Patents by Inventor Adam Uzelac
Adam Uzelac has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250133163Abstract: Novel tools and techniques are provided for implementing cloud-based voice calling service, video calling service, and/or over-the-top (“OTT”) services. In various embodiments, with a unified communications and collaboration interconnection (“UCCI”) interconnection established between separate hyperscalers or communication service providers that have separate administrative domains, Internet Protocol (“IP”) based communications services may be instantiated between a first user device or a first telephone number (or call identifier (“ID”)) via a first hyperscaler and a second user device or a second telephone number (or call ID) via a second hyperscaler, without touching or traversing the public switched telephone network (“PSTN”).Type: ApplicationFiled: October 14, 2024Publication date: April 24, 2025Applicant: Level 3 Communications, LLCInventors: Tina Telson, Alexander D. Griese, Corey DeLizza, Jason Brougham, Adam Uzelac
-
Patent number: 12267342Abstract: Novel tools and techniques are provided for implementing fraud or distributed denial of service (“DDoS”) protection for session initiation protocol (“SIP”)-based communication. In various embodiments, a computing system may receive, from a first router, first SIP data indicating a request to initiate a SIP-based media communication session between a calling party at a source address and a called party at a destination address. The computing system may analyze the received first SIP data to determine whether the received first SIP data comprises any abnormalities indicative of potential fraudulent or malicious actions. If so, the computing system may reroute the first SIP data to a security deep packet inspection (“DPI”) engine, which may perform a deep scan of the received first SIP data to identify any known fraudulent or malicious attack vectors contained within the received first SIP data. If so, the security DPI engine may initiate mitigation actions.Type: GrantFiled: March 20, 2024Date of Patent: April 1, 2025Assignee: Level 3 Communications, LLCInventors: Adam Uzelac, Ronnie Bailey, Craig Richter
-
Publication number: 20250071155Abstract: Novel tools and techniques are provided for implementing programmatical public switched telephone network (“PSTN”) trunking for cloud hosted applications. In various embodiments, a computing system may determine one or more first network interconnection characteristics associated with a first entity service provider within a call service network operated by a call network service provider. Based on the determined one or more first network interconnection characteristics associated with the first entity service provider, the computing system may cause a network provisioning application layer to establish one or more network interconnections between a first network associated with the first entity service provider and the call service network, in some cases, by establishing shared peering connections between the first network and the call service network.Type: ApplicationFiled: November 14, 2024Publication date: February 27, 2025Applicant: Level 3 Communications, LLCInventors: Kimberly Adams, Anne Kempen, Joseph A. Scivicque, Adam Uzelac
-
Publication number: 20250039246Abstract: Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.Type: ApplicationFiled: September 19, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Adam Uzelac, Andrew J. Broadworth, Robert P. Slaughter
-
Publication number: 20250039305Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: ApplicationFiled: September 19, 2024Publication date: January 30, 2025Applicant: Level 3 Communications, LLCInventors: Joseph A. Scivicque, Adam Uzelac
-
Patent number: 12149572Abstract: Novel tools and techniques are provided for implementing programmatical public switched telephone network (“PSTN”) trunking for cloud hosted applications. In various embodiments, a computing system may determine one or more first network interconnection characteristics associated with a first entity service provider within a call service network operated by a call network service provider. Based on the determined one or more first network interconnection characteristics associated with the first entity service provider, the computing system may cause a network provisioning application layer to establish one or more network interconnections between a first network associated with the first entity service provider and the call service network, in some cases, by establishing shared peering connections between the first network and the call service network.Type: GrantFiled: February 14, 2022Date of Patent: November 19, 2024Assignee: Level 3 Communications, LLCInventors: Kimberly Adams, Anne Kempen, Joseph A. Scivicque, Adam Uzelac
-
Patent number: 12101443Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: GrantFiled: September 8, 2023Date of Patent: September 24, 2024Assignee: Level 3 Communications, LLCInventors: Joseph A. Scivicque, Adam Uzelac
-
Patent number: 12101358Abstract: Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.Type: GrantFiled: June 29, 2023Date of Patent: September 24, 2024Assignee: Level 3 Communications, LLCInventors: Adam Uzelac, Andrew J. Broadworth, Robert P. Slaughter
-
Publication number: 20240259403Abstract: Novel tools and techniques are provided for implementing fraud or distributed denial of service (“DDoS”) protection for session initiation protocol (“SIP”)-based communication. In various embodiments, a computing system may receive, from a first router, first SIP data indicating a request to initiate a SIP-based media communication session between a calling party at a source address and a called party at a destination address. The computing system may analyze the received first SIP data to determine whether the received first SIP data comprises any abnormalities indicative of potential fraudulent or malicious actions. If so, the computing system may reroute the first SIP data to a security deep packet inspection (“DPI”) engine, which may perform a deep scan of the received first SIP data to identify any known fraudulent or malicious attack vectors contained within the received first SIP data. If so, the security DPI engine may initiate mitigation actions.Type: ApplicationFiled: March 20, 2024Publication date: August 1, 2024Applicant: Level 3 Communications, LLCInventors: Adam Uzelac, Ronnie Bailey, Craig Richter
-
Patent number: 11943239Abstract: Novel tools and techniques are provided for implementing fraud or distributed denial of service (“DDoS”) protection for session initiation protocol (“SIP”)-based communication. In various embodiments, a computing system may receive, from a first router, first SIP data indicating a request to initiate a SIP-based media communication session between a calling party at a source address and a called party at a destination address. The computing system may analyze the received first SIP data to determine whether the received first SIP data comprises any abnormalities indicative of potential fraudulent or malicious actions. If so, the computing system may reroute the first SIP data to a security deep packet inspection (“DPI”) engine, which may perform a deep scan of the received first SIP data to identify any known fraudulent or malicious attack vectors contained within the received first SIP data. If so, the security DPI engine may initiate mitigation actions.Type: GrantFiled: August 24, 2021Date of Patent: March 26, 2024Assignee: Level 3 Communications, LLCInventors: Adam Uzelac, Ronnie Bailey, Craig Richter
