Patents Assigned to Level 3 Communications, LLC
-
Patent number: 12224915Abstract: Examples of the present disclosure relate to an AI-supported CDN. In examples, a data processing engine processes log data of a CDN node according to a model to identify an issue. An issue indication is provided to a solution generation engine, which generates a set of solutions to automatically resolve the issue. The set of solutions is provided to a solution implementation engine, which iteratively implements solutions to resolve the issue using solution implementation information associated with a given solution. Thus, the data processing engine need not have knowledge regarding the specific hardware and/or software used within the CDN. Similarly, the solution generation engine need not have knowledge of the structure of the CDN and/or configuration of devices associated with the identified issue, such that the solution implementation engine provides a layer of abstraction between a solution and the implementation-specific details used to implement the solution within the CDN.Type: GrantFiled: September 17, 2021Date of Patent: February 11, 2025Assignee: Level 3 Communications, LLCInventors: Steven M. Casey, William R. Henning, Stephen Opferman, Todd A Borchert, Rahul Chowdhury
-
Patent number: 12224911Abstract: This disclosure describes systems, methods, and devices related to automating and testing communication network topologies.Type: GrantFiled: August 24, 2023Date of Patent: February 11, 2025Assignee: Level 3 Communications, LLCInventors: Bryan Dreyer, Jason Nault, William Roemhild, Brent Smith
-
Patent number: 12224980Abstract: Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet.Type: GrantFiled: June 27, 2024Date of Patent: February 11, 2025Assignee: Level 3 Communications, LLCInventors: Jin-Gen Wang, Travis D. Ewert
-
Publication number: 20250047595Abstract: Novel tools and techniques are provided for implementing name-based routing through networks. In various embodiments, a broker manager in each of a plurality of networks may receive a subscription request for a network device from a client device, each device being locally accessible or disposed in an upstream or downstream network. The broker manager uses its client broker to communicate with a locally accessible client device, and uses its mediator broker (and, sometimes, an intermediate device(s)) to communicate with a locally accessible network device. The broker manager otherwise uses its messaging brokers to communicate with control channels of one or more networks. Once subscription with the network device has been established, any commands and responses between the client device and the network device may be routed over pub/sub channels via the broker managers and their brokers using name-based routing, without routing based on IP address of the network device.Type: ApplicationFiled: October 23, 2024Publication date: February 6, 2025Applicant: Level 3 Communications, LLCInventors: David Sutton, Steve Toms, Shelley Goldner, Shelli L. Hurd
-
Publication number: 20250047751Abstract: Apparatuses and methods are disclosed for managing network connections. A computing device accesses a request to provision a network connection associated with a first device. The request includes a plurality of connection parameters defining desired specifications for a network connection from the first device to a second device. The connection parameters are validated against information from a database and other predetermined rules. A network connection path is generated to connect the first device with the second device. The network connection path is generated by selecting network elements for the network connection that satisfy the connection parameters. Configuration information for the network elements of the network connection path is aggregated for a configuration system. The configuration information is used to provision the network connection.Type: ApplicationFiled: October 23, 2024Publication date: February 6, 2025Applicant: Level 3 Communications, LLCInventors: Jin-Gen Wang, Michael Nyhus, Craig Tystad, James M. Adkins, III
-
Publication number: 20250047643Abstract: Aspects of the present disclosure involve systems, methods, for encoding a firewall ruleset into one or more bit arrays for fast determination of processing of a received communication packet by a firewall device associated with a network. Through this bitmap, a number of computation operations needed to determine a processing rule for a received packet is significantly reduced compared to the traditional approach of using a hash or a longest prefix match technique. Rather, determining a processing rule for a received packet may include determining a bit value within one or more arrays. In one implementation, a firewall rule may be encoded into a 64-bit array of bit values in which each bit of the array corresponds to a particular processing rule for a particular network address. The firewall rule may be encoded into a bitmap array of bit values by asserting a particular bit within the array.Type: ApplicationFiled: September 16, 2024Publication date: February 6, 2025Applicant: Level 3 Communications, LLCInventor: Robert Whelton
-
Patent number: 12218970Abstract: Novel tools and techniques are provided for implementing web-based monitoring and detection of fraudulent or unauthorized use of voice calling service. In various embodiments, a computing system might receive, from a user device associated with an originating party, a request to initiate a call session with a destination party, the request comprising user information associated with the originating party and a destination number associated with the destination party; might query a database with session data (including user information) to access permission data and configuration data; and might configure fraud logic using received configuration data from the database. The computing system might analyze the session data and permission data using the configured fraud logic to determine whether the originating party is permitted to establish the requested call session with the destination party; if so, might initiate one or more first actions; and, if not, might initiate one or more second actions.Type: GrantFiled: August 29, 2024Date of Patent: February 4, 2025Assignee: Level 3 Communications, LLCInventors: Andrew J. Broadworth, Matthew McCarthy
