Patents by Inventor John SCHIEL

John SCHIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240372926
    Abstract: Novel tools and techniques are provided for implementing object-based changes to filter-intent over multicast or publication/subscription (“Pub/Sub”) distribution. In various embodiments, a computing system (e.g., a managed device among a plurality of managed devices and/or its corresponding agent) may receive, from a network filter orchestration conductor, a global filter-intent list including a first filter intent that references a corresponding filter-intent object. The computing system may determine whether the at least one first filter intent applies to the managed device. If so, the computing system may translate the at least one first filter intent into a first filter that is specific to a first configuration of the managed device, in some cases, by building the first filter based at least in part on the at least one first filter intent. The computing system may subsequently apply the first filter to one or more network communications handled by the managed device.
    Type: Application
    Filed: April 30, 2024
    Publication date: November 7, 2024
    Applicant: Level 3 Communications, LLC
    Inventors: Dean BALLEW, John R.B. WOODWORTH, Brian J. STRONG, Robert J. WHELTON, Tom DONAHUE, John A. SCHIEL, Mark DEHUS
  • Publication number: 20240309347
    Abstract: The present disclosure provides compositions for modulating the expression of a nucleic acid and methods for using these compositions. The compositions comprise fusion proteins that contain the repressor domain for one or both of SALL1 and SUDS3. In some embodiments, the compositions are Cas fusion proteins that may be used in combination with a gRNA or other RNA. Additionally or alternatively, the compositions are RNA-repressor domain complexes.
    Type: Application
    Filed: February 4, 2022
    Publication date: September 19, 2024
    Inventors: CLARENCE MILLS, ZAKLINA STREZOSKA, JOHN SCHIEL
  • Publication number: 20230265461
    Abstract: Provided herein are nucleic acids useful as guide nucleic acids (gNAs), e.g., guide ribonucleic acids (gRNAs), in a CRISPR system wherein the guide nucleic acids contain one or more modifications to one or more nucleotides, use of such guide nucleic acids in modifying cells, and other uses wherein CRISPR Cas proteins are utilized.
    Type: Application
    Filed: March 23, 2023
    Publication date: August 24, 2023
    Inventors: Andrea BARGHETTI, Roland BAUMGARTNER, Tanya WARNECKE, Kurt MARSHALL, John SCHIEL, Alyssa Carlson
  • Publication number: 20230235362
    Abstract: Provided herein are nucleic acids useful as guide nucleic acids (gNAs), e.g., guide ribonucleic acids (gRNAs), in a CRISPR system wherein the guide nucleic acids contain one or more modifications to one or more nucleotides, use of such guide nucleic acids in modifying cells, and other uses wherein CRISPR Cas proteins are utilized.
    Type: Application
    Filed: October 3, 2022
    Publication date: July 27, 2023
    Inventors: Andrea BARGHETTI, Roland BAUMGARTNER, Tanya WARNECKE, Kurt MARSHALL, John SCHIEL, Alyssa Carlson
  • Publication number: 20230179635
    Abstract: This disclosure describes systems, methods, and devices related to identification and assessment of security threats to a computer system using zero trust security. A method may include receiving, at a policy enforcement device of a computer network, first data from a first subsystem of the computer network; receiving, at the policy enforcement device, second data from a second subsystem of the computer network, the first subsystem different than the first subsystem; identifying, by the policy enforcement device, based on a comparison of at least one of the first data or the second data to a security policy, a security threat to the computer network; and causing, by the policy enforcement device, a threat intelligence device of the computer network to determine a risk of the security threat.
    Type: Application
    Filed: March 25, 2022
    Publication date: June 8, 2023
    Applicant: CenturyLink Intellectual Property LLC
    Inventors: John SCHIEL, Joe DIETZ
  • Publication number: 20220329625
    Abstract: Examples of the present disclosure describe systems and methods for providing security against IP spoofing. In aspects, network traffic associated with one or more data requests may be received by a device in a computing environment. The network traffic may be evaluated using one or more automated logic systems or algorithms to identify suspicious or malicious behavior. The automated logic systems or algorithms may implement one or more analyses, such as asymmetric routing analysis, hardware device analysis, user and/or network behavior analysis, etc. Upon identifying suspicious or malicious behavior, the automated logic systems or algorithms may apply a filter to one or more computing devices. For example, a filter for blocking network traffic associated with the suspicious or malicious behavior may be applied to a computing device that is in close geographic and/or logical proximity to an attacking computing device.
