Patents Assigned to CenturyLink Intellectual Property LLC
-
Publication number: 20250254181Abstract: Novel tools and techniques are provided for implementing a telemetry hub, and, more particularly, to methods, systems, and apparatuses for implementing a telemetry hub that obtains sensor data from a plurality of sources and that determines one or more first actions to take in response to receiving the first sensor data. In operation, a telemetry hub might receive first sensor data from one or more sensors. The telemetry hub may determine whether the first sensor data can be trusted and whether the first sensor data is valid. Based on a determination that the first sensor data can be trusted and is valid, the telemetry hub might analyze the first sensor data to determine one or more first actions to take. The telemetry hub might then implement the one or more first actions based at least in part on the analysis of the first sensor data.Type: ApplicationFiled: March 28, 2025Publication date: August 7, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Kevin M. McBride, Steven M. Casey, Stephen Opferman, Hunter Rudd, James E. Sutherland
-
Patent number: 12381785Abstract: This disclosure describes systems, methods, and devices related to staging a universal customer edge gateway device. A universal customer edge gateway device may generate, prior to deployment of the universal customer edge gateway device at a customer location, copies of virtual network function (VNF) operating system (OS) images on the universal customer edge gateway device, the copies including a first copy of a first VNF OS image and a second copy of a second VNF OS image; identify, during a deployment of the universal customer edge gateway device at the customer location, a selection of the first copy from a list of the copies; copy, during the deployment and based on the selection, the first VNF OS image to the universal customer edge gateway device; and instantiate, at the universal customer edge gateway device, the copied first VNF OS image.Type: GrantFiled: June 13, 2024Date of Patent: August 5, 2025Assignee: CenturyLink Intellectual Property LLCInventors: Austin Moaleji, Pavan Rampalli
-
Patent number: 12381810Abstract: In a network system, network switching devices such as routers may store routes to various networks. The system may on occasion be reconfigured, e.g., as new network switching devices are brought on line, or as servers are moved to new locations. Such reconfiguring may involve the storing of new routes in a network switching device, or the deletion of routes stored in a network switching device. As such, systems and methods for cloaking routes are provided.Type: GrantFiled: April 26, 2024Date of Patent: August 5, 2025Assignee: CenturyLink Intellectual Property LLCInventors: Dean Ballew, John R. B. Woodworth
-
Publication number: 20250247301Abstract: Aspects of the present disclosure include systems, methods, computing devices, computer-implemented methods, and the like for modeling and/or simulating performance of a telecommunications network during one or more failure scenarios that reduces computational time and/or power over previous simulation techniques. Modeling and simulating the network may include generating an initial network model from network data information and applying one or more transformations to the initial network model to reduce the size of the model. Following transformation, simulation methods may be applied to the generated network model based on routing characteristics of the components of the network. To reduce the computations utilized to simulate such components and/or routing decisions in the network, one or more simulation algorithms may be applied to the transformed network model to reduce the number of routing decisions simulated.Type: ApplicationFiled: April 18, 2025Publication date: July 31, 2025Applicant: CenturyLink Intellectual Property LLCInventor: Daniel Wilson
-
Publication number: 20250247305Abstract: An edge computing telecommunications network is provided for efficiently generating and updating computing models for use at distributed devices connected to different edge compute sites of the network. A network orchestration system may track devices connected to the network and the edge compute sites to which they are connected. The devices may comprise limited computing power and may include sensors or other data collection mechanisms. Raw data may be provided from connected devices to one or more edge compute sites. Edge compute sites may be instructed, e.g., by the network orchestration system, whether to replicate the raw data, modify the data to make it ready for consumption by a computing model, replicate the modified data, refine the computing model, replicate the refined computing model, and/or share some or all of the raw data, modified data, and/or refined computing model with other edge computing sites and/or connected devices.Type: ApplicationFiled: April 18, 2025Publication date: July 31, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Ronald A. Lewis, Alison Grayson, Carlos Santiago
-
