Patents Assigned to Level (3) Communications
-
Publication number: 20240356922Abstract: Novel tools and techniques are provided for implementing network service ordering and provisioning of secure access service edge (“SASE”) scriptlets for providing SASE-based network. In various embodiments, a computing system may provide a user experience (“UX”) platform for a customer portal, the UX platform being accessible by a user via a user device over a first network(s); may provide, via the UX platform, options to configure, via the customer portal, one or more SASE scriptlets for providing SASE-based network services provided by a service provider; and may autonomously orchestrate deployment and configuration of the one or more SASE scriptlets on one or more network devices that are associated with the user or to an entity with which the user is associated, over a second network(s), based at least in part on user selection of options to configure the one or more SASE scriptlets and/or the corresponding SASE-based network services.Type: ApplicationFiled: April 4, 2024Publication date: October 24, 2024Applicant: Level 3 Communications, LLCInventors: Mark Alan RAMACH, Gurpreet S. SIDHU, Priyadarshini DANDE, Michael F. ROBLES
-
Publication number: 20240356896Abstract: Examples of the present disclosure describe systems and methods for providing enhanced security in edge computing environments. A first aspect describes a method for moving security features dynamically applied to an application at a first deployment location to an application at a second deployment location. A second aspect describes a method for locally expanding/contracting an instance of a deployed application. A third aspect describes a method for redirected network traffic associated with detected malicious conduct from a first application deployment environment to a secured second application deployment environment. A fourth aspect describes a method for performing multi-stage network traffic filtering.Type: ApplicationFiled: June 26, 2024Publication date: October 24, 2024Applicant: Level 3 Communications, LLCInventors: Christopher Smith, Michael Benjamin, Peter Brecl
-
Patent number: 12126501Abstract: An optical network including a plurality of gateway nodes interconnected with a plurality of intermediate nodes with segments of fiber. The network includes a plurality of devices, such as reconfigurable optical add drop multiplexers, optimally placed at various nodes throughout the network. The device placement is optimized with an integer linear programming analysis considering span definition such that any given span involves some number of segments not exceeding a number of segments that would require wavelength regeneration, cost of placement of a device at a given node, cost of wavelength regeneration, and various parameters and constraints.Type: GrantFiled: April 21, 2023Date of Patent: October 22, 2024Assignee: Level 3 Communications, LLCInventors: Benjamin K. Peterson, Laurel Clark
-
Patent number: 12127279Abstract: Novel tools and techniques are provided for implementing wireless functionality, and, more particularly, to methods, systems, and apparatuses for implementing faceplate-based wireless device functionality and wireless extension functionality. In various embodiments, one or more antennas, a power adapter, and at least one processor may be attached to an inner surface of a faceplate configured to be attached to a wall. The one or more antennas may be electrically coupled to the power adapter and communicatively coupled to the at least one processor. Alternatively, a wireless functionality device might include one or more antennas, a power adapter, and at least one processor. The wireless functionality device may be attached to an inner surface of a faceplate configured to be attached to a wall. The one or more antennas of the wireless functionality device may be electrically coupled to the power adapter and communicatively coupled to the at least one processor.Type: GrantFiled: August 24, 2023Date of Patent: October 22, 2024Assignee: Level 3 CommunicationsInventors: Luree Melvin, Gregory Wallace
-
Patent number: 12125046Abstract: Examples of the present disclosure relate to the optical identification of telecommunications equipment. In examples, a user interacts with an application to capture image data relating to a device according to instructions presented to the user. The application may further generate metadata, such as user responses to one or more questions. The image data and/or metadata are evaluated using a machine learning model to generate an equipment classification for devices pictured therein. The data may also be used to generate an equipment configuration for the device, as well as an operational state (e.g., based on one or more indicators present on the device, log data, etc.). Accordingly, such information may be used to update a pre-existing inventory record for the device, or generate a new inventory record. In other examples, such information is used to generate one or more predicted issues and associated actions to troubleshoot the device.Type: GrantFiled: October 20, 2023Date of Patent: October 22, 2024Assignee: Level 3 Communications, LLCInventors: Jeffrey K. Storey, Clyde David Cooper, Carlos Santiago, Ron Lewis, Steven M. Casey, Stephen Opferman
-
Patent number: 12124316Abstract: Methods and systems for reducing energy consumption. A method may include aggregating, for a prior time period, prior usage data from a plurality of computing nodes. Based on the aggregated prior usage data from the plurality of computing nodes, a usage threshold for decreasing cooling system output for the plurality of computing nodes and a local-time threshold for decreasing the cooling system output for the plurality of computing nodes are determined. Current usage data for the plurality of computing nodes is then received. When the current usage data reaches the usage threshold and the local time is after the local-time threshold, output of the cooling systems of the plurality of computing nodes is decreased.Type: GrantFiled: September 1, 2023Date of Patent: October 22, 2024Assignee: Level 3 Communications, LLCInventors: Matthew Flynn, Jason Huselton, Paul Brannigan
-
