Patents Assigned to Keysight Technologies Singapore (Sales) Pte. Ltd.
-
Patent number: 11831763Abstract: Methods, systems, and computer readable media for utilizing predetermined encryption keys in a test simulation environment are disclosed. In one embodiment, a method includes generating, prior to an initiation of an Internet protocol security (IPsec) test session, a private key and a public key at a traffic emulation device and storing the private key and the public key in a local storage associated with the traffic emulation device. The method further includes retrieving, from the local storage, the private key and the public key upon the initiation of the IPsec test session between the traffic emulation device and a device under test (DUT) and generating a shared secret key utilizing the retrieved private key and a DUT public key received from the DUT.Type: GrantFiled: May 24, 2021Date of Patent: November 28, 2023Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Andrei Cipu, Alexandru Badea, George Ciobanu
-
Patent number: 11728908Abstract: A test system includes a radio frequency (RF) shielded chamber and an antenna array in the RF shielded chamber. The antenna array includes groups of antenna elements and power combiners. Each group of antenna elements is matched to a matching group of antenna elements by virtue of being coupled to a respective power combiner for both the group and the matching group. The antenna array is configured, by virtue of spacing apart the antenna elements by at least half of a wavelength of a test signal for testing a wireless device in the RF chamber, so that power delivered to output ports of the antenna array is substantially uniform regardless of where the wireless device is placed within the RF chamber.Type: GrantFiled: April 10, 2019Date of Patent: August 15, 2023Assignee: Keysight Technologies Singapore (Sales) Pte., Ltd.Inventor: Rajaratnam Thiruvarankan
-
Patent number: 11489666Abstract: A method executed by a dynamic session key acquisition (DSKA) engine residing in a virtual environment includes receiving session decryption information extraction instructions that configure the DSKA engine to obtain session decryption information for at least one communication session involving a virtual machine and obtaining the session decryption information from the virtual machine in accordance with the session decryption information extraction instructions. The session decryption information includes cryptographic keys utilized by an application server instance in the virtual machine to establish the at least one communication session. The session decryption information obtained from the virtual machine is stored and provided to a network traffic monitoring (NTM) agent. The NTM agent utilizes the session decryption information to decrypt copies of encrypted network traffic flows belonging to the at least one communication session involving the virtual machine.Type: GrantFiled: November 25, 2020Date of Patent: November 1, 2022Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventor: Matthew R. Bergeron
-
Patent number: 11392488Abstract: Methods, systems, and computer readable media for optimizing storage of application data in memory are disclosed. According to one method for optimizing storage of application data in memory, the method includes receiving application data associated with an application. The method also includes generating, using information about the application, information about a processor, and information about a memory, a memory map indicating one or more memory locations in the memory for storing the application data. The method further includes storing, using the memory map, the application data in the one or more memory locations. The method also includes executing, using the processor, the application that uses the application data.Type: GrantFiled: April 9, 2018Date of Patent: July 19, 2022Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventor: Matthew R. Bergeron
-
Patent number: 11152717Abstract: A testing system comprises an emulator having a simulated radio channel for communicating therethrough with the electronic device. The testing system comprises a plurality of antenna elements coupled to an emulator which forms a beam of a signal of a path of a simulated radio channel with at least two antenna elements of the plurality of antenna elements in an anechoic chamber.Type: GrantFiled: October 6, 2008Date of Patent: October 19, 2021Assignee: Keysight Technologies Singapore (Sales) Pte. Ltd.Inventors: Pekka Kyosti, Petteri Heino, Janne Kolu, Marko Falck
-
Patent number: 11086752Abstract: The subject matter described herein relates to vendor-neutral testing and scoring of a system under test. One method for vendor-neutral scoring of a system under test includes generating a pre-testing snapshot of a system under test. The method further includes executing vendor-neutral testing of plural different subsystems of the system under test. The method further includes generating a vendor-neutral score based on the testing. The method further includes generating a post-testing snapshot of the system under test.Type: GrantFiled: August 27, 2015Date of Patent: August 10, 2021Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventor: Avinash Ramanath
-
Patent number: 11075886Abstract: Methods and systems are disclosed that provide in-session splitting of network traffic sessions for monitoring of traffic between network clients and network servers. This in-session splitting is based upon monitoring traffic sessions for one or more events and then initiating a proxied session based upon detection of the one or more events. For further embodiments, the creation of the proxied session is implemented based upon detection of a request for a secure link within the session traffic, and the proxied session is then implemented such that original session participants are not aware of the proxied session. The encrypted secure communications between the network client and the network server are split into two connections that decrypted and re-encrypted so that the contents of the secure link can be analyzed to identify network threats and/or other desired network related activities.Type: GrantFiled: December 15, 2016Date of Patent: July 27, 2021Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Santanu Paul, Kristopher Raney, Dennis J. Cox