Publication number: 20250247470Abstract: Novel tools and techniques are provided for implementing call center-based automated interface with voice switches for voice service diagnostics and provisioning. In various embodiments, in response to receiving a request by a call center user to access a voice service customer account, a computing system may access information regarding the voice service customer account that is stored in a database, may identify a switch that is configured to control voice service to a customer premises associated with the customer, based at least in part on the accessed information, and may autonomously access, from other databases, information associated with the voice service customer account. The computing system may integrate the accessed information, may generate and present a user interface (“UI”) displaying the accessed information, and may generate and present one or more options within the UI for the call center user to select to change features of the voice service.Type: ApplicationFiled: April 18, 2025Publication date: July 31, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Jaime D. Lemley, David Stegeman
-
Patent number: 12367016Abstract: Novel tools and techniques are provided for implementing object-oriented infrastructure-as-code platform (“OOIACP”) and its functionalities. In various embodiments, when a request to process one or more lifecycle events is received, a computing system may perform: selecting and scaling across a plurality of OOIACP instances; and causing the selected plurality of OOIACP instances to process the one or more lifecycle events. In some cases, each OOIACP instance may include an infrastructure-as-code (“IAC”) command line that instantiates component infrastructure among a plurality of component infrastructure to process at least one lifecycle event among the one or more lifecycle events concurrently and independently of other OOIACP instances. In some instances, the first plurality of OOIACP instances may be located within an environment in which the plurality of component infrastructure is located.Type: GrantFiled: January 3, 2023Date of Patent: July 22, 2025Assignee: CenturyLink Intellectual Property LLCInventor: William R. Benassi
-
Patent number: 12363228Abstract: Systems and methods are provided to provision a customer-specific identifier in cloud-based communications systems so that when a communication arrives at the network services provider, it is identified as being associated with the customer, even when the customer information would otherwise not be available. In examples, when a customer orders communication services from the network services provider (or associates the communication services with a third-party Internet telephony service), the network services provider provides the customer a unique identifier that is provisioned into that customer's instance of the third-party Internet telephony service. When the customer makes a call using the third-party Internet telephony service, the identifier is inserted into the communication (e.g., in a SIP header). The identifier is extracted when the communication is received at the network services provider and used to identify the customer so that appropriate services, service levels, etc.Type: GrantFiled: September 8, 2022Date of Patent: July 15, 2025Assignee: CenturyLink Intellectual Property LLCInventor: Joseph Scivicque
-
Publication number: 20250227132Abstract: Novel tools and techniques for providing an in-line AI virtual assistant are provided. A system includes a session border controller coupled to an end-user device, and a session initiation protocol stack. The session initiation protocol stack includes a processor, and non-transitory computer readable media comprising instructions executable by the processor to: receive, from the session border controller, a call invite request; provision, via the AI virtual assistant service, an AI virtual assistant instance in response to the call invite request; and join the AI virtual assistant instance to a call with the end-user device.Type: ApplicationFiled: March 6, 2025Publication date: July 10, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Steven M. Casey, Stephen Opferman, Felipe Castro, Jeff Leonard
-
Publication number: 20250219917Abstract: Customer premises equipment, such as a gateway device, for making a connection to an Internet service provider (ISP) may on occasion be defective or improperly set up, and in such circumstances remote troubleshooting by a technician employed by the Internet service provider may be hampered by the absence of a connection to the customer premises equipment. As such, a system and method for providing a secondary link to customer premises equipment are provided.Type: ApplicationFiled: March 20, 2025Publication date: July 3, 2025Applicant: CenturyLink Intellectual Property LLCInventors: John R.B. Woodworth, Dean Ballew
-