Patent number: 12126376Abstract: In an alien wave system, one or more transponders connected to a line system may be owned and operated by a different entity from the entity that owns and operates the line system. In such a situation, diagnosing and correcting faults, and achieving good performance, may be challenging. As such, a system and methods for interoperability in an alien wave system are provided.Type: GrantFiled: March 24, 2022Date of Patent: October 22, 2024Assignee: Level 3 Communications, LLCInventors: Paul M. Johnson, James E. Shearer
-
Publication number: 20240348528Abstract: A traffic controller device for distributing or otherwise controlling the distribution of routing information may be included in a telecommunications network. The traffic controller may receive routing tables from a plurality of network devices, such as one or more provider edge devices of the network. The traffic controller, upon receiving the routing information from the provider edge devices, may generate a routing table associated with each device providing the routing information. The traffic controller may also provide updates to one or more of the networking devices associated with the controller. The traffic controller may alter or update, at the traffic controller, the routing table associated with the target provider edge device based on the network policy. The routing information in the routing table for that device and maintained by the traffic controller may be updated with a new route or new local preferred parameter value.Type: ApplicationFiled: June 27, 2024Publication date: October 17, 2024Applicant: Level 3 Communications, LLCInventor: Logan Rawlins
-
Publication number: 20240348525Abstract: Automatic testing/analysis of local loops of telecommunications networks includes obtaining bits-per-tone data for a local loop of a telecommunications network and generating a bit value string from the bits-per-tone data. The bit value string is then analyzed to determine whether it includes a bit pattern indicative of an impairment of the local loop. Further approaches for automatically testing local loops of telecommunications networks include obtaining attenuation data for multiple tones carried by the local loop and determining whether the attenuation data falls below thresholds for providing a service using the local loop.Type: ApplicationFiled: June 22, 2024Publication date: October 17, 2024Applicant: Level 3 Communications, LLCInventors: Thomas C. Woldahl, Leigh A. Benson
-
Publication number: 20240349061Abstract: A security platform of a data network is provided that includes security services for computing devices in communication with the data network. The security platform may apply a security policy to the computing devices when accessing the Internet via a home network (or other customer network) and when accessing the Internet via a public or third party network. To provide security services to computing devices via the home network, the security platform may communicate with a security agent application executed on the router (or other gateway device) of the home network. In addition, each of the devices identified by the security profile for the home network may be instructed or otherwise be provided a security agent application for execution on the computing devices. The security agent application may communicate with the security platform when the computing device connects to the Internet over a third party or public access point.Type: ApplicationFiled: June 22, 2024Publication date: October 17, 2024Applicant: Level 3 Communications, LLCInventors: Mayur Kudtarkar, Kirsten Jensen Coppo
-
Patent number: 12117888Abstract: Novel tools and techniques are provided for implementing intelligent alert automation (“IAA”). In various embodiments, IAA receives alert/event feeds from several different alerting and ticketing systems via input Redis queues, and uses a triage system to determine whether to process the alert/event or disregard it. If so, IAA may create a flow instance, assign a unique instance ID, and place the flow instance in one of a plurality of jobs queues based on alert/event type and/or or source. An abattoir system retrieves a flow instance from one of the jobs queues (in order of the queue's priority), and processes the next node or step in the flow instance. The flow instance is placed back into the jobs queue for subsequent processing by the same or different abattoir system until no additional nodes or steps remain in the flow, at which point the flow instance is considered complete.Type: GrantFiled: October 7, 2022Date of Patent: October 15, 2024Assignee: Level 3 Communications, LLCInventors: Kevin Schneider, Angela A. Rash, Troy G. Pohl, Steven Burrell, Matthew D. Schoenfeldt, Shelli L. Hurd
-
Patent number: 12117889Abstract: Novel tools and techniques are provided for implementing real-time fault management or real-time fault management system (“RFM”). In various embodiments, RFM may receive alerts from or associated with network devices (e.g., layer 2, 3, and/or 4 devices, or the like) that are disposed in a plurality of disparate networks that may utilize different alert management protocols and/or different fault management protocols. RFM may collect, enrich, normalize, aggregate, and display the alerts in a user interface to facilitate addressing of the alerts by a user. To enable continuous and real-time functionality, RFM may be implemented in a plurality of siloed platforms in a primary data center, with processing of alerts being load balanced across the siloed platforms, with mirrored group of siloed platforms in a secondary data center located geographically distant from the primary data center and configured to be on “hot standby” and to completely take over RFM processing operations.Type: GrantFiled: November 15, 2022Date of Patent: October 15, 2024Assignee: Level 3 Communications, LLCInventors: Steve Toms, Michael McClintock, David Sutton, Steven Burrell, Shelley Goldner, Shelli L Hurd
-
Publication number: 20240340268Abstract: Systems and methods for implementing filters within computer networks include obtaining blocklist data that includes blocklist entries for a network. Each of the blocklist entries includes one or more network traffic attributes for identifying traffic to be blocked. In response to receiving the blocklist data, a filter based on a common network traffic attribute shared between at least two of the plurality of blocklist entries is generated. The filter is then deployed to a network device within the network such that the filter may be implemented at the network device to block corresponding traffic.Type: ApplicationFiled: June 20, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventor: Michael Benjamin
