Patents by Inventor Asaf Dafner

Asaf Dafner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11513794
    Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: November 29, 2022
    Assignee: BMC Software Israel Ltd
    Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
  • Patent number: 11048616
    Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: June 29, 2021
    Assignee: BMC Software, Inc.
    Inventors: Gilad Arbel Komissar, Eyal Koren, Asaf Dafner
  • Patent number: 10339031
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: September 11, 2017
    Date of Patent: July 2, 2019
    Assignee: BMC Software Israel Ltd.
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20180024910
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Application
    Filed: September 11, 2017
    Publication date: January 25, 2018
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Patent number: 9767007
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: September 19, 2017
    Assignee: Identify Software Ltd. (IL)
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20170039127
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Application
    Filed: October 20, 2016
    Publication date: February 9, 2017
    Inventors: Eyal KOREN, Asaf DAFNER, Shiri Semo JUDELMAN
  • Patent number: 9483391
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: January 21, 2016
    Date of Patent: November 1, 2016
    Assignee: Identify Software Ltd.
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Patent number: 9436588
    Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: September 6, 2016
    Assignee: Identify Software Ltd. (IL)
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20160140029
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Application
    Filed: January 21, 2016
    Publication date: May 19, 2016
    Inventors: Eyal KOREN, Asaf DAFNER, Shiri Semo JUDELMAN
  • Patent number: 9250924
    Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: February 2, 2016
    Assignee: IDENTIFY SOFTWARE LTD.
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20150186644
    Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.
    Type: Application
    Filed: March 6, 2015
    Publication date: July 2, 2015
    Inventors: Gilad Arbel KOMISSAR, Eyal KOREN, Asaf DAFNER
  • Publication number: 20150160947
    Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.
    Type: Application
    Filed: December 8, 2014
    Publication date: June 11, 2015
    Inventors: Shiri Semo JUDELMAN, Asaf DAFNER, Eyal KOREN
  • Patent number: 9003233
    Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: April 7, 2015
    Assignee: BMC Software, Inc.
    Inventors: Gilad Arbel Komissar, Eyal Koren, Asaf Dafner
  • Patent number: 8910127
    Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.
    Type: Grant
    Filed: September 20, 2012
    Date of Patent: December 9, 2014
    Assignee: Identify Software Ltd. (IL)
    Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
  • Publication number: 20140189438
    Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.
    Type: Application
    Filed: December 31, 2012
    Publication date: July 3, 2014
    Applicant: BMC SOFTWARE, INC.
    Inventors: Gilad Arbel, Eyal Koren, Asaf Dafner
  • Patent number: 8762952
    Abstract: A technique assists in resolving problems by aiding in the determination of the root cause of the problem. The technique allows recording of information about methods of executing applications that encounter problems, even if the method was not previously marked for recording. Upon detection of a problem, the method and all other methods on the current execution stack may be marked for retrospective recording. When each method exits, information about entry conditions and exit conditions of each method may be recorded for presentation to a user of the application for problem resolution.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: June 24, 2014
    Assignee: BMC Software, Inc.
    Inventors: Asaf Dafner, Sigal Korczyn, Yelena Langleyben, Shiri Semo Judelman
  • Patent number: 8745598
    Abstract: A technique provides a hook that executes prior to a software application that is invisible to the software application. In an object-oriented execution environment, an imposter main class is loaded instead of the application main class. The imposter main class then manipulates the object-oriented execution environment to load the application main class without requiring knowledge of the application main class other than its name, and without requiring a change to the command line for the application.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: June 3, 2014
    Assignee: BMC Software, Inc.
    Inventors: Eyal Koren, Golan Hallel, Asaf Dafner
  • Publication number: 20140096114
    Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Applicant: IDENTIFY SOFTWARE LTD. (IL)
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20140082596
    Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.
    Type: Application
    Filed: September 20, 2012
    Publication date: March 20, 2014
    Applicant: IDENTIFY SOFTWARE LTD. (IL)
    Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
  • Publication number: 20120151284
    Abstract: A technique assists in resolving problems by aiding in the determination of the root cause of the problem. The technique allows recording of information about methods of executing applications that encounter problems, even if the method was not previously marked for recording. Upon detection of a problem, the method and all other methods on the current execution stack may be marked for retrospective recording. When each method exits, information about entry conditions and exit conditions of each method may be recorded for presentation to a user of the application for problem resolution.
    Type: Application
    Filed: December 14, 2010
    Publication date: June 14, 2012
    Applicant: BMC SOFTWARE, INC.
    Inventors: Asaf Dafner, Sigal Korczyn, Yelena Langleyben, Shiri Semo Judelman