Patents Assigned to Level 3 Communication, LLC
-
Publication number: 20250013520Abstract: Novel tools and techniques are provided for implementing dashboard for alert storage and history (“DASH”). In various embodiments, DASH provides for consolidated tracking and monitoring of two or more of current (or active) alerts, cleared alerts, and/or transactional information for alerts that are stored within corresponding alert live database that mirrors current alert instance data in a real-time fault management system, alert history database that contains a snapshot of an alert history of each alert or corresponding network device, and/or alert log database that contains a full transaction record of every copy of an alert either over a first duration or having a total data size within a first total data size. DASH also cleans received alert data and/or enriches the alert data, and provides a user interface (“UI”) that enables a user to view, absorb, filter, manage, and/or organize alert data to facilitate addressing of alerts in the network(s).Type: ApplicationFiled: September 16, 2024Publication date: January 9, 2025Applicant: Level 3 Communications, LLCInventors: Matthew D. Schoenfeldt, Steven Burrell, Angela A. Rash, Shelley Goldner, Shelli L. Hurd
-
Patent number: 12192055Abstract: Implementations described and claimed herein provide systems and methods for custom-defined network routing. In one implementation, a set of custom defined network flow rules is received at an edge router of a primary network, which is in communication with a customer network. The set of custom defined network flow rules correspond to network traffic associated with the customer network. The set of custom defined network flow rules is stored in a forwarding table on the edge router. A packet of data is received at the edge router. The packet of data is attributed to the customer network. The set of custom defined network flow rules is applied to the pack of data using the forwarding table.Type: GrantFiled: January 4, 2024Date of Patent: January 7, 2025Assignee: Level 3 Communications, LLCInventor: Eric Osborne
-
Patent number: 12192231Abstract: Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network.Type: GrantFiled: December 21, 2023Date of Patent: January 7, 2025Assignee: Level 3 Communications, LLCInventors: Robert Smith, Shawn Marck
-
Publication number: 20240430366Abstract: Aspects of the present disclosure involve systems, methods, computer program products for consolidating toll-free and/or tolled features of two or more telecommunications networks. The networks may be consolidated via an Enhanced Feature Server (EFS) deployed in a telecommunications network. The EFS may be configured to receive a toll-free and/or tolled communication and route the communication based on the dialed toll-free number and a carrier identification code (CIC) associated with the communication, or based on the dialing number and a CIC. Routing the communication based at least on the CIC associated with the communication allows the telecommunications network to consolidate a redundant network from the telecommunications network. In circumstances where a CIC is not associated with a communication, the EFS may request a data schema from a toll-free database, or from an automatic number identification (ANI) database, and determine a CIC based on an analysis of the data schema.Type: ApplicationFiled: June 7, 2024Publication date: December 26, 2024Applicant: Level 3 Communications, LLCInventor: David A. Tschirhart
-
Patent number: 12177098Abstract: A data network analysis system includes a computer-executable set of instructions that obtain service account information associated with a route provided to a customer through a data communication network having network elements. Using the service account information, the instructions identify a termination port that terminates the route to a customer premises equipment of the customer, and at least one target port of the route and those network elements that are assigned to convey the route through one or more of the network elements. The instructions then obtain the routing information for the route from each of the network elements that are assigned to convey the route.Type: GrantFiled: December 14, 2023Date of Patent: December 24, 2024Assignee: Level 3 Communications, LLCInventors: Steve R. Wakumoto, Andrew S. Gerber, John D. Clouatre
-
Publication number: 20240422193Abstract: Novel tools and techniques are provided for implementing web-based monitoring and detection of fraudulent or unauthorized use of voice calling service. In various embodiments, a computing system might receive, from a user device associated with an originating party, a request to initiate a call session with a destination party, the request comprising user information associated with the originating party and a destination number associated with the destination party; might query a database with session data (including user information) to access permission data and configuration data; and might configure fraud logic using received configuration data from the database. The computing system might analyze the session data and permission data using the configured fraud logic to determine whether the originating party is permitted to establish the requested call session with the destination party; if so, might initiate one or more first actions; and, if not, might initiate one or more second actions.Type: ApplicationFiled: August 29, 2024Publication date: December 19, 2024Applicant: Level 3 Communications, LLCInventors: Andrew J. Broadworth, Matthew McCarthy
-
