Patents by Inventor John SCHIEL
John SCHIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240372926Abstract: Novel tools and techniques are provided for implementing object-based changes to filter-intent over multicast or publication/subscription (“Pub/Sub”) distribution. In various embodiments, a computing system (e.g., a managed device among a plurality of managed devices and/or its corresponding agent) may receive, from a network filter orchestration conductor, a global filter-intent list including a first filter intent that references a corresponding filter-intent object. The computing system may determine whether the at least one first filter intent applies to the managed device. If so, the computing system may translate the at least one first filter intent into a first filter that is specific to a first configuration of the managed device, in some cases, by building the first filter based at least in part on the at least one first filter intent. The computing system may subsequently apply the first filter to one or more network communications handled by the managed device.Type: ApplicationFiled: April 30, 2024Publication date: November 7, 2024Applicant: Level 3 Communications, LLCInventors: Dean BALLEW, John R.B. WOODWORTH, Brian J. STRONG, Robert J. WHELTON, Tom DONAHUE, John A. SCHIEL, Mark DEHUS
-
Publication number: 20240309347Abstract: The present disclosure provides compositions for modulating the expression of a nucleic acid and methods for using these compositions. The compositions comprise fusion proteins that contain the repressor domain for one or both of SALL1 and SUDS3. In some embodiments, the compositions are Cas fusion proteins that may be used in combination with a gRNA or other RNA. Additionally or alternatively, the compositions are RNA-repressor domain complexes.Type: ApplicationFiled: February 4, 2022Publication date: September 19, 2024Inventors: CLARENCE MILLS, ZAKLINA STREZOSKA, JOHN SCHIEL
-
Publication number: 20230265461Abstract: Provided herein are nucleic acids useful as guide nucleic acids (gNAs), e.g., guide ribonucleic acids (gRNAs), in a CRISPR system wherein the guide nucleic acids contain one or more modifications to one or more nucleotides, use of such guide nucleic acids in modifying cells, and other uses wherein CRISPR Cas proteins are utilized.Type: ApplicationFiled: March 23, 2023Publication date: August 24, 2023Inventors: Andrea BARGHETTI, Roland BAUMGARTNER, Tanya WARNECKE, Kurt MARSHALL, John SCHIEL, Alyssa Carlson
-
Publication number: 20230235362Abstract: Provided herein are nucleic acids useful as guide nucleic acids (gNAs), e.g., guide ribonucleic acids (gRNAs), in a CRISPR system wherein the guide nucleic acids contain one or more modifications to one or more nucleotides, use of such guide nucleic acids in modifying cells, and other uses wherein CRISPR Cas proteins are utilized.Type: ApplicationFiled: October 3, 2022Publication date: July 27, 2023Inventors: Andrea BARGHETTI, Roland BAUMGARTNER, Tanya WARNECKE, Kurt MARSHALL, John SCHIEL, Alyssa Carlson
-
Publication number: 20230179635Abstract: This disclosure describes systems, methods, and devices related to identification and assessment of security threats to a computer system using zero trust security. A method may include receiving, at a policy enforcement device of a computer network, first data from a first subsystem of the computer network; receiving, at the policy enforcement device, second data from a second subsystem of the computer network, the first subsystem different than the first subsystem; identifying, by the policy enforcement device, based on a comparison of at least one of the first data or the second data to a security policy, a security threat to the computer network; and causing, by the policy enforcement device, a threat intelligence device of the computer network to determine a risk of the security threat.Type: ApplicationFiled: March 25, 2022Publication date: June 8, 2023Applicant: CenturyLink Intellectual Property LLCInventors: John SCHIEL, Joe DIETZ
-
Publication number: 20220329625Abstract: Examples of the present disclosure describe systems and methods for providing security against IP spoofing. In aspects, network traffic associated with one or more data requests may be received by a device in a computing environment. The network traffic may be evaluated using one or more automated logic systems or algorithms to identify suspicious or malicious behavior. The automated logic systems or algorithms may implement one or more analyses, such as asymmetric routing analysis, hardware device analysis, user and/or network behavior analysis, etc. Upon identifying suspicious or malicious behavior, the automated logic systems or algorithms may apply a filter to one or more computing devices. For example, a filter for blocking network traffic associated with the suspicious or malicious behavior may be applied to a computing device that is in close geographic and/or logical proximity to an attacking computing device.Type: ApplicationFiled: March 31, 2022Publication date: October 13, 2022Applicant: CenturyLink Intellectual Property LLCInventors: Dean Ballew, John R.B. Woodworth, John A. Schiel
