Patents Assigned to Level 3 Communications, LLC
-
Publication number: 20240356894Abstract: Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet.Type: ApplicationFiled: June 27, 2024Publication date: October 24, 2024Applicant: Level 3 Communications, LLCInventors: Jin-Gen Wang, Travis D. Ewert
-
Publication number: 20240356896Abstract: Examples of the present disclosure describe systems and methods for providing enhanced security in edge computing environments. A first aspect describes a method for moving security features dynamically applied to an application at a first deployment location to an application at a second deployment location. A second aspect describes a method for locally expanding/contracting an instance of a deployed application. A third aspect describes a method for redirected network traffic associated with detected malicious conduct from a first application deployment environment to a secured second application deployment environment. A fourth aspect describes a method for performing multi-stage network traffic filtering.Type: ApplicationFiled: June 26, 2024Publication date: October 24, 2024Applicant: Level 3 Communications, LLCInventors: Christopher Smith, Michael Benjamin, Peter Brecl
-
Patent number: 12124316Abstract: Methods and systems for reducing energy consumption. A method may include aggregating, for a prior time period, prior usage data from a plurality of computing nodes. Based on the aggregated prior usage data from the plurality of computing nodes, a usage threshold for decreasing cooling system output for the plurality of computing nodes and a local-time threshold for decreasing the cooling system output for the plurality of computing nodes are determined. Current usage data for the plurality of computing nodes is then received. When the current usage data reaches the usage threshold and the local time is after the local-time threshold, output of the cooling systems of the plurality of computing nodes is decreased.Type: GrantFiled: September 1, 2023Date of Patent: October 22, 2024Assignee: Level 3 Communications, LLCInventors: Matthew Flynn, Jason Huselton, Paul Brannigan
-
Patent number: 12126376Abstract: In an alien wave system, one or more transponders connected to a line system may be owned and operated by a different entity from the entity that owns and operates the line system. In such a situation, diagnosing and correcting faults, and achieving good performance, may be challenging. As such, a system and methods for interoperability in an alien wave system are provided.Type: GrantFiled: March 24, 2022Date of Patent: October 22, 2024Assignee: Level 3 Communications, LLCInventors: Paul M. Johnson, James E. Shearer
-
Patent number: 12125046Abstract: Examples of the present disclosure relate to the optical identification of telecommunications equipment. In examples, a user interacts with an application to capture image data relating to a device according to instructions presented to the user. The application may further generate metadata, such as user responses to one or more questions. The image data and/or metadata are evaluated using a machine learning model to generate an equipment classification for devices pictured therein. The data may also be used to generate an equipment configuration for the device, as well as an operational state (e.g., based on one or more indicators present on the device, log data, etc.). Accordingly, such information may be used to update a pre-existing inventory record for the device, or generate a new inventory record. In other examples, such information is used to generate one or more predicted issues and associated actions to troubleshoot the device.Type: GrantFiled: October 20, 2023Date of Patent: October 22, 2024Assignee: Level 3 Communications, LLCInventors: Jeffrey K. Storey, Clyde David Cooper, Carlos Santiago, Ron Lewis, Steven M. Casey, Stephen Opferman
-
Patent number: 12126501Abstract: An optical network including a plurality of gateway nodes interconnected with a plurality of intermediate nodes with segments of fiber. The network includes a plurality of devices, such as reconfigurable optical add drop multiplexers, optimally placed at various nodes throughout the network. The device placement is optimized with an integer linear programming analysis considering span definition such that any given span involves some number of segments not exceeding a number of segments that would require wavelength regeneration, cost of placement of a device at a given node, cost of wavelength regeneration, and various parameters and constraints.Type: GrantFiled: April 21, 2023Date of Patent: October 22, 2024Assignee: Level 3 Communications, LLCInventors: Benjamin K. Peterson, Laurel Clark
-
Publication number: 20240348525Abstract: Automatic testing/analysis of local loops of telecommunications networks includes obtaining bits-per-tone data for a local loop of a telecommunications network and generating a bit value string from the bits-per-tone data. The bit value string is then analyzed to determine whether it includes a bit pattern indicative of an impairment of the local loop. Further approaches for automatically testing local loops of telecommunications networks include obtaining attenuation data for multiple tones carried by the local loop and determining whether the attenuation data falls below thresholds for providing a service using the local loop.Type: ApplicationFiled: June 22, 2024Publication date: October 17, 2024Applicant: Level 3 Communications, LLCInventors: Thomas C. Woldahl, Leigh A. Benson
-