-
Patent number: 11012327Abstract: Systems and methods are disclosed for drop detection and protection with respect to packet monitoring in virtual processing environments. Tap agents monitor and capture packets from the network traffic associated with network applications running within these virtual processing environments. Sequence numbers are added in packet encapsulation before tap packets are forwarded to tool agents. The tool agents then use the sequence numbers to detect packet drops within the tap packets. After drop detection, the tool agents send drop detection messages to an agent controller, and the agent controller generates and sends reconfiguration messages to the tap agents based upon the drop detection messages. The tool agents can also send drop detection messages directly to the tap agents. The tap agents adjust their operations based upon the reconfiguration messages and/or the drop detection messages to reduce packet drops within subsequent tap packets communications.Type: GrantFiled: April 10, 2018Date of Patent: May 18, 2021Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Kristopher Raney, Matthew R. Bergeron
-
Patent number: 10992652Abstract: Methods, systems, and computer readable media for monitoring encrypted packet communications are disclosed. According to one method executed at an encryption aware visibility (EAV) device, the method includes receiving copies of encrypted network traffic flow records belonging to at least one communication session involving a monitored application and obtaining, from a secure session management (SSM) server, session decryption information (SDI) via a secure backchannel interface connection, wherein the session decryption information includes cryptographic keys generated by the SSM server to establish the at least one communication session. The method further includes using the cryptographic keys to decrypt the copies of encrypted network traffic flow records to produce decrypted network traffic flow records.Type: GrantFiled: May 15, 2018Date of Patent: April 27, 2021Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Amritam Putatunda, Partha Majumdar
-
Patent number: 10958616Abstract: Methods, systems, and computer readable media for network test configuration using VLAN scanning are disclosed. One method for network test configuration using VLAN scanning occurs at a first port of a network equipment test device. The method includes sending a plurality of address resolution protocol (ARP) requests to a system under test (SUT), wherein each of the plurality of ARP requests includes a different virtual local area network (VLAN) identifier (ID). The method also includes receiving an ARP response from the SUT, wherein the ARP response indicates a first VLAN ID associated with the SUT. The method further includes using the first VLAN ID when sending test packets to the SUT via the first port.Type: GrantFiled: July 12, 2016Date of Patent: March 23, 2021Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventor: Thomas Ameling
-
Patent number: 10924394Abstract: Methods, systems, and computer readable media for computing label-switched data communication paths are disclosed. An example method includes receiving, by a path computation element (PCE) implemented on at least one processor, synchronization status information for routing nodes in a label-switched network. The method includes receiving, by the PCE, a request for a label-switched path (LSP) from a client. The method includes determining, by the PCE, a responsive LSP based at least in part on the synchronization status information. The method includes sending, by the PCE, an explicit route object (ERO) for the responsive LSP to the client.Type: GrantFiled: August 30, 2019Date of Patent: February 16, 2021Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Joy Chakraborty, Joydeep Banerjee
-
Patent number: 10903985Abstract: A method executed by a dynamic session key acquisition (DSKA) engine residing in a virtual environment includes receiving session decryption information extraction instructions that configure the DSKA engine to obtain session decryption information for at least one communication session involving a virtual machine and obtaining the session decryption information from the virtual machine in accordance with the session decryption information extraction instructions. The session decryption information includes cryptographic keys utilized by an application server instance in the virtual machine to establish the at least one communication session. The session decryption information obtained from the virtual machine is stored and provided to a network traffic monitoring (NTM) agent. The NTM agent utilizes the session decryption information to decrypt copies of encrypted network traffic flows belonging to the at least one communication session involving the virtual machine.Type: GrantFiled: August 27, 2018Date of Patent: January 26, 2021Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventor: Matthew R. Bergeron
-
Patent number: 10904075Abstract: Methods and systems for providing a configuration file on a network access switch that may be configured by a third party. A third party remotely defines a set of filters for the network access switch, absolving the user of any responsibility to update or configure the filters on the device. The configuration files may be stored and accessed remotely in the cloud. The system and method also provide for a simple software interface to facilitate easy implementation of the filters stored in the configuration files.Type: GrantFiled: July 2, 2013Date of Patent: January 26, 2021Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Kevin Formby, Gil Kaufman
-
Patent number: 10855694Abstract: Methods, systems, and computer readable media for packet monitoring in a virtual environment are disclosed. According to one method executed at a virtual tap element residing in between a first virtual machine and a second virtual machine in a virtual network environment, the method includes obtaining cryptographic key information from either the first virtual machine or the second virtual machine and detecting an encrypted packet flow being communicated in the virtual network environment between the first virtual machine and the second virtual machine via the virtual tap element. The method further includes decrypting the encrypted packet flow using the cryptographic key information, generating a decrypted packet flow set comprising at least a portion of the decrypted packet flow, and sending the decrypted packet flow set to a packet analyzer.Type: GrantFiled: May 30, 2017Date of Patent: December 1, 2020Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Anirban Majumder, Marcel Felix Desdier
