Patents Assigned to Level (3) Communications
-
Publication number: 20250039305Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: ApplicationFiled: September 19, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Joseph A. Scivicque, Adam Uzelac
-
Publication number: 20250039965Abstract: Novel tools and techniques are provided for implementing wireless functionality, and, more particularly, to methods, systems, and apparatuses for implementing faceplate-based wireless device functionality and wireless extension functionality. In various embodiments, one or more antennas, a power adapter, and at least one processor may be attached to an inner surface of a faceplate configured to be attached to a wall. The one or more antennas may be electrically coupled to the power adapter and communicatively coupled to the at least one processor. Alternatively, a wireless functionality device might include one or more antennas, a power adapter, and at least one processor. The wireless functionality device may be attached to an inner surface of a faceplate configured to be attached to a wall. The one or more antennas of the wireless functionality device may be electrically coupled to the power adapter and communicatively coupled to the at least one processor.Type: ApplicationFiled: October 14, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Luree Melvin, Gregory Wallace
-
Publication number: 20250037138Abstract: Examples of the present disclosure relate to the optical identification of telecommunications equipment. In examples, a user interacts with an application to capture image data relating to a device according to instructions presented to the user. The application may further generate metadata, such as user responses to one or more questions. The image data and/or metadata are evaluated using a machine learning model to generate an equipment classification for devices pictured therein. The data may also be used to generate an equipment configuration for the device, as well as an operational state (e.g., based on one or more indicators present on the device, log data, etc.). Accordingly, such information may be used to update a pre-existing inventory record for the device, or generate a new inventory record. In other examples, such information is used to generate one or more predicted issues and associated actions to troubleshoot the device.Type: ApplicationFiled: October 15, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Jeffrey K. Storey, Clyde David Cooper, Carlos Santiago, Ron Lewis, Steven M. Casey, Stephen Opferman
-
Patent number: 12212971Abstract: The present disclosure describes providing an attestation level to a received communication. The attestation level may be used to communicate a level of security to a network or a called party that receives the communication. The attestation level associated with the communication may indicate to a destination network and/or recipient that the phone number associated with the communication is secure and/or the telephone number has not been spoofed. Determining the attestation level comprises comparing information associated with the communication with stored information and assigning a code based on the comparison. The code may be translated to a tag value that is used to direct the communication to a signing server for attesting the communication at the determined attestation level.Type: GrantFiled: September 30, 2022Date of Patent: January 28, 2025Assignee: Level 3 Communications, LLCInventors: Richard D. Moore, Daniel W. Peele, Matthew C. Hess
-
Publication number: 20250028587Abstract: Novel tools and techniques are provided for implementing real-time fault management or real-time fault management system (“RFM”). In various embodiments, RFM may receive alerts from or associated with network devices (e.g., layer 2, 3, and/or 4 devices, or the like) that are disposed in a plurality of disparate networks that may utilize different alert management protocols and/or different fault management protocols. RFM may collect, enrich, normalize, aggregate, and display the alerts in a user interface to facilitate addressing of the alerts by a user. To enable continuous and real-time functionality, RFM may be implemented in a plurality of siloed platforms in a primary data center, with processing of alerts being load balanced across the siloed platforms, with mirrored group of siloed platforms in a secondary data center located geographically distant from the primary data center and configured to be on “hot standby” and to completely take over RFM processing operations.Type: ApplicationFiled: October 9, 2024Publication date: January 23, 2025Applicant: Level 3 Communications, LLCInventors: Steve Toms, Michael McClintock, David Sutton, Steven Burrell, Shelley Goldner, Shelli L. Hurd
-
Publication number: 20250028588Abstract: Novel tools and techniques are provided for implementing intelligent alert automation (“IAA”). In various embodiments, IAA receives alert/event feeds from several different alerting and ticketing systems via input Redis queues, and uses a triage system to determine whether to process the alert/event or disregard it. If so, IAA may create a flow instance, assign a unique instance ID, and place the flow instance in one of a plurality of jobs queues based on alert/event type and/or or source. An abattoir system retrieves a flow instance from one of the jobs queues (in order of the queue's priority), and processes the next node or step in the flow instance. The flow instance is placed back into the jobs queue for subsequent processing by the same or different abattoir system until no additional nodes or steps remain in the flow, at which point the flow instance is considered complete.Type: ApplicationFiled: October 9, 2024Publication date: January 23, 2025Applicant: Level 3 Communications, LLCInventors: Kevin Schneider, Angela A. Rash, Troy G. Pohl, Steven Burrell, Matthew D. Schoenfeldt, Shelli L. Hurd
-
Publication number: 20250030639Abstract: A quality of service management system includes a rules engine that receives information associated with a communication path having an assigned quality of service (QoS) to be provided for a customer communication device, and identifies one or more network elements assigned to provide the communication path. Each network element having a plurality of queues configured to provide varying QoS levels relative to one another. For each of the network elements, the rules engine determines at least one queue that is configured to provide the communication path at the assigned quality of service, and transmits queue information associated with the determined queue to its respective network element, the network element conveying the communication path through the determined queue.Type: ApplicationFiled: October 3, 2024Publication date: January 23, 2025Applicant: Level 3 Communications, LLCInventors: Marcus Hadavi, James Ryan