Publication number: 20240422179Abstract: Apparatus, systems, methods, and the like, for autonomous scaling of security and other network services through initialization of a service from a network service device and/or migration of such services from one service device to another is provided. Such network scaling may allow for migration of services from existing service edges to other service edges. A security management system may coordinate the migration of services provided to a secondary network from one or more service edges to another, separate service edge while providing session synchronization during the migration. To migrate the services from the first service edge to a second service edge, a session table may be shared between the service edges and the first and second service edges may advertise service routes or endpoints with one or more priority values to control or otherwise determine which service edge is selected by a service-receiving device to receive the services.Type: ApplicationFiled: August 29, 2024Publication date: December 19, 2024Applicant: Level 3 Communications, LLCInventor: Bobby W. Metz
-
Publication number: 20240422122Abstract: The present application describes a system and method for passively collecting DNS traffic data as that data is passed between a recursive DNS resolver and an authoritative DNS server. The information contained in the collected DNS traffic data is used to generate a virtual authoritative DNS server, or a zone associated with the authoritative DNS server, when it is determined that the authoritative DNS server has been compromised.Type: ApplicationFiled: August 29, 2024Publication date: December 19, 2024Applicant: Level 3 Communications, LLCInventors: John R. Woodworth, Dean Ballew, Mark Dehus
-
Publication number: 20240406204Abstract: In an embodiment, a computer implemented method receives flow data for one or more flows that correspond to a device-circuit pair. The method calculates a time difference for each flow that corresponds to a device-circuit pair. Based on the calculated time differences and the received flow data, the method updates a probability distribution model associated with the device-circuit pair. Then, the method determines whether a time bucket is complete or open based on the updated probability distribution model.Type: ApplicationFiled: August 9, 2024Publication date: December 5, 2024Applicant: Level 3 Communications, LLCInventor: Sergey Yermakov
-
Patent number: 12160443Abstract: FlowSpec is a mechanism for distributing rules to routers in a network. Such rules may be used, for example, to drop traffic associated with a distributed denial of service attack. However, a malformed or incorrect FlowSpec announcement may, if distributed in the network, cause legitimate traffic to be dropped, degrading the service experienced by legitimate users. As such, systems and methods for avoiding the distribution of malformed FlowSpec announcements are provided.Type: GrantFiled: August 9, 2022Date of Patent: December 3, 2024Assignee: Level 3 Communications, LLCInventors: Michael Feldpusch, Christian Jensen, Lisa Harenski, William Hoxworth
-
Patent number: 12160320Abstract: Systems, methods, and storage media for detecting a security intrusion of a network device are disclosed. Exemplary implementations may include a method involving, in the network device including a processor, monitor a light signal associated with a security enabled port of the network device; and in response to detecting a change in the light signal, initiate a security alert.Type: GrantFiled: December 21, 2023Date of Patent: December 3, 2024Assignee: Level 3 Communications, LLCInventors: Steven E. Drake, Morgan M. Pofahl
-
Publication number: 20240394228Abstract: This disclosure describes systems, methods, and devices related to requesting use of a zero-copy operation. A method may include: generating, by a first channel of a hierarchy of channels in a user space, a request to retrieve a file descriptor before initiating a zero-copy operation; sending, by the first channel, to the hierarchy, the request; identifying, by a second channel of the hierarchy, a response accepting the request, the response including the file descriptor; adding, by the second channel, additional information to the response accepting the request, the additional information including at least one of a need notify request to be notified of an amount of data transferred using the zero-copy operation or parsed body data; identifying, by the first channel, the file descriptor and the additional information; and initiating, by the first channel, based on identifying the file descriptor, the zero-copy operation.Type: ApplicationFiled: February 14, 2024Publication date: November 28, 2024Applicant: Level 3 Communications, LLCInventor: William CROWDER
-
Publication number: 20240396884Abstract: Systems and methods for enforcing compliance-program conformity during authorization-token generation are presented. Applications may be registered with an identity and access management (IAM) system. The registration of the application may include whether the application is subject to one or more compliance program(s). When an authorization token is requested from the IAM system, the IAM system may (a) determine the set of authorization information needed in the token, and (b) determine whether the application is subject to a compliance program. The IAM system may then check an approval source of record to determine whether the user was legitimately approved for the required authorization prior to granting an authorization token. If there is a mismatch between the approval source of record and the authorization information associated with the user identity, then the mismatch may cause certain mitigation actions to be performed.Type: ApplicationFiled: May 21, 2024Publication date: November 28, 2024Applicant: Level 3 Communications, LLCInventors: Jamie LIN, Sylvan H. MORLEY, III, John KNIES, Jason LISH, Vishal VALLABHA, Glenn BALANOFF, Christopher BUZZETTA, Alexander TATE, Joseph SERRANO, Mark HOWE
-
Patent number: 12155792Abstract: The present application describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed.Type: GrantFiled: April 2, 2024Date of Patent: November 26, 2024Assignee: Level 3 Communications, LLCInventors: Richard D. Moore, Joseph Roy, Joseph Scivicque, Matthew C. Hess, George Wendell McFalls
-
