Monitoring network performance of encrypted communications

    公开(公告)号:US10142215B2

    公开(公告)日:2018-11-27

    申请号:US14947569

    申请日:2015-11-20

    摘要: According to one general aspect, a method of using a first probing device may include monitoring one or more encrypted communications sessions between a first computing device and a second computing device. In some implementations of the method, each encrypted communications session includes transmitting a plurality of encrypted data objects between the first and second computing devices. The method may include deriving, by the first probing device, timing information regarding an encrypted communications session. The method may also include transmitting, from the first probing device to a second probing device, the derived timing information.

    Monitoring signed resources transferred over a network

    公开(公告)号:US09712516B2

    公开(公告)日:2017-07-18

    申请号:US14310539

    申请日:2014-06-20

    IPC分类号: H04L9/32 H04L29/06

    摘要: A system for monitoring resources transferred over a network includes a capture module that is configured to capture content transferred over a network between a requestor device and a server device. The content includes a resource, a digital signature associated with the resource and a digital certificate associated with the digital signature. The system includes a resource monitor module that is configured to receive the captured content from the capture module. The resource monitor module includes at least one memory, at least one processor and a resource analyzer module that is configured to use the at least one processor to inspect one or more attributes of the digital certificate and inspect the digital signature and verify the digital certificate using the attributes and verify the digital signature.

    MONITORING NETWORK PERFORMANCE OF ENCRYPTED COMMUNICATIONS

    公开(公告)号:US20160119215A1

    公开(公告)日:2016-04-28

    申请号:US14947569

    申请日:2015-11-20

    IPC分类号: H04L12/26

    摘要: According to one general aspect, a method of using a first probing device may include monitoring one or more encrypted communications sessions between a first computing device and a second computing device. In some implementations of the method, each encrypted communications session includes transmitting a plurality of encrypted data objects between the first and second computing devices. The method may include deriving, by the first probing device, timing information regarding an encrypted communications session. The method may also include transmitting, from the first probing device to a second probing device, the derived timing information.