    Type: Application
    Filed: March 31, 2022
    Publication date: October 13, 2022
    Applicant: CenturyLink Intellectual Property LLC
    Inventors: Dean Ballew, John R.B. Woodworth, John A. Schiel
  • Patent number: 11095680
    Abstract: Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner.
    Type: Grant
    Filed: April 21, 2016
    Date of Patent: August 17, 2021
    Assignee: CenturyLink Intellectual Property LLC
    Inventors: Donald J. Smith, Michael Glenn, John A. Schiel, Christopher L. Garner
  • Patent number: 10091234
    Abstract: A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and advertising a second modified next hop address for a source address of network traffic. The first next hop address of the destination address might be overwritten with the first modified next hop address. Filtered traffic then can be forwarded to the first modified next hop address, wherein filtered traffic comprises only network traffic addressed to the destination address or from the source address. In some cases, the filtered traffic is transported and received via a sinkhole tunnel. A second next hop address of the source address can be overwritten to a second modified next hop address. The attack traffic, which can be filtered traffic that is both addressed to the destination address and from the source address, might be forwarded to a discard interface.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: October 2, 2018
    Assignee: CenturyLink Intellectual Property LLC
    Inventors: Donald J. Smith, John A. Schiel
  • Publication number: 20180124101
    Abstract: A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and advertising a second modified next hop address for a source address of network traffic. The first next hop address of the destination address might be overwritten with the first modified next hop address. Filtered traffic then can be forwarded to the first modified next hop address, wherein filtered traffic comprises only network traffic addressed to the destination address or from the source address. In some cases, the filtered traffic is transported and received via a sinkhole tunnel. A second next hop address of the source address can be overwritten to a second modified next hop address. The attack traffic, which can be filtered traffic that is both addressed to the destination address and from the source address, might be forwarded to a discard interface.
    Type: Application
    Filed: December 22, 2017
    Publication date: May 3, 2018
    Inventors: Donald J. Smith, John A. Schiel
  • Patent number: 9888028
    Abstract: A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and advertising a second modified next hop address for a source address of network traffic. The first next hop address of the destination address might be overwritten with the first modified next hop address. Filtered traffic then can be forwarded to the first modified next hop address, wherein filtered traffic comprises only network traffic addressed to the destination address or from the source address. In some cases, the filtered traffic is transported and received via a sinkhole tunnel. A second next hop address of the source address can be overwritten to a second modified next hop address. The attack traffic, which can be filtered traffic that is both addressed to the destination address and from the source address, might be forwarded to a discard interface.
    Type: Grant
    Filed: May 1, 2014
    Date of Patent: February 6, 2018
    Assignee: CenturyLink Intellectual Property LLC
    Inventors: Donald J. Smith, John A. Schiel
  • Publication number: 20160241590
    Abstract: Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner.
    Type: Application
    Filed: April 21, 2016
    Publication date: August 18, 2016
    Inventors: Donald J. Smith, Michael Glenn, John A. Schiel, Christopher L. Garner
  • Patent number: 9350706
    Abstract: Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: May 24, 2016
    Assignee: CenturyLink Intellectual Property LLC
    Inventors: Donald J. Smith, Michael Glenn, John A. Schiel, Christopher L. Garner
  • Publication number: 20140331308
    Abstract: A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and advertising a second modified next hop address for a source address of network traffic. The first next hop address of the destination address might be overwritten with the first modified next hop address. Filtered traffic then can be forwarded to the first modified next hop address, wherein filtered traffic comprises only network traffic addressed to the destination address or from the source address. In some cases, the filtered traffic is transported and received via a sinkhole tunnel. A second next hop address of the source address can be overwritten to a second modified next hop address. The attack traffic, which can be filtered traffic that is both addressed to the destination address and from the source address, might be forwarded to a discard interface.
    Type: Application
    Filed: May 1, 2014
    Publication date: November 6, 2014
    Applicant: CenturyLink Intellectual Property LLC
    Inventors: Donald J. Smith, John A. Schiel