-
Patent number: 11095680Abstract: Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner.Type: GrantFiled: April 21, 2016Date of Patent: August 17, 2021Assignee: CenturyLink Intellectual Property LLCInventors: Donald J. Smith, Michael Glenn, John A. Schiel, Christopher L. Garner
-
Patent number: 10091234Abstract: A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and advertising a second modified next hop address for a source address of network traffic. The first next hop address of the destination address might be overwritten with the first modified next hop address. Filtered traffic then can be forwarded to the first modified next hop address, wherein filtered traffic comprises only network traffic addressed to the destination address or from the source address. In some cases, the filtered traffic is transported and received via a sinkhole tunnel. A second next hop address of the source address can be overwritten to a second modified next hop address. The attack traffic, which can be filtered traffic that is both addressed to the destination address and from the source address, might be forwarded to a discard interface.Type: GrantFiled: December 22, 2017Date of Patent: October 2, 2018Assignee: CenturyLink Intellectual Property LLCInventors: Donald J. Smith, John A. Schiel
-
Publication number: 20180124101Abstract: A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and advertising a second modified next hop address for a source address of network traffic. The first next hop address of the destination address might be overwritten with the first modified next hop address. Filtered traffic then can be forwarded to the first modified next hop address, wherein filtered traffic comprises only network traffic addressed to the destination address or from the source address. In some cases, the filtered traffic is transported and received via a sinkhole tunnel. A second next hop address of the source address can be overwritten to a second modified next hop address. The attack traffic, which can be filtered traffic that is both addressed to the destination address and from the source address, might be forwarded to a discard interface.Type: ApplicationFiled: December 22, 2017Publication date: May 3, 2018Inventors: Donald J. Smith, John A. Schiel
-
Patent number: 9888028Abstract: A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and advertising a second modified next hop address for a source address of network traffic. The first next hop address of the destination address might be overwritten with the first modified next hop address. Filtered traffic then can be forwarded to the first modified next hop address, wherein filtered traffic comprises only network traffic addressed to the destination address or from the source address. In some cases, the filtered traffic is transported and received via a sinkhole tunnel. A second next hop address of the source address can be overwritten to a second modified next hop address. The attack traffic, which can be filtered traffic that is both addressed to the destination address and from the source address, might be forwarded to a discard interface.Type: GrantFiled: May 1, 2014Date of Patent: February 6, 2018Assignee: CenturyLink Intellectual Property LLCInventors: Donald J. Smith, John A. Schiel
-
Publication number: 20160241590Abstract: Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner.Type: ApplicationFiled: April 21, 2016Publication date: August 18, 2016Inventors: Donald J. Smith, Michael Glenn, John A. Schiel, Christopher L. Garner
-
Patent number: 9350706Abstract: Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner.Type: GrantFiled: March 13, 2014Date of Patent: May 24, 2016Assignee: CenturyLink Intellectual Property LLCInventors: Donald J. Smith, Michael Glenn, John A. Schiel, Christopher L. Garner
-
Publication number: 20140331308Abstract: A method for remote triggered black hole filtering can include advertising a first modified next hop address for a destination address of network traffic, and advertising a second modified next hop address for a source address of network traffic. The first next hop address of the destination address might be overwritten with the first modified next hop address. Filtered traffic then can be forwarded to the first modified next hop address, wherein filtered traffic comprises only network traffic addressed to the destination address or from the source address. In some cases, the filtered traffic is transported and received via a sinkhole tunnel. A second next hop address of the source address can be overwritten to a second modified next hop address. The attack traffic, which can be filtered traffic that is both addressed to the destination address and from the source address, might be forwarded to a discard interface.Type: ApplicationFiled: May 1, 2014Publication date: November 6, 2014Applicant: CenturyLink Intellectual Property LLCInventors: Donald J. Smith, John A. Schiel