Patent application number | Description | Published |
20080288962 | Method and System for Dynamic Remote injection of In-process Agents into Virtual Machine based Applications - A method and system for dynamic and adaptive deployment of in-process agents to virtual machine based applications which may run on remote hosts is provided. A bootstrap agent is injected into the application, using standardized interfaces provided by virtual machine based systems like Sun Microsystems' Java or Microsoft's .NET. Said bootstrap agent establishes a network connection to a management server which provides binaries representing in-process agents in bytecode or native code format. The bootstrap agent sends data identifying its runtime environment to the management server, which determines the matching in-process agent binaries for the runtime environment of the connected agent and sends the selected binaries to the bootstrap agent. The bootstrap agent receives the binaries and installs them to its hosting virtual machine, according to their format (bytecode or native code). | 11-20-2008 |
20120297371 | Method and System for tracing individual Transactions at the Granularity Level of Method Calls Throughout Distributed Heterogeneous Applications without Source Code Modifications Including the Detection of Outgoing Requests - A monitoring system uses existing tracing data describing individual distributed transactions to determine if a recorded thread communication performed by the monitored transactions is internal to a monitored application or whether the recorded thread communication is an outgoing communication. Thread communications which are sent and received by threads that are monitored by the monitoring system are considered to be internal communications. Thread communications for which only the sending thread is monitored are considered to be outgoing communications. The determination process analyzes client side tracing data of the recorded thread communication and determines whether corresponding server side tracing data is available. If no corresponding server side tracing data is available, the thread communication is considered to be an outgoing communications. Examples of thread communications include HTTP requests, web service calls, and remote method invocations. | 11-22-2012 |
20120304172 | Method and System for Transaction Controlled Sampling of Distributed Hetereogeneous Transactions without Source Code Modifications - A system and method for tracing individual transactions at the granularity of method calls uses instrumentation based transaction tracing mechanisms to enhance thread call stack sampling mechanisms by a) only sampling threads executing monitored transactions while execution is ongoing; and b) tagging sampled call stacks with a transaction ID for correlation of sampled call stacks with instrumentation based tracing data. The combination of instrumentation based tracing with thread call stack sampling reduces sampling generated overhead by only sampling relevant threads, and reduces instrumentation generated overhead because it allows reducing instrumentation. | 11-29-2012 |
20130179868 | System And Method For Extracting Instrumentation Relevant Inheritance Relationships For A Distributed, Inheritance Rule Based Instrumentation System - The presented enhancement of a rule based instrumentation system taking object oriented inheritance relationships into account is directed to the detection and extraction to inheritance relationships relevant for the instrumentation process. Relevant inheritance relationships which have an impact on the instrumentation process and typically only represent a small fraction of the complete inheritance relationships of a monitored application. The small size of the relevant inheritance relationships allows, for example to prepare it in advance and ship it as part of a monitoring application or to transmit inheritance information between different local instrumentation engines being part of a distributed instrumentation system. | 07-11-2013 |
Patent application number | Description | Published |
20090265463 | METHOD OF NON-INTRUSIVE ANALYSIS OF SECURE AND NON-SECURE WEB APPLICATION TRAFFIC IN REAL-TIME - Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be analyzed. The provided method involves non-intrusively copying data from a communication medium, reconstructing this data to a higher level of communication, such as the application level, grouping the data into sets, each set representing a session, and organizing the data for chosen sessions in hierarchical fashion which corresponds to the hierarchy of the communicated information. If monitored communications are encrypted, they are non-intrusively decrypted in real time. Hierarchically reconstructed session data is used by one or more plug-in applications, such as alarms, archival applications, visualization applications, script generation applications, abandonment monitoring applications, error detection applications, performance monitoring applications, and others. | 10-22-2009 |
20110173526 | AUTOMATIC CONTEXT MANAGEMENT FOR WEB APPLICATIONS WITH CLIENT SIDE CODE EXECUTION - The present invention relates to a method and apparatus for providing automatic context management for simulating virtual users for testing and monitoring web applications, including those web applications that execute code on the client side, without requiring the actual execution of client side web application code or the execution of the client within the testing, monitoring, or simulation tool. Simulation tools with automatic context management according to the present invention can record and replay context-full scripts that do not require manual customization and are capable of handling state information even for web applications that execute code on the client side. These scripts are able to realistically mimic complex web application transactions on the network HTTP layer. | 07-14-2011 |