Publication number: 20240388527Abstract: Novel tools and techniques are provided for implementing name-based routing through networks. In various embodiments, a broker manager in each of a plurality of networks may receive a subscription request for a network device from a client device, each device being locally accessible or disposed in an upstream or downstream network. The broker manager uses its client broker to communicate with a locally accessible client device, and uses its mediator broker (and, sometimes, an intermediate device(s)) to communicate with a locally accessible network device. The broker manager otherwise uses its messaging brokers to communicate with control channels of one or more networks. Once subscription with the network device has been established, any commands and responses between the client device and the network device may be routed over pub/sub channels via the broker managers and their brokers using name-based routing, without routing based on IP address of the network device.Type: ApplicationFiled: July 27, 2024Publication date: November 21, 2024Applicant: Level 3 Communications, LLCInventors: David Sutton, Steve Toms, Shelley Goldner, Shelli L. Hurd
-
Publication number: 20240388567Abstract: Implementations include providing security services to workloads deployed across various types of network environments, such as public networks, private networks, hybrid networks, customer premise network environments, and the like, by redirecting traffic intended for the service device through a security environment of the first network. After application of the security features to the incoming traffic, the “clean” traffic may be transmitted to the service device instantiated on the separate network via a tunnel. Redirection of incoming traffic to the security-providing first network may include correlating a network address of the service device to a reserved network address of a block of reserved addresses and updating a Domain Name Server (DNS) or other address resolving system with the reserved address. The return transmission tunnel may be established between the security environment and the network address of the service device.Type: ApplicationFiled: July 27, 2024Publication date: November 21, 2024Applicant: Level 3 Communications, LLCInventors: Peter Brecl, Steven Casey, Kevin M. McBride
-
Patent number: 12149572Abstract: Novel tools and techniques are provided for implementing programmatical public switched telephone network (“PSTN”) trunking for cloud hosted applications. In various embodiments, a computing system may determine one or more first network interconnection characteristics associated with a first entity service provider within a call service network operated by a call network service provider. Based on the determined one or more first network interconnection characteristics associated with the first entity service provider, the computing system may cause a network provisioning application layer to establish one or more network interconnections between a first network associated with the first entity service provider and the call service network, in some cases, by establishing shared peering connections between the first network and the call service network.Type: GrantFiled: February 14, 2022Date of Patent: November 19, 2024Assignee: Level 3 Communications, LLCInventors: Kimberly Adams, Anne Kempen, Joseph A. Scivicque, Adam Uzelac
-
Publication number: 20240380812Abstract: Disclosed herein are system, method, and computer program product embodiments for providing an API description of an external network service and using the API to integrate the external service into a network. An embodiment operates by receiving, from a service provider, a description of an application programming interface (API), transmitting a call to the service provider using the API for creating a new instance of a service and transmitting to the service provider a traffic flow upon which the service will be applied.Type: ApplicationFiled: July 22, 2024Publication date: November 14, 2024Applicant: Level 3 Communications, LLcInventor: William Sella
-
Patent number: 12143310Abstract: Novel tools and techniques are provided for implementing intent-based orchestration using network parsimony trees. In various embodiments, in response to receiving a request for network services that comprises desired characteristics and performance parameters for the requested network services without information regarding specific hardware, hardware type, location, or network, a computing system might generate a request-based parsimony tree based on the desired characteristics and performance parameters. The computing system might access, from a datastore, a plurality of network-based parsimony trees that are each generated based on measured network metrics, might compare the request-based parsimony tree with each of one or more network-based parsimony trees to determine a fitness score for each network-based parsimony tree, and might identify a best-fit network-based parsimony tree based on the fitness scores.Type: GrantFiled: December 21, 2023Date of Patent: November 12, 2024Assignee: Level 3 Communications, LLCInventors: Kevin M. McBride, Brett E. Dwyer, James E. Sutherland, Jamie Lin, Brent Smith, Glenn B. Balanoff, Frank Moss, Bryan Dreyer
-
Publication number: 20240372802Abstract: Novel tools and techniques are provided for implementing name-based routing through networks. In various embodiments, a broker manager in each of a plurality of networks may receive a subscription request for a network device from a client device, each device being locally accessible or disposed in an upstream or downstream network. The broker manager uses its client broker to communicate with a locally accessible client device, and uses its mediator broker (and, sometimes, an intermediate device(s)) to communicate with a locally accessible network device. The broker manager otherwise uses its messaging brokers to communicate with control channels of one or more networks. Once subscription with the network device has been established, any commands and responses between the client device and the network device may be routed over pub/sub channels via the broker managers and their brokers using name-based routing, without routing based on IP address of the network device.Type: ApplicationFiled: July 12, 2024Publication date: November 7, 2024Applicant: Level 3 Communications, LLCInventors: David Sutton, Steve Toms, Shelley Goldner, Shelli L. Hurd