Publication number: 20250209332Abstract: This disclosure describes systems, methods, and devices related to automatically analyzing local loops of telecommunications networks. A method may include obtaining event data indicative of an event occurring in a local loop of a telecommunications network; generating a query requesting instrumentation-level data for the local loop, including first data prior to the event and second data after the event with a time buffer in between the first data and the second data; obtaining, by a computing device communicatively coupled with the local loop, responsive to the query, the instrumentation-level data; generating, using a machine learning model, a maintenance decision for the local loop based on whether the first data and the second data indicate that performance of the local loop improved or did not improve after the event; and providing, responsive to the query, the maintenance decision.Type: ApplicationFiled: December 10, 2024Publication date: June 26, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Ruiqin ZHANG, Thomas C. WOLDAHL, Maia J. FRIESER
-
Publication number: 20250203013Abstract: Novel tools and techniques are provided for implementing z-axis information for voice over Internet Protocol (“VoIP”). In various embodiments, a user device or location beacon having geo-location system access or having sensors or devices for obtaining z-axis information is used to provide z-axis information to a nearby VoIP telephone. The user device or location beacon may send a dial-triggering signal that causes the VoIP telephone (in its off-hook state) to dial a telephone number corresponding to a 911 or E911 address database system. After the 911 or E911 address database system indicates that it is ready to receive z-axis information, the user device or location beacon sends a z-axis data signal containing the current z-axis information to the VOIP telephone, which extracts the current z-axis information for sending to the 911 or E911 address database system for updating the 911 or E911 address associated with the VoIP telephone.Type: ApplicationFiled: May 10, 2024Publication date: June 19, 2025Applicant: CenturyLink Intellectual Property LLCInventor: Patrick Giagnocavo
-
Publication number: 20250203012Abstract: The present disclosure describes providing end-to-end call identity validation of a forwarded call. Identity information associated with a received call invite may be temporarily stored and reused for the forwarded call when a determination is made that the called party is likely to forward the call. If the inbound call is diverted (forwarded) by the called device, a call invite comprising an indication that the invite has been diverted (forwarded) by the called device may be received. The system may match data associated with the diverted call invite with the stored identity information. In some examples, the SHAKEN identity header and SHAKEN token is stored and may be attached to the diverted call invite. DIV authentication may then be performed, and the diverted call invite comprising SHAKEN and DIV identity headers may be provided to the forward-to destination.Type: ApplicationFiled: February 28, 2025Publication date: June 19, 2025Applicant: CenturyLink Intellectual Property LLCInventor: Joseph Scivicque
-
Publication number: 20250202781Abstract: Novel tools and techniques are provided for implementing easy digital subscriber line (“DSL”) signal detection. In various embodiments, after a connector of a signal detector has been inserted into a network service port, a processor of the signal detector may determine whether a pilot tone is present on at least one signal wire communicatively coupled to the network service port, the pilot tone being indicative of network service being ready for provision via the at least one signal wire. If so, the processor of the signal detector may cause a display device to indicate to a user that the network service port is ready to provide the network service. A modem can then be installed by connecting with the network service port. The connector, the processor, and the display device are integrated within a single, compact, handheld form factor of the signal detector.Type: ApplicationFiled: February 28, 2025Publication date: June 19, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Anthony M. Bieniek, Brian E. Bond
-
Publication number: 20250190725Abstract: Systems and methods for verifying remote device proximity in RFID systems are described. To reduce the risk of relay attacks, a terminal may determine a distance of a remote device from the terminal. The terminal may send a computational challenge to the remote device and determine whether a latency of the response is within a maximum acceptable latency, indicating that the remote device is within a maximum acceptable distance. The maximum acceptable latency may be dynamically determined based on context information, such as a time of day, that may be correlated with a likelihood of attempted unauthorized accesses. The terminal may determine whether to perform an action associated with the remote device based on whether the response was received within the maximum acceptable latency.Type: ApplicationFiled: December 6, 2024Publication date: June 12, 2025Applicant: CenturyLink Intellectual Property LLCInventors: John R.B. Woodworth, Dean Ballew
-