20120158987 | METHOD OF NON-INTRUSIVE ANALYSIS OF SECURE AND NON-SECURE WEB APPLICATION TRAFFIC IN REAL-TIME - Method and system, comprising: capturing a plurality of secure communications between the first application and the second application; grouping the plurality of communications into one or more streams, each stream representing a network connection; and processing the one or more streams in parallel to create a plurality of transactions. | 06-21-2012 |
20140025812 | AUTOMATIC CONTEXT MANAGEMENT FOR WEB APPLICATIONS WITH CLIENT SIDE CODE EXECUTION - The present invention relates to a method and apparatus for providing automatic context management for simulating virtual users for testing and monitoring web applications, including those web applications that execute code on the client side, without requiring the actual execution of client side web application code or the execution of the client within the testing, monitoring, or simulation tool. Simulation tools with automatic context management according to the present invention can record and replay context-full scripts that do not require manual customization and are capable of handling state information even for web applications that execute code on the client side. These scripts are able to realistically mimic complex web application transactions on the network HTTP layer. | 01-23-2014 |
20150304386 | SYSTEMS AND METHODS FOR CONTEXT MANAGEMENT - Systems and methods comprising a context analyzer configured to associate one or more Hypertext Transfer Protocol (HTTP) transactions, an extensible document parser configured to parse a document included in the one or more HTTP transactions; and a library of parser additions used by the context analyzer to generate context-full replay instructions. | 10-22-2015 |
20160036787 | METHODS AND SYSTEMS FOR NON-INTRUSIVE ANALYSIS OF SECURE COMMUNICATIONS - Method and system, comprising: capturing a plurality of secure communications between the first application and the second application; grouping the plurality of communications into one or more streams, each stream representing a network connection; and processing the one or more streams in parallel to create a plurality of transactions. | 02-04-2016 |
Patent application number | Description | Published |
20120250513 | Mobile Network Optimization - It is described a mobile network with a first network node and a second network node, the mobile network providing a user plane for transporting transmission packets which contain user data, and a further network layer plane different from the user plane. A method of operating the first network node includes sending an information element to the second network node via a network layer protocol of the further network layer plane wherein the information element indicates optimizing capabilities of the first network node or of a other network node of the mobile network of processing an optimized transmission packet. A method of operating a second network node includes receiving the information element from the first network node via a network layer protocol of the further network layer plane, and processing the information element. | 10-04-2012 |
20120276899 | CELL REGISTRATION - A method for a mobile communications network where a cell is identifiable by a global identifier unique in the mobile communications network and/or a short identifier re-usable in another cell of the mobile communications network. A registry associates information representing a location within the coverage area of the mobile communications network to a defined group of short identifiers. When an access point sends a request for registration to provide services of a cell in a mobile communications network, the request includes information indicating a location of the access point. The registry is used to select a short identifier to be applied in a cell of an access point before registering the access point to provide services of a cell in the mobile communications network. | 11-01-2012 |
20120309384 | Method for Controlling Interference in a Radio Communications System and Apparatus Thereof - Method and Apparatus thereof, for controlling intercell interference in a radio communications system having a plurality of user equipment and a plurality of access nodes including the steps of: a user equipment of said plurality connected to a serving access node, upon determining that an access node of said plurality is causing interference, transmitting a request to said serving access node; said serving access node forwarding said request to an apparatus controlling said interfering access node over an X2 interface, and said apparatus, instructing said interfering access node to execute said request. | 12-06-2012 |
20130005340 | Handover Between Different Closed Subscriber Groups - A core network (MME or RNC for example) receives in an uplink message a first list of closed subscriber group (CSG) identities for cells which are neighbors to a network access node. The core network creates a third list by checking the first list received in the uplink message against a second list which is a user equipment's list of allowed CSG identities; and then sends the third list downlink to at least the network access node which provided the first list. In different embodiments the neighbors of the first list include only cells which are direct neighbor CSG cells; or alternatively is also has cells which are adjacent to the direct neighbor CSG cells. | 01-03-2013 |