-
Publication number: 20250038848Abstract: In an alien wave system, one or more transponders connected to a line system may be owned and operated by a different entity from the entity that owns and operates the line system. In such a situation, diagnosing and correcting faults, and achieving good performance, may be challenging. As such, a system and methods for interoperability in an alien wave system are provided.Type: ApplicationFiled: October 16, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Paul M. Johnson, James E. Shearer
-
Publication number: 20250036189Abstract: Methods and systems for reducing energy consumption. A method may include aggregating, for a prior time period, prior usage data from a plurality of computing nodes. Based on the aggregated prior usage data from the plurality of computing nodes, a usage threshold for decreasing cooling system output for the plurality of computing nodes and a local-time threshold for decreasing the cooling system output for the plurality of computing nodes are determined. Current usage data for the plurality of computing nodes is then received. When the current usage data reaches the usage threshold and the local time is after the local-time threshold, output of the cooling systems of the plurality of computing nodes is decreased.Type: ApplicationFiled: October 14, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Matthew Flynn, Jason Huselton, Paul Brannigan
-
Publication number: 20250039305Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: ApplicationFiled: September 19, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Joseph A. Scivicque, Adam Uzelac
-
Publication number: 20250037138Abstract: Examples of the present disclosure relate to the optical identification of telecommunications equipment. In examples, a user interacts with an application to capture image data relating to a device according to instructions presented to the user. The application may further generate metadata, such as user responses to one or more questions. The image data and/or metadata are evaluated using a machine learning model to generate an equipment classification for devices pictured therein. The data may also be used to generate an equipment configuration for the device, as well as an operational state (e.g., based on one or more indicators present on the device, log data, etc.). Accordingly, such information may be used to update a pre-existing inventory record for the device, or generate a new inventory record. In other examples, such information is used to generate one or more predicted issues and associated actions to troubleshoot the device.Type: ApplicationFiled: October 15, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Jeffrey K. Storey, Clyde David Cooper, Carlos Santiago, Ron Lewis, Steven M. Casey, Stephen Opferman
-
Publication number: 20250039246Abstract: Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.Type: ApplicationFiled: September 19, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Adam Uzelac, Andrew J. Broadworth, Robert P. Slaughter
-
Publication number: 20250039965Abstract: Novel tools and techniques are provided for implementing wireless functionality, and, more particularly, to methods, systems, and apparatuses for implementing faceplate-based wireless device functionality and wireless extension functionality. In various embodiments, one or more antennas, a power adapter, and at least one processor may be attached to an inner surface of a faceplate configured to be attached to a wall. The one or more antennas may be electrically coupled to the power adapter and communicatively coupled to the at least one processor. Alternatively, a wireless functionality device might include one or more antennas, a power adapter, and at least one processor. The wireless functionality device may be attached to an inner surface of a faceplate configured to be attached to a wall. The one or more antennas of the wireless functionality device may be electrically coupled to the power adapter and communicatively coupled to the at least one processor.Type: ApplicationFiled: October 14, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Luree Melvin, Gregory Wallace
-
Patent number: 12212971Abstract: The present disclosure describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed. Determining the attestation level comprises comparing information associated with the communication with stored information and assigning a code based on the comparison. The code may be translated to a tag value that is used to direct the communication to a signing server for attesting the communication at the determined attestation level.Type: GrantFiled: September 30, 2022Date of Patent: January 28, 2025Assignee: Level 3 Communications, LLCInventors: Richard D. Moore, Daniel W. Peele, Matthew C. Hess
-
Publication number: 20250028587Abstract: Novel tools and techniques are provided for implementing real-time fault management or real-time fault management system (“RFM”). In various embodiments, RFM may receive alerts from or associated with network devices (e.g., layer 2, 3, and/or 4 devices, or the like) that are disposed in a plurality of disparate networks that may utilize different alert management protocols and/or different fault management protocols. RFM may collect, enrich, normalize, aggregate, and display the alerts in a user interface to facilitate addressing of the alerts by a user. To enable continuous and real-time functionality, RFM may be implemented in a plurality of siloed platforms in a primary data center, with processing of alerts being load balanced across the siloed platforms, with mirrored group of siloed platforms in a secondary data center located geographically distant from the primary data center and configured to be on “hot standby” and to completely take over RFM processing operations.Type: ApplicationFiled: October 9, 2024Publication date: January 23, 2025Applicant: Level 3 Communications, LLCInventors: Steve Toms, Michael McClintock, David Sutton, Steven Burrell, Shelley Goldner, Shelli L. Hurd