-
Publication number: 20240340318Abstract: Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.Type: ApplicationFiled: June 13, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventors: David Dubois, Michael Benjamin, Mark Dehus, Peter Brecl
-
Publication number: 20240340218Abstract: Examples of the present disclosure describe systems and methods relating to adaptive virtual services. In an example, a user specifies a device configuration for a platform device. As a result, a service provider installs selected virtual-network functions and defines network connections as specified by the device configuration. Management software may also be installed, thereby enabling the service provider to communicate with and remotely manage the platform device. The installed virtual-network functions are activated on the platform device once it is delivered to the user. In some instances, the user changes the device configuration. For example, the user may install new virtual-network functions, reconfigure or remove existing virtual-network functions, or change defined network connections. As a result, the service provider reconfigures the platform device accordingly. Thus, the user need not purchase new specialized hardware in order to change the available functions of the computer network.Type: ApplicationFiled: June 20, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventors: Adam Saenger, Matthew Holway, Len Brannen, Gene Clark, Anil Simlot, Zubin Ingah, Johan J. Shane, Michael Gibson, Cory Sawyer, Rich Cerami, Kurt Deshazer
-
Publication number: 20240340307Abstract: In a network system in which a server receives packets each including a source address, and in which the server ordinarily responds to each packet, Distributed Denial of Service attacks may be launched by malicious actors controlling a plurality of network devices. In such an attack, the attacking devices may spoof the IP address of a legitimate device, e.g., they may include, in each packet, the source address of the legitimate device. As such, systems and methods for increased security using client address manipulation are provided.Type: ApplicationFiled: April 8, 2024Publication date: October 10, 2024Applicant: Level 3 Communications, LLCInventors: John R.B. Woodworth, Dean Ballew, Lisa Lamanna, James C. Anders, Dan Luther, Carol D. Lovell
-
Patent number: 12113715Abstract: A quality of service management system includes a rules engine that receives information associated with a communication path having an assigned quality of service (QoS) to be provided for a customer communication device, and identifies one or more network elements assigned to provide the communication path. Each network element having a plurality of queues configured to provide varying QoS levels relative to one another. For each of the network elements, the rules engine determines at least one queue that is configured to provide the communication path at the assigned quality of service, and transmits queue information associated with the determined queue to its respective network element, the network element conveying the communication path through the determined queue.Type: GrantFiled: October 20, 2023Date of Patent: October 8, 2024Assignee: Level 3 CommunicationsInventors: Marcus Hadavi, James Ryan
-
Publication number: 20240333833Abstract: Automatic testing/analysis of local loops of telecommunications networks includes obtaining bits-per-tone data for a local loop of a telecommunications network and generating a bit value string from the bits-per-tone data. The bit value string is then analyzed to determine whether it includes a bit pattern indicative of an impairment of the local loop. Further approaches for automatically testing local loops of telecommunications networks include obtaining attenuation data for multiple tones carried by the local loop and determining whether the attenuation data falls below thresholds for providing a service using the local loop.Type: ApplicationFiled: June 7, 2024Publication date: October 3, 2024Applicant: Level 3 Communications, LLCInventors: Thomas C. Woldahl, Erik V. Helrich, Michael J. Durkin, Larry J. North, Abid Khan
-
Publication number: 20240333720Abstract: Systems and methods for conference security based on user groups are disclosed. In examples, a set of attendees (e.g., in a collaboration group) may be allowed access to a meeting by a host user with a specified access permission. The collaboration group may be in the network hosting the meeting or outside of the network. An attendee requesting access to the meeting may be verified based on the attendee's identity and membership status of the collaboration group. If an attendee's identity is not identified or if the attendee is not a member of the collaboration group, the requesting attendee may be denied access to the meeting. If the requesting attendee's identity is verified and the attendee is a member of the collaboration group, the attendee is allowed access to the meeting with their specified access permission.Type: ApplicationFiled: June 13, 2024Publication date: October 3, 2024Applicant: Level 3 Communications, LLCInventor: Andrew J. Broadworth
-
Publication number: 20240323051Abstract: Aspects of the disclosure involve systems and methods for utilizing Virtual Local Area Network separation in a connection, which may be a single connection, between a customer to a telecommunications network and a cloud environment to allow the customer to access multiple instances within the cloud through the connection. A customer may purchase multiple cloud resource instances from a public cloud environment and, utilizing the telecommunications network, connect to the multiple instances through a communication port or connection to the cloud environment. To utilize the single connection or port, communication packets intended for the cloud environment may be tagged with a VLAN tag that indicates to which cloud instance the packet is intended. The telecommunications network may route the packet to the intended cloud environment and configure one or more aspects of the cloud environment to analyze the attached VLAN tag to transmit the packet to the intended instance.Type: ApplicationFiled: June 7, 2024Publication date: September 26, 2024Applicant: Level 3 Communications, LLCInventor: Austin D. Ritchie