Patent application number | Description | Published |
20090265463 | METHOD OF NON-INTRUSIVE ANALYSIS OF SECURE AND NON-SECURE WEB APPLICATION TRAFFIC IN REAL-TIME - Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be analyzed. The provided method involves non-intrusively copying data from a communication medium, reconstructing this data to a higher level of communication, such as the application level, grouping the data into sets, each set representing a session, and organizing the data for chosen sessions in hierarchical fashion which corresponds to the hierarchy of the communicated information. If monitored communications are encrypted, they are non-intrusively decrypted in real time. Hierarchically reconstructed session data is used by one or more plug-in applications, such as alarms, archival applications, visualization applications, script generation applications, abandonment monitoring applications, error detection applications, performance monitoring applications, and others. | 10-22-2009 |
20110173526 | AUTOMATIC CONTEXT MANAGEMENT FOR WEB APPLICATIONS WITH CLIENT SIDE CODE EXECUTION - The present invention relates to a method and apparatus for providing automatic context management for simulating virtual users for testing and monitoring web applications, including those web applications that execute code on the client side, without requiring the actual execution of client side web application code or the execution of the client within the testing, monitoring, or simulation tool. Simulation tools with automatic context management according to the present invention can record and replay context-full scripts that do not require manual customization and are capable of handling state information even for web applications that execute code on the client side. These scripts are able to realistically mimic complex web application transactions on the network HTTP layer. | 07-14-2011 |
20120158987 | METHOD OF NON-INTRUSIVE ANALYSIS OF SECURE AND NON-SECURE WEB APPLICATION TRAFFIC IN REAL-TIME - Method and system, comprising: capturing a plurality of secure communications between the first application and the second application; grouping the plurality of communications into one or more streams, each stream representing a network connection; and processing the one or more streams in parallel to create a plurality of transactions. | 06-21-2012 |
20130185643 | Method And System For Tracing End-To-End Transaction, Including Browser Side Processing And End User Performance Experience - A system is provided for tracing end-to-end transactions. The system uses bytecode instrumentation and a dynamically injected agent to gather web server side tracing data, and a browser agent which is injected into browser content to instrument browser content and to capture tracing data about browser side activities. Requests sent during monitored browser activities are tagged with correlation data. On the web server side, this correlation information is transferred to tracing data that describes handling of the request. This tracing data is sent to an analysis server which creates tracing information which describes the server side execution of the transaction and which is tagged with the correlation data allowing the identification of the causing browser side activity. The analysis server receives the browser side information, finds matching server side transactions and merges browser side tracing information with matching server side transaction information to form tracing information that describes end-to-end transactions. | 07-18-2013 |
20140025812 | AUTOMATIC CONTEXT MANAGEMENT FOR WEB APPLICATIONS WITH CLIENT SIDE CODE EXECUTION - The present invention relates to a method and apparatus for providing automatic context management for simulating virtual users for testing and monitoring web applications, including those web applications that execute code on the client side, without requiring the actual execution of client side web application code or the execution of the client within the testing, monitoring, or simulation tool. Simulation tools with automatic context management according to the present invention can record and replay context-full scripts that do not require manual customization and are capable of handling state information even for web applications that execute code on the client side. These scripts are able to realistically mimic complex web application transactions on the network HTTP layer. | 01-23-2014 |
20140136693 | METHOD AND SYSTEM FOR BROWSER BASED, NON-INTRUSIVE MEASURING OF END-USER PERCEIVED PERFORMANCE OF INDIVIDUAL THIRD PARTY RESOURCE REQUESTS - A performance management system is provided that measures end user performance in a distributed computing environment. The system detects DOM updates caused by browser side activities, and identifies resource load requests introduced by a DOM update that request resource from third party sources. For such resource load requests, resource sensors are installed which detect the point in time when loading the resource was finished. This allows to measure load time for individual resource load requests requesting third party resources, and to assign the tracing and performance monitoring data describing those resource load requests to the tracing and performance monitoring data describing the browser side transaction execution that caused the third party resource loads. | 05-15-2014 |
20140297846 | System And Method For Combining Server Side and Network Side Transaction Tracing And Measurement Data At The Granularity Level Of Individual Transactions - A performance monitoring and management system is provided for monitoring both server side and network side performance parameters of individual distributed transactions. The system uses correlation data which is transferred over a computer network to identify corresponding sender/receiver parts of a distributed transaction. Both server side tracing data and correlation data is transferred to an external correlation and monitoring server that creates per transaction end-to-end tracing data. Network probes are installed in the network infrastructures which monitor network conditions, like e.g. data transferred. Those network probes are configured in a way to identify and extract the correlation data used by the monitoring system and to tag created network measurements with this correlation data. Those tagged network measurements are then used to augment the per transaction end-to-end tracing data with corresponding network measurements. | 10-02-2014 |
20150304386 | SYSTEMS AND METHODS FOR CONTEXT MANAGEMENT - Systems and methods comprising a context analyzer configured to associate one or more Hypertext Transfer Protocol (HTTP) transactions, an extensible document parser configured to parse a document included in the one or more HTTP transactions; and a library of parser additions used by the context analyzer to generate context-full replay instructions. | 10-22-2015 |