20130237221 | Establishing and Maintenance of a Neighbour Relationship Between Access Nodes in a Wireless Communications Network - A method of establishing a relationship between access nodes in a wireless communications network is provided. An access node is registered with the network. Information about each access node registered with the network is then stored at a control node. A list is then compiled at the control node, which includes each access node registered with the network and the list indicates which access node is a neighbour of another access node. This neighbour list is sent from the control node to each access node in the network. When an access node detects other access nodes, this is reported to the control node, which updates the neighbour list to the access nodes. | 09-12-2013 |
20130281082 | Automated Configuration of Base Stations - According to an apparatus, method and computer program product an interference pattern transmitted by a communication terminal based on a cellular communication network related configuration of the communication terminal is determined, wherein the determined interference pattern includes information on a transmission schedule of the communication terminal. Further, a wire connection based broadcast distribution of the determined interference pattern is initiated. Then, an interference pattern observed on a radio interface is compared with an interference pattern broadcast on wire connection, based on a transmission schedule of the interference pattern broadcast on wire connection. Finally, an originator of an interference pattern broadcast on wire connection is marked as a neighbor in case a match is determined between the interference pattern broadcast on wire connection of this originator and an interference pattern observed on a radio interface. | 10-24-2013 |
20140204832 | Gateway Functionality for Mobile Relay System - A method includes controlling one or more radio access connections at a mobile gateway for at least one station associated with a mobile relay system, the mobile relay system providing a plurality of access technologies and being served by one or more donor cellular systems. The method further includes controlling address information of communication on the one or more radio access connections between at least one station and one or more core network elements associated with the one or more donor cellular systems. | 07-24-2014 |
20140313982 | Method of Management in a Communications Network - A method including maintaining a database of unique radio network identifiers within a home node B gateway, wherein the unique radio network identifier uniquely identifies the radio network termination point of user equipment attached to a radio node controlled by the home node B gateway. | 10-23-2014 |
20140328246 | Mobile Relay Support in Relay-Enhanced Access Networks - Measures are provided for mobile relay support in relay-enhanced access networks. Such measures include setting up a first packet data connection for traffic in a relay-enhanced access network, which relates to first-type user terminals using the same access technology as a base station, from a mobile relay towards a packet data network via a first packet gateway functionality collocated with the base station currently serving the mobile relay, and setting up a second packet data connection for traffic in the relay-enhanced access network, which relates to second-type user terminals using another access technologies as the base station and the mobile relay, from the mobile relay towards the packet data network via a second packet gateway functionality external to the base station currently serving the mobile relay. | 11-06-2014 |
20150017925 | Allocation of Identifiers for Home Node BS - A technique including receiving neighbouring cell information specifying one or more cells as neighbouring cells for a first cell of a plurality of cells associated with a gateway entity; and selecting based on said neighbouring cell information an identifier for said first cell that distinguishes said first cell from any other cell of said plurality of cells associated with said gateway entity that specifies one or more neighbouring cells in common with said first cell. | 01-15-2015 |
20150296424 | Method for Handing Over a Mobile Relay Node - A UE is adapted to communicate with a further UE using a communication path via a mobile relay node and a source base station by using a first gateway functionality of the source base station. A management unit manages the communication path. The management unit prepares a handover of the mobile relay node from the source base station to the target base station. The management unit allocates resources in the target base station for providing a second gateway functionality for a further communication path for the UE via the mobile relay node and the target base station to the further UE. The management unit establishes the second gateway functionality for the further communication path for the UE via the mobile relay node and the target base station to the further UE. The management unit hands over the mobile relay node from the source base station to the target base station. | 10-15-2015 |
