Patents by Inventor Bob Vogt
Bob Vogt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240422137Abstract: Decrypting synthetic transactions with beacon packets is provided. A probe receives, from a client device, a start beacon packet that identifies a test of a service provided by one or more servers. The probe establishes, responsive to receipt of the start beacon packet, a log for the test. The probe stores, in the log established responsive to the start beacon packet, data packets transmitted between the client device and the one or more servers subsequent to the start beacon packet and encrypted with a key using a security protocol. The probe receives, from the client device, key information used to decrypt the data packets of the test encrypted with the key using the security protocol. The probe provides at least one of the data packets for evaluation or decryption using the key information to determine a performance of the service.Type: ApplicationFiled: August 26, 2024Publication date: December 19, 2024Applicant: NetScout Systems, Inc.Inventors: Bruce Kosbab, Bob Vogt, Paul Alexander Barrett, Anil K. Singhal, Ashwani Singhal, Narendra Byrapuram, Colm Toomey, Connor Monk
-
Patent number: 12074854Abstract: Decrypting synthetic transactions with beacon packets is provided. A probe receives, from a client device, a start beacon packet that identifies a test of a service provided by one or more servers. The probe establishes, responsive to receipt of the start beacon packet, a log for the test. The probe stores, in the log established responsive to the start beacon packet, data packets transmitted between the client device and the one or more servers subsequent to the start beacon packet and encrypted with a key using a security protocol. The probe receives, from the client device, key information used to decrypt the data packets of the test encrypted with the key using the security protocol. The probe provides at least one of the data packets for evaluation or decryption using the key information to determine a performance of the service.Type: GrantFiled: February 10, 2023Date of Patent: August 27, 2024Assignee: Netscout Systems, Inc.Inventors: Bruce Kosbab, Bob Vogt, Paul Alexander Barrett, Anil K. Singhal, Ashwani Singhal, Narendra Byrapuram
-
Publication number: 20240275766Abstract: Decrypting synthetic transactions with beacon packets is provided. A probe receives, from a client device, a start beacon packet that identifies a test of a service provided by one or more servers. The probe establishes, responsive to receipt of the start beacon packet, a log for the test. The probe stores, in the log established responsive to the start beacon packet, data packets transmitted between the client device and the one or more servers subsequent to the start beacon packet and encrypted with a key using a security protocol. The probe receives, from the client device, key information used to decrypt the data packets of the test encrypted with the key using the security protocol. The probe provides at least one of the data packets for evaluation or decryption using the key information to determine a performance of the service.Type: ApplicationFiled: February 10, 2023Publication date: August 15, 2024Applicant: NetScout Systems, Inc.Inventors: Bruce Kosbab, Bob Vogt, Paul Alexander Barrett, Anil K. Singhal, Ashwani Singhal, Narendra Byrapuram
-
Patent number: 11601406Abstract: Decrypting synthetic transactions with beacon packets is provided. A probe receives, from a client device, a start beacon packet that identifies a test of a service provided by one or more servers. The probe establishes, responsive to receipt of the start beacon packet, a log for the test. The probe stores, in the log established responsive to the start beacon packet, data packets transmitted between the client device and the one or more servers subsequent to the start beacon packet and encrypted with a key using a security protocol. The probe receives, from the client device, key information used to decrypt the data packets of the test encrypted with the key using the security protocol. The probe provides at least one of the data packets for evaluation or decryption using the key information to determine a performance of the service.Type: GrantFiled: August 19, 2020Date of Patent: March 7, 2023Assignee: NetScout Systems, Inc.Inventors: Bruce Kosbab, Bob Vogt, Paul Alexander Barrett, Anil K. Singhal, Ashwani Singhal, Narendra Byrapuram
-
Publication number: 20220060452Abstract: Decrypting synthetic transactions with beacon packets is provided. A probe receives, from a client device, a start beacon packet that identifies a test of a service provided by one or more servers. The probe establishes, responsive to receipt of the start beacon packet, a log for the test. The probe stores, in the log established responsive to the start beacon packet, data packets transmitted between the client device and the one or more servers subsequent to the start beacon packet and encrypted with a key using a security protocol. The probe receives, from the client device, key information used to decrypt the data packets of the test encrypted with the key using the security protocol. The probe provides at least one of the data packets for evaluation or decryption using the key information to determine a performance of the service.Type: ApplicationFiled: August 19, 2020Publication date: February 24, 2022Applicant: NetScout Systems, Inc.Inventors: Bruce Kosbab, Bob Vogt, Paul Alexander Barrett, Anil K. Singhal, Ashwani Singhal, Narendra Byrapuram
-
Publication number: 20110029506Abstract: Bounding of large queries is provided in a network analysis environment by receiving a user query of a data set of network transactions, submitting a meta data query to the data set to determine whether the query would require an unreasonable amount of time to complete, and notifying the user to re-formulate the query if it would require too much time.Type: ApplicationFiled: August 10, 2009Publication date: February 3, 2011Applicant: FLUKE CORPORATIONInventors: Dan Prescott, Bob Vogt, John Monk
-
Patent number: 7634467Abstract: A method and system for providing business context corresponding to unstructured documents is provided. A business context correlation system analyzes the contents of a user's unstructured document, identifies the business context of the unstructured document from the analyzed contents, and presents the business context along with the unstructured document to the user. The business context includes the relevant contextual objects and documents associated with one or more business applications. Providing a view of the business context along with the unstructured document allows the user more fully understand and act on the displayed document.Type: GrantFiled: October 31, 2006Date of Patent: December 15, 2009Assignee: Microsoft CorporationInventors: Patricia A. Ryan, John C. Platt, Glen H. Anderson, Gina Venolia, Bob Vogt
-
Patent number: 7451158Abstract: A set of defining guidelines, referred to as a schema, can be used to create, append, or merge a work management file. The data for the work management file can be received from files made with different application programs, such as spreadsheet or database software. The schema can be configured in extensible markup language (XML). The schema can reside in memory or it can reside in a file. The schema can be used with serializers that retrieve data from files that may have not been created by a work management program in order to retrieve a work management file. A scheduling engine that includes rules can resolve any work management conflicts that may exist in the data after it has been validated with the schema.Type: GrantFiled: November 27, 2002Date of Patent: November 11, 2008Assignee: Microsoft CorporationInventors: Bob Vogt, Raju Iyer
-
Publication number: 20080104052Abstract: A method and system for providing business context corresponding to unstructured documents is provided. A business context correlation system analyzes the contents of a user's unstructured document, identifies the business context of the unstructured document from the analyzed contents, and presents the business context along with the unstructured document to the user. The business context includes the relevant contextual objects and documents associated with one or more business applications. Providing a view of the business context along with the unstructured document allows the user more fully understand and act on the displayed document.Type: ApplicationFiled: October 31, 2006Publication date: May 1, 2008Applicant: Microsoft CorporationInventors: Patricia A. Ryan, John C. Platt, Glen H. Anderson, Gina Venolia, Bob Vogt