Patents by Inventor Nick Ioffe
Nick Ioffe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9444701Abstract: A method for discovering an operating system of a remote machine includes monitoring network communications to detect a plurality of data packets that were generated by the remote machine. The contents of each detected data packet are read so as to extract a packet signature of each detected data packet. Each packet signature is compared with at least one signature of a database of signatures in order to determine a similarity between each packet signature and the signature from the database. A confidence level for at least one candidate operating system is calculated based on the determined similarities. A candidate operating system is selected based on the confidence level for that operating system. Relating computer program product and data processing system are also disclosed.Type: GrantFiled: January 27, 2011Date of Patent: September 13, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Nick Ioffe, Eyal Kenigsberg, Michael Gopshtein, Rotem Steuer
-
Patent number: 8886795Abstract: A method for determining a response time of a server may include monitoring communications to and from the server to detect a client request to the server. The method may also include detecting in the monitored communications at least one trigger signal associated with the client request. The method may further include determining a response time of the server to be the time difference between a time at which the at least one trigger signal was fully received and a beginning time of transmission of a final server response from the server, disregarding transmission periods and periods during which the client request is not processed by the server. A computer readable medium and system for determining a response time of a server are also disclosed.Type: GrantFiled: January 27, 2011Date of Patent: November 11, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Rotem Steuer, Eyal Kenigsberg, Michael Gopshtein, Nick Ioffe
-
Patent number: 8724466Abstract: Ingress and egress port packets for a connection between a first node and second node are mirrored to a mirroring port on a network switch. A count of ingress and egress port packets associated with a handshake process is determined. Duplicate mirrored packets associated with the connection are filtered based at least in part on the count.Type: GrantFiled: June 30, 2010Date of Patent: May 13, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Eyal Kenigsberg, Michael Gopshtein, Nick Ioffe
-
Patent number: 8713088Abstract: Systems and methods of identifying users of remote sessions are disclosed. In an example, a method includes establishing a remote session in a virtual machine. The method also includes identifying a user of the remote session. The method also includes identifying information of the user in an outgoing request by the virtual machine for access to an application on a backend server during the remote session.Type: GrantFiled: March 27, 2011Date of Patent: April 29, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Michael Gopshtein, Eyal Kenigsberg, Nick Ioffe, Rotem Steuer, Sergey Pastukhov
-
Publication number: 20130060932Abstract: A method for discovering tiers within an application includes monitoring network traffic. A periodic report may be assembled based on the network traffic. Tiers may be discovered using the periodic report.Type: ApplicationFiled: September 6, 2011Publication date: March 7, 2013Inventors: Shachar Ofek, Amichai Ungar, Nick Ioffe
-
Publication number: 20120198048Abstract: A method for discovering an operating system of a remote machine includes monitoring network communications to detect a plurality of data packets that were generated by the remote machine. The contents of each detected data packet are read so as to extract a packet signature of each detected data packet. Each packet signature is compared with at least one signature of a database of signatures in order to determine a similarity between each packet signature and the signature from the database. A confidence level for at least one candidate operating system is calculated based on the determined similarities. A candidate operating system is selected based on the confidence level for that operating system. Relating computer program product and data processing system are also disclosed.Type: ApplicationFiled: January 27, 2011Publication date: August 2, 2012Inventors: Nick IOFFE, Eyal KENIGSBERG, Michael GOPSHTEIN, Rotem STEUER
-
Publication number: 20120198047Abstract: A method for determining a response time of a server may include monitoring communications to and from the server to detect a client request to the server. The method may also include detecting in the monitored communications at least one trigger signal associated with the client request. The method may further include determining a response time of the server to be the time difference between a time at which said at least one trigger signal was fully received and a beginning time of transmission of a final server response from the server, disregarding transmission periods and periods during which the client request is not processed by the server. A computer readable medium and system for determining a response time of a server are also disclosed.Type: ApplicationFiled: January 27, 2011Publication date: August 2, 2012Inventors: Rotem STEUER, Eyal Kenigsberg, Michael Gopshtein, Nick Ioffe
-
Patent number: 8176000Abstract: Discovering communication traffic in a computer network is useful to administrators of computer networks. Communication packets from a communication transaction on the network are read to determine a source computing device and to determine whether the communication transaction contains a data pattern match to one of a plurality of defined data patterns. If a match is made to an exact data pattern, the source computing device is associated with an application or service corresponding to that exact data pattern. If a match is made to a statistical data pattern, the source computing device is associated with an application or service corresponding to that statistical data pattern if a threshold number of data pattern matches have occurred for that statistical data pattern for the source computing device.Type: GrantFiled: May 19, 2009Date of Patent: May 8, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Michael Gopshtein, Eyal Kenigsberg, Nick Ioffe
-
Patent number: 8135979Abstract: A sniffer device determines whether an abnormal condition is present in a network communication. In response to determining that the abnormal condition is present, the sniffer device collects network-level packets into a data structure. The data structure containing the collected network-level packets can be analyzed for determining whether the abnormal condition caused an issue with a communicating entity.Type: GrantFiled: June 24, 2010Date of Patent: March 13, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Eyal Kenigsberg, Michael Gopshtein, Nick Ioffe
-
Publication number: 20120002679Abstract: Ingress and egress port packets for a connection between a first node and second node are mirrored to a mirroring port on a network switch. A count of ingress and egress port packets associated with a handshake process is determined. Duplicate mirrored packets associated with the connection are filtered based at least in part on the count.Type: ApplicationFiled: June 30, 2010Publication date: January 5, 2012Inventors: Eyal Kenigsberg, Michael Gopshtein, Nick Ioffe
-
Publication number: 20110320870Abstract: A sniffer device determines whether an abnormal condition is present in a network communication. In response to determining that the abnormal condition is present, the sniffer device collects network-level packets into a data structure. The data structure containing the collected network-level packets can be analyzed for determining whether the abnormal condition caused an issue with a communicating entity.Type: ApplicationFiled: June 24, 2010Publication date: December 29, 2011Inventors: EYAL KENIGSBERG, Michael Gopshtein, Nick Ioffe
-
Publication number: 20110314275Abstract: Methods, apparatus, and articles of manufacture to manage encryption keys are disclosed. An example method to manage encryption keys includes obtaining data including a private key, determining that the data cannot be read according to a first format by attempting to read the data in the first format, in response to determining that the data cannot be read according to the first format, accessing the private key by reading the data according to a second format different from the first format, and converting the data from the second format to a third format.Type: ApplicationFiled: June 22, 2010Publication date: December 22, 2011Inventors: Michael Gopshtein, Eyal Kenigsberg, Guy Offer, Nick Ioffe
-
Publication number: 20100299302Abstract: Discovering communication traffic in a computer network is useful to administrators of computer networks. Communication packets from a communication transaction on the network are read to determine a source computing device and to determine whether the communication transaction contains a data pattern match to one of a plurality of defined data patterns. If a match is made to an exact data pattern, the source computing device is associated with an application or service corresponding to that exact data pattern. If a match is made to a statistical data pattern, the source computing device is associated with an application or service corresponding to that statistical data pattern if a threshold number of data pattern matches have occurred for that statistical data pattern for the source computing device.Type: ApplicationFiled: May 19, 2009Publication date: November 25, 2010Inventors: Michael Gopshtein, Eyal Kenigsberg, Nick Ioffe