-
Publication number: 20230421703Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: ApplicationFiled: September 8, 2023Publication date: December 28, 2023Applicant: Level 3 Communications, LLCInventors: Joseph A. Scivicque, Adam Uzelac
-
Publication number: 20230344875Abstract: Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.Type: ApplicationFiled: June 29, 2023Publication date: October 26, 2023Applicant: Level 3 Communications, LLCInventors: Adam Uzelac, Andrew J. Broadworth, Robert P. Slaughter
-
Patent number: 11758053Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: GrantFiled: July 1, 2022Date of Patent: September 12, 2023Assignee: Level 3 Communications, LLCInventors: Joseph A Scivicque, Adam Uzelac
-
Patent number: 11695805Abstract: Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.Type: GrantFiled: December 10, 2021Date of Patent: July 4, 2023Assignee: Level 3 Communications, LLCInventors: Adam Uzelac, Andrew J. Broadworth, Robert P. Slaughter
-
Publication number: 20230120058Abstract: Novel tools and techniques are provided for implementing programmatical public switched telephone network (“PSTN”) trunking for cloud hosted applications. In various embodiments, a computing system may determine one or more first network interconnection characteristics associated with a first entity service provider within a call service network operated by a call network service provider. Based on the determined one or more first network interconnection characteristics associated with the first entity service provider, the computing system may cause a network provisioning application layer to establish one or more network interconnections between a first network associated with the first entity service provider and the call service network, in some cases, by establishing shared peering connections between the first network and the call service network.Type: ApplicationFiled: February 14, 2022Publication date: April 20, 2023Inventors: Kimberly Adams, Anne Kempen, Joseph A. Scivicque, Adam Uzelac
-
Publication number: 20230029971Abstract: Novel tools and techniques are provided for implementing fraud or distributed denial of service (“DDoS”) protection for session initiation protocol (“SIP”)-based communication. In various embodiments, a computing system may receive, from a first router, first SIP data indicating a request to initiate a SIP-based media communication session between a calling party at a source address and a called party at a destination address. The computing system may analyze the received first SIP data to determine whether the received first SIP data comprises any abnormalities indicative of potential fraudulent or malicious actions. If so, the computing system may reroute the first SIP data to a security deep packet inspection (“DPI”) engine, which may perform a deep scan of the received first SIP data to identify any known fraudulent or malicious attack vectors contained within the received first SIP data. If so, the security DPI engine may initiate mitigation actions.Type: ApplicationFiled: August 24, 2021Publication date: February 2, 2023Inventors: Adam Uzelac, Ronnie Bailey, Craig Richter
-
Publication number: 20230035882Abstract: Novel tools and techniques are provided for implementing originating number or address -based route determination and routing. In various embodiments, a computing system may receive, from a first router among a plurality of routers in a first network operated by a first service provider, first SIP data, the first SIP data indicating a request to initiate a SIP-based media communication session between a calling party at an originating address in an originating network and a called party at a terminating address in a terminating network. The computing system may determine a communication route among a plurality of routes through the plurality of routers in the first network for establishing the SIP-based media communication session, based at least in part on the originating address, and may establish the SIP-based media communication session between the calling party and the called party via the determined communication route.Type: ApplicationFiled: October 10, 2022Publication date: February 2, 2023Applicant: Level 3 Communications, LLCInventor: Adam Uzelac
-
Publication number: 20220337704Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: ApplicationFiled: July 1, 2022Publication date: October 20, 2022Applicant: Level 3 Communications, LLCInventors: Joseph A. Scivicque, Adam Uzelac
-
Patent number: 11470129Abstract: Novel tools and techniques are provided for implementing originating number or address-based route determination and routing. In various embodiments, a computing system may receive, from a first router among a plurality of routers in a first network operated by a first service provider, first SIP data, the first SIP data indicating a request to initiate a SIP-based media communication session between a calling party at an originating address in an originating network and a called party at a terminating address in a terminating network. The computing system may determine a communication route among a plurality of routes through the plurality of routers in the first network for establishing the SIP-based media communication session, based at least in part on the originating address, and may establish the SIP-based media communication session between the calling party and the called party via the determined communication route.Type: GrantFiled: August 24, 2021Date of Patent: October 11, 2022Assignee: Level 3 Communications, LLCInventor: Adam Uzelac
-
Patent number: 11381685Abstract: Novel tools and techniques are provided for implementing management of routing across multiple voice or data networks with separate routing masters. In various embodiments, in response to receiving a request to establish a call between a calling party in a first network and a called party in a second network, a computing system might receive a first set of network information from a first routing database(s) that is operated by a first service provider and a second set of network information from a second routing database(s) that is operated by a second service provider separate from the first service provider; might analyze the received first and second sets of network information to generate a unified routing model for optimizing routing of the call through the first and second networks; and might establish the call through a selected optimized route based on the generated unified routing model.Type: GrantFiled: December 21, 2020Date of Patent: July 5, 2022Assignee: Level 3 Communications, LLCInventors: Joseph A. Scivicque, Adam Uzelac