Jonathon Brett Rubin - Tampa FL, US Robert Peter Borland - Palm Harbor FL, US
International Classification:
H04L 29/06
US Classification:
713157, 713164
Abstract:
An example method disclosed herein to monitor Internet usage comprises intercepting, using a kernel extension executing in an operating system kernel of a device, a first request to be sent to a content source by a monitored client executing on the device, providing a first certificate to the client in response to intercepting the first request sent by the client to the content source, the first certificate associated with a meter that is to monitor Internet usage, sending a second request to the content source, receiving a second certificate that is associated with the content source in response to sending the second request to the content source, and obtaining a session key to decrypt encrypted traffic exchanged between the content source and the client, the session key being obtained from the client based on the first certificate and being sent to the content source based on the second certificate.
Intercepting Encrypted Network Traffic For Internet Usage Monitoring
- Schaumburg IL, US Robert Peter Borland - Palm Harbor FL, US
International Classification:
H04L 29/06
US Classification:
713157
Abstract:
Example methods disclosed herein include intercepting, with a meter executing on a computing device, a request sent by a client application to establish a secure communication session with a network server. Such disclosed example methods also include receiving, at the meter in response to forwarding the request to the network server, a first public key provided by the network server for encrypting a session key, and providing, from the meter to the client application, a second public key associated with the meter instead of the first public key provided by the network server in response to the request being intercepted. Such disclosed example methods further include using the first public key and a private key associated with the second public key to enable the meter to access an unencrypted version of the session key, and monitoring, with the meter, the network traffic using the unencrypted version of the session key.
Methods And Apparatus To Measure Feature Usage On Websites
Robert Peter Borland - Palm Harbor FL, US David Howell Wright - Safety Harbor FL, US
International Classification:
G06F 17/22
US Classification:
715234
Abstract:
Methods and apparatus to measure feature usage on websites are disclosed. An example method includes determining a set of rules associated with a website presented to a panelist; determining a selected rule from the set of rules, the selected rule determined by at least one of a communication received from the website, an element of a document object model of the website associated with the communication, or a uniform resource locator of the website; determining a feature of the website based on the selected rule, the communication and the element of the document object model; determining a category associated with the feature based on the selected rule, the communication and the element of the document object model; and creating an entry in an event log based on the feature and the category
The Nielsen Company - Tampa/St. Petersburg, Florida Area since Mar 2011
Director of Engineering
The Nielsen Company Aug 2007 - Mar 2011
Application Development Leader, Global Business Services
VNU Jan 1998 - Aug 2007
Sr. Project Manager / Director
Nielsen Media Research Jun 1986 - Dec 1997
Software Engineer, IT Project Manager
Education:
University of South Florida - College of Business Administration
M.S., Information Systems Management
University of West Florida
B.S., Systems Science
Skills:
Testing Software Engineering Data Warehousing JavaScript Project Management Software Design Service Delivery Software Project Management IT Strategy Databases ITIL SDLC Analytics SQL Process Improvement Business Process Improvement Enterprise Architecture Program Management Business Intelligence Agile Methodologies MS Project Software Development Leadership Management Integration Six Sigma Cross-functional Team Leadership Requirements Analysis
Robert Borland (1964-1966), Ivy Martin (1955-1957), Brenda Butler (1974-1979), John Revey (1974-1978), Paula Brazeau (1975-1980), Nelson Busschaert (1967-1972)
Rob Borland (1991-1995), Michael Dean (1999-2003), Holly Ditzel (1978-1982), Chris Rehkopf (1992-1995), Stacia Bippus (1989-1993), Rebecca Watkins (1993-1998)