Patents by Inventor John R.B. Woodworth

John R.B. Woodworth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220329511
    Abstract: Examples of the present disclosure describe systems and methods for restricting the routing scope of an anycast service. In aspects, network traffic and/or network performance data may be received by a network device and/or an endpoint device in an anycast environment. The received network traffic and/or network performance may be evaluated using one or more automated logic systems or algorithms to identify indicators of potential failure or performance degradation for one or more devices in the anycast environment. Upon identifying one or more such indicators, a routing table of one or more network devices in the anycast environment may be dynamically modified to restrict routes to particular endpoint destinations. The network devices in the anycast environment may subsequently route network traffic according to the modified routing table(s).
    Type: Application
    Filed: March 30, 2022
    Publication date: October 13, 2022
    Applicant: Level 3 Communications, LLC
    Inventors: John R.B. Woodworth, Noah Weis, Dean Ballew, Brian J. Strong
  • Publication number: 20220329513
    Abstract: The present application describes a system and method for utilizing a tunnel in a networking routing protocol to provide a network segment access to additional servers when certain load balancing trigger events are detected.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 13, 2022
    Applicant: Level 3 Communications, LLC
    Inventors: John R.B. WOODWORTH, Dean Ballew, Brian J. STRONG, Stewart BAMFORD
  • Publication number: 20220329625
    Abstract: Examples of the present disclosure describe systems and methods for providing security against IP spoofing. In aspects, network traffic associated with one or more data requests may be received by a device in a computing environment. The network traffic may be evaluated using one or more automated logic systems or algorithms to identify suspicious or malicious behavior. The automated logic systems or algorithms may implement one or more analyses, such as asymmetric routing analysis, hardware device analysis, user and/or network behavior analysis, etc. Upon identifying suspicious or malicious behavior, the automated logic systems or algorithms may apply a filter to one or more computing devices. For example, a filter for blocking network traffic associated with the suspicious or malicious behavior may be applied to a computing device that is in close geographic and/or logical proximity to an attacking computing device.
    Type: Application
    Filed: March 31, 2022
    Publication date: October 13, 2022
    Applicant: CenturyLink Intellectual Property LLC
    Inventors: Dean Ballew, John R.B. Woodworth, John A. Schiel