-
Publication number: 20250030639Abstract: A quality of service management system includes a rules engine that receives information associated with a communication path having an assigned quality of service (QoS) to be provided for a customer communication device, and identifies one or more network elements assigned to provide the communication path. Each network element having a plurality of queues configured to provide varying QoS levels relative to one another. For each of the network elements, the rules engine determines at least one queue that is configured to provide the communication path at the assigned quality of service, and transmits queue information associated with the determined queue to its respective network element, the network element conveying the communication path through the determined queue.Type: ApplicationFiled: October 3, 2024Publication date: January 23, 2025Applicant: Level 3 Communications, LLCInventors: Marcus Hadavi, James Ryan
-
Publication number: 20250028588Abstract: Novel tools and techniques are provided for implementing intelligent alert automation (“IAA”). In various embodiments, IAA receives alert/event feeds from several different alerting and ticketing systems via input Redis queues, and uses a triage system to determine whether to process the alert/event or disregard it. If so, IAA may create a flow instance, assign a unique instance ID, and place the flow instance in one of a plurality of jobs queues based on alert/event type and/or or source. An abattoir system retrieves a flow instance from one of the jobs queues (in order of the queue's priority), and processes the next node or step in the flow instance. The flow instance is placed back into the jobs queue for subsequent processing by the same or different abattoir system until no additional nodes or steps remain in the flow, at which point the flow instance is considered complete.Type: ApplicationFiled: October 9, 2024Publication date: January 23, 2025Applicant: Level 3 Communications, LLCInventors: Kevin Schneider, Angela A. Rash, Troy G. Pohl, Steven Burrell, Matthew D. Schoenfeldt, Shelli L. Hurd
-
Publication number: 20250030775Abstract: This disclosure describes systems, methods, and devices related to determining persistent service paths between provider edge devices and customer edge devices. A device may identify a service identifier associated with a service provided by a communication network; identify, based on the service identifier and traffic data of the communication network, one or more first adjacencies between provider edge devices, of the communication network, using a service indicated by the service identifier; identify, based on the service identifier and traffic data of the communication network, one or more second adjacencies between the provider edge devices and customer edge devices using the service; and map, based on the one or more first adjacencies and the one or more second adjacencies, a persistent service path between a customer edge device of the customer edge devices and a provider edge device of the provider edge devices.Type: ApplicationFiled: July 12, 2024Publication date: January 23, 2025Applicant: Level 3 Communications, LLCInventors: Steve WAKUMOTO, Dayne ALLEN, Zhuo JING, Efren MALDONADO, Hoang TRAN, Brian SANNIOLA
-
Publication number: 20250013520Abstract: Novel tools and techniques are provided for implementing dashboard for alert storage and history (“DASH”). In various embodiments, DASH provides for consolidated tracking and monitoring of two or more of current (or active) alerts, cleared alerts, and/or transactional information for alerts that are stored within corresponding alert live database that mirrors current alert instance data in a real-time fault management system, alert history database that contains a snapshot of an alert history of each alert or corresponding network device, and/or alert log database that contains a full transaction record of every copy of an alert either over a first duration or having a total data size within a first total data size. DASH also cleans received alert data and/or enriches the alert data, and provides a user interface (“UI”) that enables a user to view, absorb, filter, manage, and/or organize alert data to facilitate addressing of alerts in the network(s).Type: ApplicationFiled: September 16, 2024Publication date: January 9, 2025Applicant: Level 3 Communications, LLCInventors: Matthew D. Schoenfeldt, Steven Burrell, Angela A. Rash, Shelley Goldner, Shelli L. Hurd
-
Publication number: 20250016587Abstract: Implementations described and claimed herein provide systems and methods for intelligent node type selection in a telecommunications network. In one implementation, a customer set is obtained for a communications node in the telecommunications network. The customer set includes an existing customer set and a new customer set. A set of customer events is generated for a node type of the communications node using a simulator. The set of customer events is generated by simulating the customer set over time through a discrete event simulation. An impact of the customer events is modeled for the node type of the communications node. The node type is identified from a plurality of node types for a telecommunications build based on the impact of the customer events for the node type.Type: ApplicationFiled: September 9, 2024Publication date: January 9, 2025Applicant: Level 3 Communications, LLCInventors: William Gray, James Sayre, Stephen Limburg