20160095046 | Method and Apparatus for Use in Network Selection - A method includes causing a user equipment to use one or more wireless local area networks based on cellular network information for a wireless cellular network indicating that a user equipment has restricted access to said wireless cellular network. | 03-31-2016 |
Patent application number | Description | Published |
20100044889 | Electrical Component and Film Composite Laminated On the Component and Method for Production - At least one film composite is laminated on a surface of at least one electrical component. The film composite includes at least one electrically-conducting plastic film with at least one electrically conducting conductor. The electrically-conducting plastic film has a high-ohmic resistance. This method may be used in planar large-surface electrical contacting technology for the production of modules with power semiconductors, where an electrical contacting of the components is achieved by the plastic films. A low lateral electrical conductivity is achieved, such that an electrical charging of the plastic films required for the contacting technology is prevented on operation of the component or the module. | 02-25-2010 |
20100133577 | Method for producing electronic component and electronic component - A plurality of chips disposed in a wafer on a passivated main side, having at least one chip contact surface, is provided with an insulation layer. The insulation layer has openings in the area of the at least one chip contact surface of each chip. The chip contact surfaces of each chip are provided with a chip contact surface metallization of a prescribed thickness, and the chips disposed in the water are separated therefrom. | 06-03-2010 |
20100314775 | EXPLOSION-PROOF MODULE STRUCTURE FOR POWER COMPONENTS, PARTICULARLY POWER SEMICONDUCTOR COMPONENTS, AND PRODUCTION THEREOF - A power module having at least one electric power component, such as a power electronic semiconductor component. An electrical contact for a load current is formed on a lower surface and also on an upper surface of the power semiconductor component. To reduce an explosion pressure and accept power when the power electronic semiconductor component is overloaded, a hollow space filled with at least one electrically conducting particle is formed on an electrical contact surface of the electrical contact. In case of a short circuit, an arc is initially generated above the semiconductor element thickness of the power semiconductor component, whereupon the filling in the hollow space takes over current conduction. Preferably, the filling in the hollow space is a plurality of spherical electrically conducting particles. The explosion pressure can escape into interstices in the filling if there is a short circuit. Furthermore, metal vapors are cooled and are condensed. A duct extending from and out of the hollow space can additionally be provided to reduce the explosion pressure, thus preventing power components from demolishing the surroundings during an electrical overload. The foregoing power module may be an improved thyristor. | 12-16-2010 |
20120075826 | PRESSURE SUPPORT FOR AN ELECTRONIC CIRCUIT - A circuit design includes an electrical circuit, which has at least one electronic component attached to a substrate and a flat conductor track electrically contacting the component. An elastic element is provided on the electrical circuit and a device applies a force to the elastic element so that the elastic element is pressed onto the electrical circuit. Thus, crack formation in a solder under the component is prevented. | 03-29-2012 |
Patent application number | Description | Published |
20080206443 | ENHANCED BONDING LAYERS ON TITANIUM MATERIALS - The present invention provides a dense-coverage, adherent phosphorous-based coating on the native oxide surface of a material. Disclosed phosphorous-based coatings include phosphate and organo-phosphonate coatings. The present invention also provides further derivatization of the phosphorous-based coatings to yield dense surface coverage of chemically reactive coatings and osteoblast adhesion-promoting and proliferation-promoting coatings on the native oxide surface of a titanium material. | 08-28-2008 |
20110093082 | ENHANCED BONDING LAYERS ON TITANIUM MATERIALS - The present invention provides a dense-coverage, adherent phosphorous-based coating on the native oxide surface of a material. Disclosed phosphorous-based coatings include phosphate and organo-phosphonate coatings. The present invention also provides further derivatization of the phosphorous-based coatings to yield dense surface coverage of chemically reactive coatings and osetoblast adhesion-promoting and proliferation-promoting coatings on the native oxide surface of a titanium material. | 04-21-2011 |
20120012033 | ENHANCED BONDING LAYERS ON TITANIUM MATERIALS - The present invention provides a dense-coverage, adherent phosphorous-based coating on the native oxide surface of a material. Disclosed phosphorous-based coatings include phosphate and organo-phosphonate coatings. The present invention also provides further derivatization of the phosphorous-based coatings to yield dense surface coverage of chemically reactive coatings and osetoblast adhesion-promoting and proliferation-promoting coatings on the native oxide surface of a titanium material. | 01-19-2012 |
20140330392 | SCAFFOLDS FOR TISSUES AND USES THEREOF - The present invention provides tissue scaffolds, methods of generating such scaffolds, and methods of use of such scaffolds to generate aligned and functional tissues for use in methods including regenerative medicine, wound repair, and transplantation. | 11-06-2014 |