Publication number: 20240349061Abstract: A security platform of a data network is provided that includes security services for computing devices in communication with the data network. The security platform may apply a security policy to the computing devices when accessing the Internet via a home network (or other customer network) and when accessing the Internet via a public or third party network. To provide security services to computing devices via the home network, the security platform may communicate with a security agent application executed on the router (or other gateway device) of the home network. In addition, each of the devices identified by the security profile for the home network may be instructed or otherwise be provided a security agent application for execution on the computing devices. The security agent application may communicate with the security platform when the computing device connects to the Internet over a third party or public access point.Type: ApplicationFiled: June 22, 2024Publication date: October 17, 2024Applicant: Level 3 Communications, LLCInventors: Mayur Kudtarkar, Kirsten Jensen Coppo
-
Publication number: 20240348528Abstract: A traffic controller device for distributing or otherwise controlling the distribution of routing information may be included in a telecommunications network. The traffic controller may receive routing tables from a plurality of network devices, such as one or more provider edge devices of the network. The traffic controller, upon receiving the routing information from the provider edge devices, may generate a routing table associated with each device providing the routing information. The traffic controller may also provide updates to one or more of the networking devices associated with the controller. The traffic controller may alter or update, at the traffic controller, the routing table associated with the target provider edge device based on the network policy. The routing information in the routing table for that device and maintained by the traffic controller may be updated with a new route or new local preferred parameter value.Type: ApplicationFiled: June 27, 2024Publication date: October 17, 2024Applicant: Level 3 Communications, LLCInventor: Logan Rawlins
-
Patent number: 12117888Abstract: Novel tools and techniques are provided for implementing intelligent alert automation (“IAA”). In various embodiments, IAA receives alert/event feeds from several different alerting and ticketing systems via input Redis queues, and uses a triage system to determine whether to process the alert/event or disregard it. If so, IAA may create a flow instance, assign a unique instance ID, and place the flow instance in one of a plurality of jobs queues based on alert/event type and/or or source. An abattoir system retrieves a flow instance from one of the jobs queues (in order of the queue's priority), and processes the next node or step in the flow instance. The flow instance is placed back into the jobs queue for subsequent processing by the same or different abattoir system until no additional nodes or steps remain in the flow, at which point the flow instance is considered complete.Type: GrantFiled: October 7, 2022Date of Patent: October 15, 2024Assignee: Level 3 Communications, LLCInventors: Kevin Schneider, Angela A. Rash, Troy G. Pohl, Steven Burrell, Matthew D. Schoenfeldt, Shelli L. Hurd
-
Patent number: 12117889Abstract: Novel tools and techniques are provided for implementing real-time fault management or real-time fault management system (“RFM”). In various embodiments, RFM may receive alerts from or associated with network devices (e.g., layer 2, 3, and/or 4 devices, or the like) that are disposed in a plurality of disparate networks that may utilize different alert management protocols and/or different fault management protocols. RFM may collect, enrich, normalize, aggregate, and display the alerts in a user interface to facilitate addressing of the alerts by a user. To enable continuous and real-time functionality, RFM may be implemented in a plurality of siloed platforms in a primary data center, with processing of alerts being load balanced across the siloed platforms, with mirrored group of siloed platforms in a secondary data center located geographically distant from the primary data center and configured to be on “hot standby” and to completely take over RFM processing operations.Type: GrantFiled: November 15, 2022Date of Patent: October 15, 2024Assignee: Level 3 Communications, LLCInventors: Steve Toms, Michael McClintock, David Sutton, Steven Burrell, Shelley Goldner, Shelli L Hurd
-
Publication number: 20240340307Abstract: In a network system in which a server receives packets each including a source address, and in which the server ordinarily responds to each packet, Distributed Denial of Service attacks may be launched by malicious actors controlling a plurality of network devices. In such an attack, the attacking devices may spoof the IP address of a legitimate device, e.g., they may include, in each packet, the source address of the legitimate device. As such, systems and methods for increased security using client address manipulation are provided.Type: ApplicationFiled: April 8, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventors: John R.B. Woodworth, Dean Ballew, Lisa Lamanna, James C. Anders, Dan Luther, Carol D. Lovell
-
Publication number: 20240340318Abstract: Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.Type: ApplicationFiled: June 13, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventors: David Dubois, Michael Benjamin, Mark Dehus, Peter Brecl