-
Patent number: 10776535Abstract: A method for testing a network device using a variable traffic burst profile includes providing for user selection of at least one type of simulated traffic to be transmitted to a network device under test (DUT). The method further includes receiving user input regarding selection of the type of simulated traffic. The method further includes providing for user selection of a transmission rate for transmitting the simulated traffic to the DUT. The method further includes receiving user input regarding selection of the transmission rate. The method further includes transmitting the simulated traffic to the DUT according to the selected traffic type, the selected transmission rate, and a variable traffic burst profile.Type: GrantFiled: July 11, 2016Date of Patent: September 15, 2020Assignee: Keysight Technologies Singapore (Sales) Pte. Ltd.Inventor: Noah Steven Gintis
-
Patent number: 10715378Abstract: Systems and methods are disclosed for hash-based selection of network packets for packet flow sampling in network communication systems. Input packets associated with packet flows within a network communication system are received by a hash-based sampler. The hash-based sampler then generates hash values for the input packets based upon fields within the input packets. These fields are selected to identify packet flows for the input packets. The hash values for the input packets are then compared to a mask. The mask is configured to determine a subset of packet flows for which to forward packets. Based upon this comparison, certain input packets are selected to be forwarded for further processing, and non-selected packets are discarded. The further processing can include processing the selected input packets to generate flow statistics data (e.g., IPFIX) for the selected input packets.Type: GrantFiled: August 31, 2017Date of Patent: July 14, 2020Assignee: Keysight Technologies Singapore (Sales) Pte. Ltd.Inventor: Stefan Johansson
-
Patent number: 10678745Abstract: Methods, systems, and computer readable media for providing computing device configuration information via a light transmission are disclosed. According to one method, the method occurs at a computing device. The method includes receiving configuration information including an internet protocol (IP) address assigned by a network node. The method also includes sending a transmission including the configuration information, wherein the configuration information includes the IP address, wherein the transmission includes either a visible light transmission or an infrared (IR) transmission.Type: GrantFiled: May 8, 2017Date of Patent: June 9, 2020Assignee: Keysight Technologies Singapore (Sales) Pte. Ltd.Inventor: Matthew Ryan Bergeron
-
Patent number: 10680917Abstract: Traffic differentiator systems for network devices and related methods are disclosed that include automatic port order determination. The disclosed embodiments includes input ports that receive a first stream of packets and a second stream of packets and a packet difference processor that operates in a learning mode and a normal mode. In the learning mode of operation, the packet difference processor automatically determines a port order representing whether the first stream of packets for the first port or the second stream of packets for the second port represents a first in time version of received packets. In the normal mode of operation, the packet difference processor uses the port order determination to facilitate determination of difference packets between the first stream of packets and the second stream of packets.Type: GrantFiled: October 24, 2017Date of Patent: June 9, 2020Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Stefan Johansson, David W. McGhee
-
Patent number: 10681005Abstract: Methods, systems, and computer readable media for deploying a networking test tool in a cloud computing system are disclosed. An example method includes receiving user input specifying configuration information for a networking test tool for deployment in a cloud computing system. The user input specifies a range of networking test ports. The method includes deploying a central test server in the cloud computing system and deploying one or more public test agents in the cloud computing system. The method includes configuring the central test server, the one or more public test agents, and one or more private test agents in a network outside the cloud computing system to exchange test traffic using the range of networking test ports specified by the user input. The method includes configuring a firewall for the cloud computing system to open the range of networking test ports in the firewall for the test traffic.Type: GrantFiled: December 9, 2016Date of Patent: June 9, 2020Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventors: Mihail Florin Constantinescu, Taran Singh
-
Patent number: 10652112Abstract: Methods and systems are disclosed that pre-classify network traffic monitored within virtual machine (VM) platforms. Client packet monitor applications operate within client VM platforms to monitor network packets, generate monitored packets representing traffic of interest, determine packet classifications for the monitored packets based upon packet contents, identify tags associated with the packet classifications, encapsulate monitored packets with encapsulation headers including the tags to form encapsulated packets, and forward the encapsulated packets to tool VM platforms. Tool packet monitor applications operate within the tool VM platforms to receive the encapsulated packets, identify packet classifications associated with the tags, remove the encapsulation headers from the encapsulated packets, and forward de-encapsulated packets to network destinations based upon the packet classifications.Type: GrantFiled: November 3, 2016Date of Patent: May 12, 2020Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventor: Kristopher Raney