-
Publication number: 20250030775Abstract: This disclosure describes systems, methods, and devices related to determining persistent service paths between provider edge devices and customer edge devices. A device may identify a service identifier associated with a service provided by a communication network; identify, based on the service identifier and traffic data of the communication network, one or more first adjacencies between provider edge devices, of the communication network, using a service indicated by the service identifier; identify, based on the service identifier and traffic data of the communication network, one or more second adjacencies between the provider edge devices and customer edge devices using the service; and map, based on the one or more first adjacencies and the one or more second adjacencies, a persistent service path between a customer edge device of the customer edge devices and a provider edge device of the provider edge devices.Type: ApplicationFiled: July 12, 2024Publication date: January 23, 2025Applicant: Level 3 Communications, LLCInventors: Steve WAKUMOTO, Dayne ALLEN, Zhuo JING, Efren MALDONADO, Hoang TRAN, Brian SANNIOLA
-
Publication number: 20250016587Abstract: Implementations described and claimed herein provide systems and methods for intelligent node type selection in a telecommunications network. In one implementation, a customer set is obtained for a communications node in the telecommunications network. The customer set includes an existing customer set and a new customer set. A set of customer events is generated for a node type of the communications node using a simulator. The set of customer events is generated by simulating the customer set over time through a discrete event simulation. An impact of the customer events is modeled for the node type of the communications node. The node type is identified from a plurality of node types for a telecommunications build based on the impact of the customer events for the node type.Type: ApplicationFiled: September 9, 2024Publication date: January 9, 2025Applicant: Level 3 Communications, LLCInventors: William Gray, James Sayre, Stephen Limburg
-
Publication number: 20250016060Abstract: This disclosure describes systems, methods, and devices related to software-defined wide area network (SD-WAN) overlays for evaluating services provided by a communications network. A device may identify a SD-WAN overlaying a virtual private network (VPN) of a communications network, the VPN including multiprotocol label switching (MPLS) and the Internet, the MPLS and the Internet associated with connecting a one or devices to a datacenter; retrieve, using an application programming interface (API), analytical data from the SD-WAN; identify devices and interfaces of the SD-WAN; receive performance metrics of the devices and interfaces; detect, based on comparisons of the performance metrics to event criteria, an occurrence of an event in the VPN; and present, based on the occurrence of the event, of a notification of the event to a customer of the VPN.Type: ApplicationFiled: July 2, 2024Publication date: January 9, 2025Applicant: Level 3 Communications, LLCInventors: Durwankur DAMLE, Shelli HURD, Suren RODRIGUES, Steve WAKUMOTO, Rabih NAHAS, Dayne ALLEN, Justin LACOV
-
Publication number: 20250016042Abstract: This disclosure describes systems, methods, and devices related to performing event-driven diagnostics for a communications network. A device may identify a service identifier of a service provided by the communications network to a customer; identify, based on the service identifier, a persisted path for the service, the persisted path generated prior to any user request to perform a diagnostic on the service, and the persisted path including devices and interfaces used to provide the service; receive performance metrics of the devices and interfaces of the persisted path; detect, without receiving any user request to perform a diagnostic on the service, based on comparisons of the performance metrics to event criteria, an occurrence of an event in the persisted path; and present, based on the occurrence of the event, a notification of the event to the customer.Type: ApplicationFiled: July 2, 2024Publication date: January 9, 2025Applicant: Level 3 Communications, LLCInventors: Steve WAKUMOTO, Shelli HURD, Rabih NAHAS, Dayne ALLEN, Zhuo JING, Efren MALDONADO, Hoang TRAN, Brian SANNIOLA
-
Publication number: 20250013520Abstract: Novel tools and techniques are provided for implementing dashboard for alert storage and history (“DASH”). In various embodiments, DASH provides for consolidated tracking and monitoring of two or more of current (or active) alerts, cleared alerts, and/or transactional information for alerts that are stored within corresponding alert live database that mirrors current alert instance data in a real-time fault management system, alert history database that contains a snapshot of an alert history of each alert or corresponding network device, and/or alert log database that contains a full transaction record of every copy of an alert either over a first duration or having a total data size within a first total data size. DASH also cleans received alert data and/or enriches the alert data, and provides a user interface (“UI”) that enables a user to view, absorb, filter, manage, and/or organize alert data to facilitate addressing of alerts in the network(s).Type: ApplicationFiled: September 16, 2024Publication date: January 9, 2025Applicant: Level 3 Communications, LLCInventors: Matthew D. Schoenfeldt, Steven Burrell, Angela A. Rash, Shelley Goldner, Shelli L. Hurd
-
Publication number: 20250016086Abstract: This disclosure describes systems, methods, and devices related to automated Ethernet testing for a communications network. A device may identify a service identifier of a service provided by the communications network to a customer; identify, based on the service identifier, a circuit comprising devices and interfaces used to provide the service; determine that the devices include a first device including an Ethernet transport line; present an Ethernet test panel showing an indication of the first device; receive, from the Ethernet test panel, a user request from a customer of the circuit to test the circuit; initiate a live Ethernet diagnostic on the circuit in response to the user request; receive, based on the live Ethernet diagnostic, performance metrics of the circuit; detect an occurrence of an event in the circuit; and present, based on the occurrence of the event, a notification of the event to the customer.Type: ApplicationFiled: July 2, 2024Publication date: January 9, 2025Applicant: Level 3 Communications, LLCInventors: Durwankur DAMLE, Shelli HURD, Suren RODRIGUES, Rabih NAHAS, Dayne ALLEN, Zhuo JING, Brian SANNIOLA, Jun CHA
