015-03-06
Date de la première publication 2016-09-08
Date d'octroi 2017-10-31
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Bergeron, Matthew R.

Abrégé

Methods, systems, and computer readable media for optimized message processing are disclosed. According to one exemplary method, the method includes receiving a message including header information. The method further includes determining, using the header information, whether a fast-path identification rule exists for identifying the message. The method also includes in response to determining that the fast-path identification rule does not exist, identifying the message using slow-path processing, determining the fast-path identification rule using the slow-path processing, and storing the fast-path identification rule in a memory.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données

97.

Methods, systems, and computer readable media for converging on network protocol stack vulnerabilities using fuzzing variables, vulnerability ratings and progressive convergence

      
Numéro d'application 14659309
Numéro de brevet 09432394
Statut Délivré - en vigueur
Date de dépôt 2015-03-16
Date de la première publication 2016-08-30
Date d'octroi 2016-08-30
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Lahiri, Abhijit
  • Mandal, Kingshuk

Abrégé

A method for progressive convergence on network protocol stack vulnerabilities includes defining an initial protocol field and field value space for fuzz testing of a network communications protocol stack implementation. The method further includes dividing the initial space into regions corresponding to combinations of protocol fields and field values. The method further includes assigning vulnerability ratings to at least some of the regions. The method further includes executing fuzz testing of the network communications protocol stack implementation using the protocol fields and field values corresponding to the regions. The method further includes updating the vulnerability ratings of the regions based on results of the testing. The method further includes identifying, based on the updated vulnerability ratings, at least one region with a higher vulnerability rating than other regions. The method further includes performing fuzz testing for the sub-regions.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

98.

Methods, systems, and computer readable media for monitoring latency and/or time-based data locations of multicast communications

      
Numéro d'application 14626863
Numéro de brevet 10097366
Statut Délivré - en vigueur
Date de dépôt 2015-02-19
Date de la première publication 2016-08-25
Date d'octroi 2018-10-09
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s) Galime, Michael Paul

Abrégé

Methods, systems, and computer readable media for monitoring latency and/or time-based data locations of multicast communications are disclosed. One exemplary method includes monitoring sequence numbers of multicast messages at a plurality of physical network locations, reporting when a sequence number value for the multicast messages reaches a predetermined value, and receiving the reports and using the reports to generate an indication of relative latencies and/or time-based data locations across the physical network locations.

Classes IPC  ?

  • H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

99.

Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (NATs), or clouds

      
Numéro d'application 14619041
Numéro de brevet 09769291
Statut Délivré - en vigueur
Date de dépôt 2015-02-10
Date de la première publication 2016-08-11
Date d'octroi 2017-09-19
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Nistor, Marius Pavel
  • Constantinescu, Mihail Florin
  • Ribault, Nicolas

Abrégé

Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (NATs), or clouds is disclosed. According to one exemplary method, the method occurs at a registration server configured to operate in a public network. The method includes receiving, from a first endpoint, a packet including a payload containing a first address and a hostname associated with the first endpoint. The method also includes identifying a second address from a header of the packet. The method also includes initiating, using the second address, a connection to the first endpoint. The method also includes determining whether the connection is successful. The method further includes associating the hostname of the first endpoint with one of the first address and the second address based on results of the determination.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données

100.

Methods, systems, and computer readable media for identifying network locations associated with endpoints

      
Numéro d'application 14619039
Numéro de brevet 09608906
Statut Délivré - en vigueur
Date de dépôt 2015-02-10
Date de la première publication 2016-08-11
Date d'octroi 2017-03-28
Propriétaire KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD. (Singapour)
Inventeur(s)
  • Constantinescu, Mihail Florin
  • Nistor, Marius Pavel

Abrégé

Methods, systems, and computer readable media for identifying network locations associated with endpoints are disclosed. According to one exemplary method, the method occurs at a registration server including at least one processor and configured to operate in a public network or a semi-public network. The method includes receiving, from an endpoint, a packet including a payload containing a first address associated with the endpoint. The method also identifying a second address from a header of the packet. The method further includes determining, using the first address or the second address, whether to initiate a connection with the endpoint for determining a network location associated with the endpoint.

Classes IPC  ?

  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  1     2     3     ...     5        Prochaine page