-
Publication number: 20240340218Abstract: Examples of the present disclosure describe systems and methods relating to adaptive virtual services. In an example, a user specifies a device configuration for a platform device. As a result, a service provider installs selected virtual-network functions and defines network connections as specified by the device configuration. Management software may also be installed, thereby enabling the service provider to communicate with and remotely manage the platform device. The installed virtual-network functions are activated on the platform device once it is delivered to the user. In some instances, the user changes the device configuration. For example, the user may install new virtual-network functions, reconfigure or remove existing virtual-network functions, or change defined network connections. As a result, the service provider reconfigures the platform device accordingly. Thus, the user need not purchase new specialized hardware in order to change the available functions of the computer network.Type: ApplicationFiled: June 20, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventors: Adam Saenger, Matthew Holway, Len Brannen, Gene Clark, Anil Simlot, Zubin Ingah, Johan J. Shane, Michael Gibson, Cory Sawyer, Rich Cerami, Kurt Deshazer
-
Publication number: 20240340268Abstract: Systems and methods for implementing filters within computer networks include obtaining blocklist data that includes blocklist entries for a network. Each of the blocklist entries includes one or more network traffic attributes for identifying traffic to be blocked. In response to receiving the blocklist data, a filter based on a common network traffic attribute shared between at least two of the plurality of blocklist entries is generated. The filter is then deployed to a network device within the network such that the filter may be implemented at the network device to block corresponding traffic.Type: ApplicationFiled: June 20, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventor: Michael Benjamin
-
Publication number: 20240333720Abstract: Systems and methods for conference security based on user groups are disclosed. In examples, a set of attendees (e.g., in a collaboration group) may be allowed access to a meeting by a host user with a specified access permission. The collaboration group may be in the network hosting the meeting or outside of the network. An attendee requesting access to the meeting may be verified based on the attendee's identity and membership status of the collaboration group. If an attendee's identity is not identified or if the attendee is not a member of the collaboration group, the requesting attendee may be denied access to the meeting. If the requesting attendee's identity is verified and the attendee is a member of the collaboration group, the attendee is allowed access to the meeting with their specified access permission.Type: ApplicationFiled: June 13, 2024Publication date: October 3, 2024Applicant: Level 3 Communications, LLCInventor: Andrew J. Broadworth
-
Publication number: 20240333833Abstract: Automatic testing/analysis of local loops of telecommunications networks includes obtaining bits-per-tone data for a local loop of a telecommunications network and generating a bit value string from the bits-per-tone data. The bit value string is then analyzed to determine whether it includes a bit pattern indicative of an impairment of the local loop. Further approaches for automatically testing local loops of telecommunications networks include obtaining attenuation data for multiple tones carried by the local loop and determining whether the attenuation data falls below thresholds for providing a service using the local loop.Type: ApplicationFiled: June 7, 2024Publication date: October 3, 2024Applicant: Level 3 Communications, LLCInventors: Thomas C. Woldahl, Erik V. Helrich, Michael J. Durkin, Larry J. North, Abid Khan
-
Publication number: 20240323051Abstract: Aspects of the disclosure involve systems and methods for utilizing Virtual Local Area Network separation in a connection, which may be a single connection, between a customer to a telecommunications network and a cloud environment to allow the customer to access multiple instances within the cloud through the connection. A customer may purchase multiple cloud resource instances from a public cloud environment and, utilizing the telecommunications network, connect to the multiple instances through a communication port or connection to the cloud environment. To utilize the single connection or port, communication packets intended for the cloud environment may be tagged with a VLAN tag that indicates to which cloud instance the packet is intended. The telecommunications network may route the packet to the intended cloud environment and configure one or more aspects of the cloud environment to analyze the attached VLAN tag to transmit the packet to the intended instance.Type: ApplicationFiled: June 7, 2024Publication date: September 26, 2024Applicant: Level 3 Communications, LLCInventor: Austin D. Ritchie
-
Patent number: 12101443Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: GrantFiled: September 8, 2023Date of Patent: September 24, 2024Assignee: Level 3 Communications, LLCInventors: Joseph A. Scivicque, Adam Uzelac
-
Patent number: 12101358Abstract: Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.Type: GrantFiled: June 29, 2023Date of Patent: September 24, 2024Assignee: Level 3 Communications, LLCInventors: Adam Uzelac, Andrew J. Broadworth, Robert P. Slaughter