-
Patent number: 12192055Abstract: Implementations described and claimed herein provide systems and methods for custom-defined network routing. In one implementation, a set of custom defined network flow rules is received at an edge router of a primary network, which is in communication with a customer network. The set of custom defined network flow rules correspond to network traffic associated with the customer network. The set of custom defined network flow rules is stored in a forwarding table on the edge router. A packet of data is received at the edge router. The packet of data is attributed to the customer network. The set of custom defined network flow rules is applied to the pack of data using the forwarding table.Type: GrantFiled: January 4, 2024Date of Patent: January 7, 2025Assignee: Level 3 Communications, LLCInventor: Eric Osborne
-
Patent number: 12192231Abstract: Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network.Type: GrantFiled: December 21, 2023Date of Patent: January 7, 2025Assignee: Level 3 Communications, LLCInventors: Robert Smith, Shawn Marck
-
Publication number: 20240430366Abstract: Aspects of the present disclosure involve systems, methods, computer program products for consolidating toll-free and/or tolled features of two or more telecommunications networks. The networks may be consolidated via an Enhanced Feature Server (EFS) deployed in a telecommunications network. The EFS may be configured to receive a toll-free and/or tolled communication and route the communication based on the dialed toll-free number and a carrier identification code (CIC) associated with the communication, or based on the dialing number and a CIC. Routing the communication based at least on the CIC associated with the communication allows the telecommunications network to consolidate a redundant network from the telecommunications network. In circumstances where a CIC is not associated with a communication, the EFS may request a data schema from a toll-free database, or from an automatic number identification (ANI) database, and determine a CIC based on an analysis of the data schema.Type: ApplicationFiled: June 7, 2024Publication date: December 26, 2024Applicant: Level 3 Communications, LLCInventor: David A. Tschirhart
-
Patent number: 12177098Abstract: A data network analysis system includes a computer-executable set of instructions that obtain service account information associated with a route provided to a customer through a data communication network having network elements. Using the service account information, the instructions identify a termination port that terminates the route to a customer premises equipment of the customer, and at least one target port of the route and those network elements that are assigned to convey the route through one or more of the network elements. The instructions then obtain the routing information for the route from each of the network elements that are assigned to convey the route.Type: GrantFiled: December 14, 2023Date of Patent: December 24, 2024Assignee: Level 3 Communications, LLCInventors: Steve R. Wakumoto, Andrew S. Gerber, John D. Clouatre
-
Publication number: 20240422122Abstract: The present application describes a system and method for passively collecting DNS traffic data as that data is passed between a recursive DNS resolver and an authoritative DNS server. The information contained in the collected DNS traffic data is used to generate a virtual authoritative DNS server, or a zone associated with the authoritative DNS server, when it is determined that the authoritative DNS server has been compromised.Type: ApplicationFiled: August 29, 2024Publication date: December 19, 2024Applicant: Level 3 Communications, LLCInventors: John R. Woodworth, Dean Ballew, Mark Dehus
-
Publication number: 20240422193Abstract: Novel tools and techniques are provided for implementing web-based monitoring and detection of fraudulent or unauthorized use of voice calling service. In various embodiments, a computing system might receive, from a user device associated with an originating party, a request to initiate a call session with a destination party, the request comprising user information associated with the originating party and a destination number associated with the destination party; might query a database with session data (including user information) to access permission data and configuration data; and might configure fraud logic using received configuration data from the database. The computing system might analyze the session data and permission data using the configured fraud logic to determine whether the originating party is permitted to establish the requested call session with the destination party; if so, might initiate one or more first actions; and, if not, might initiate one or more second actions.Type: ApplicationFiled: August 29, 2024Publication date: December 19, 2024Applicant: Level 3 Communications, LLCInventors: Andrew J. Broadworth, Matthew McCarthy
-
Publication number: 20240422179Abstract: Apparatus, systems, methods, and the like, for autonomous scaling of security and other network services through initialization of a service from a network service device and/or migration of such services from one service device to another is provided. Such network scaling may allow for migration of services from existing service edges to other service edges. A security management system may coordinate the migration of services provided to a secondary network from one or more service edges to another, separate service edge while providing session synchronization during the migration. To migrate the services from the first service edge to a second service edge, a session table may be shared between the service edges and the first and second service edges may advertise service routes or endpoints with one or more priority values to control or otherwise determine which service edge is selected by a service-receiving device to receive the services.Type: ApplicationFiled: August 29, 2024Publication date: December 19, 2024Applicant: Level 3 Communications, LLCInventor: Bobby W. Metz