Publication number: 20250193128Abstract: Novel tools and techniques are provided for implementing capacity on demand functionality. In various embodiments, a computing system may generate and present a first user interface (“UI”) to a first entity over a first network, displaying data regarding network resources assigned to the first entity and an unused amount of said network resources, and may present options in the first UI for the first entity to select and allocate at least a portion of the unused network resources. The computing system may receive, from the second entity, a request for network resources to be provisioned for a specified period. The computing system may re-assign the at least a portion of the unused network resources to the second entity for the specified period, and may re-provision the at least a portion of the unused network resources to the second entity for the specified period.Type: ApplicationFiled: December 2, 2024Publication date: June 12, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Scott M. Brindamour, Thomas C. Barnett, JR., Kevin M. McBride, William R. Benassi, Steven David Grabow
-
Publication number: 20250193149Abstract: Systems and methods for publishing and using images of domain name system (DNS) zone configurations are described. An image file containing a copy of some or all of the DNS records associated with a zone DNS server (e.g., a DNS server for a zone) may be stored in a repository. In response to detecting that the zone DNS server is unavailable, an image server system retrieves the image file and stores the image file in an image DNS server. The image server system notifies a higher-level DNS server that the image DNS server is a DNS server for the zone. In some examples, the image file includes a zone signing key (ZSK) associated with the image DNS server that is signed by a key signing key (KSK) associated with the zone DNS server. The image DNS server uses the signed ZSK to sign DNS records for subsequent authentication.Type: ApplicationFiled: December 6, 2024Publication date: June 12, 2025Applicant: CenturyLink Intellectual Property LLCInventors: John R.B. Woodworth, Dean Ballew
-
Publication number: 20250187541Abstract: Systems and methods for in-vehicle display of exterior images to mitigate blind spots are described. A system may determine that a line of sight of a driver of a vehicle intersects an opaque portion of the vehicle, and in response, the system may display, on an interior surface of the opaque portion of the vehicle, an image of a portion of the exterior physical environment of the vehicle that is obscured by the opaque portion of the vehicle from the viewpoint of the driver. The system may perform parallax compensation on the image so that the image appears to be a view of the exterior physical environment from the viewpoint of the driver rather than from the viewpoint of the camera that captured the image.Type: ApplicationFiled: December 5, 2024Publication date: June 12, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Dean Ballew, John R.B. Woodworth
-
Publication number: 20250193664Abstract: Novel tools and techniques are provided for implementing access point or router-based rotation and exchange of data encryption/decryption keys. After receiving a request for a key and after confirming authentication of the client device, the computing system generates a first key based at least in part on an identifier of the client device, and encrypts the first key using a shared key, which includes a key or key-pair that is shared between the computing system and the client device. The computing system sends the encrypted first key via a connection that is established between the client device and the computing system. The encrypted first key, after being decrypted by the shared key, is usable by the client device either to encrypt first data for sending over an external network via the computing system or to decrypt second data that is received over the external network via the computing system.Type: ApplicationFiled: December 2, 2024Publication date: June 12, 2025Applicant: CenturyLink Intellectual Property LLCInventors: John R.B. Woodworth, Dean Ballew
-
Publication number: 20250193665Abstract: Novel tools and techniques are provided for implementing credential management across multiple devices for wireless network access. In examples, in response to receiving, from a client device, an authentication request for connection to a wireless network, a wireless access point device sends, to an administrator device, an authorization request for establishing a connection between the client device and the wireless network; receives, from the administrator device, an authorization response; and, when the authorization response indicates to provide access, generates and associates a credential for and with the client device, sets one or more time-to-live (“TTL”) values for the credential, and sends the credential to the client device.Type: ApplicationFiled: December 2, 2024Publication date: June 12, 2025Applicant: CenturyLink Intellectual Property LLCInventors: Dean Ballew, John R.B. Woodworth