Patents by Inventor Sergey Yermakov

Sergey Yermakov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230421589
    Abstract: In an embodiment, a computer implemented method receives flow data for one or more flows that correspond to a device-circuit pair. The method calculates a time difference for each flow that corresponds to a device-circuit pair. Based on the calculated time differences and the received flow data, the method updates a probability distribution model associated with the device-circuit pair. Then, the method determines whether a time bucket is complete or open based on the updated probability distribution model.
    Type: Application
    Filed: September 8, 2023
    Publication date: December 28, 2023
    Inventor: Sergey Yermakov
  • Patent number: 11757913
    Abstract: In an embodiment, a computer implemented method receives flow data for one or more flows that correspond to a device-circuit pair. The method calculates a time difference for each flow that corresponds to a device-circuit pair. Based on the calculated time differences and the received flow data, the method updates a probability distribution model associated with the device-circuit pair. Then, the method determines whether a time bucket is complete or open based on the updated probability distribution model.
    Type: Grant
    Filed: December 23, 2022
    Date of Patent: September 12, 2023
    Assignee: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Publication number: 20230281204
    Abstract: In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets. The method further includes, for each generated stream signature, attaching information to the stream signature. Such information may, for example, include time-stamp information for the stream signature, or an identification of the router. The method may further comprise storing the stream signatures corresponding to the data streams in a database. The stored stream signatures may be compared to determine matching stream signatures. Matching signatures may identify data streams that carry identical or similar content.
    Type: Application
    Filed: May 10, 2023
    Publication date: September 7, 2023
    Applicant: Level 3 Communications, LLC
    Inventors: Sergey Yermakov, Travis Ewert
  • Publication number: 20230239316
    Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.
    Type: Application
    Filed: March 30, 2023
    Publication date: July 27, 2023
    Applicant: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Patent number: 11650994
    Abstract: In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets. The method further includes, for each generated stream signature, attaching information to the stream signature. Such information may, for example, include time-stamp information for the stream signature, or an identification of the router. The method may further comprise storing the stream signatures corresponding to the data streams in a database. The stored stream signatures may be compared to determine matching stream signatures. Matching signatures may identify data streams that carry identical or similar content.
    Type: Grant
    Filed: April 5, 2021
    Date of Patent: May 16, 2023
    Assignee: Level 3 Communications, LLC
    Inventors: Sergey Yermakov, Travis Ewert
  • Publication number: 20230127578
    Abstract: In an embodiment, a computer implemented method receives flow data for one or more flows that correspond to a device-circuit pair. The method calculates a time difference for each flow that corresponds to a device-circuit pair. Based on the calculated time differences and the received flow data, the method updates a probability distribution model associated with the device-circuit pair. Then, the method determines whether a time bucket is complete or open based on the updated probability distribution model.
    Type: Application
    Filed: December 23, 2022
    Publication date: April 27, 2023
    Applicant: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Patent number: 11621971
    Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.
    Type: Grant
    Filed: August 23, 2021
    Date of Patent: April 4, 2023
    Assignee: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Patent number: 11606381
    Abstract: In an embodiment, a computer implemented method receives flow data for one or more flows that correspond to a device-circuit pair. The method calculates a time difference for each flow that corresponds to a device-circuit pair. Based on the calculated time differences and the received flow data, the method updates a probability distribution model associated with the device-circuit pair. Then, the method determines whether a time bucket is complete or open based on the updated probability distribution model.
    Type: Grant
    Filed: March 2, 2022
    Date of Patent: March 14, 2023
    Assignee: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Publication number: 20220191228
    Abstract: In an embodiment, a computer implemented method receives flow data for one or more flows that correspond to a device-circuit pair. The method calculates a time difference for each flow that corresponds to a device-circuit pair. Based on the calculated time differences and the received flow data, the method updates a probability distribution model associated with the device-circuit pair. Then, the method determines whether a time bucket is complete or open based on the updated probability distribution model.
    Type: Application
    Filed: March 2, 2022
    Publication date: June 16, 2022
    Applicant: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Patent number: 11271956
    Abstract: In an embodiment, a computer implemented method receives flow data for one or more flows that correspond to a device-circuit pair. The method calculates a time difference for each flow that corresponds to a device-circuit pair. Based on the calculated time differences and the received flow data, the method updates a probability distribution model associated with the device-circuit pair. Then, the method determines whether a time bucket is complete or open based on the updated probability distribution model.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: March 8, 2022
    Assignee: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Publication number: 20210385240
    Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.
    Type: Application
    Filed: August 23, 2021
    Publication date: December 9, 2021
    Applicant: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Patent number: 11108801
    Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.
    Type: Grant
    Filed: March 18, 2020
    Date of Patent: August 31, 2021
    Assignee: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Publication number: 20210224283
    Abstract: In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets. The method further includes, for each generated stream signature, attaching information to the stream signature. Such information may, for example, include time-stamp information for the stream signature, or an identification of the router. The method may further comprise storing the stream signatures corresponding to the data streams in a database. The stored stream signatures may be compared to determine matching stream signatures. Matching signatures may identify data streams that carry identical or similar content.
    Type: Application
    Filed: April 5, 2021
    Publication date: July 22, 2021
    Applicant: Level 3 Communications, LLC
    Inventors: Sergey Yermakov, Travis Ewert
  • Patent number: 11005716
    Abstract: A network customer may support a plurality of network connectivity services (such as an E-line). A network connectivity service may experience spikes of traffic, and therefore, spikes of bandwidth usage. Dynamic capacity allows a network connectivity service to increase its available bandwidth during such traffic spikes. A computer-implemented method is disclosed that facilitates identifying network customers that might be interested in purchasing dynamic capacity. The method comprises collecting bandwidth utilization data of network connectivity services supported by each network customer, and identifying those connectivity services that exhibit patterns (e.g., cogent peaks) in their utilization data indicating the network connectivity service is a candidate for dynamic capacity.
    Type: Grant
    Filed: October 7, 2015
    Date of Patent: May 11, 2021
    Assignee: Level 3 Communications, LLC
    Inventors: Sergey Yermakov, Pete J. Caputo, II
  • Patent number: 10977252
    Abstract: In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets. The method further includes, for each generated stream signature, attaching information to the stream signature. Such information may, for example, include time-stamp information for the stream signature, or an identification of the router. The method may further comprise storing the stream signatures corresponding to the data streams in a database. The stored stream signatures may be compared to determine matching stream signatures. Matching signatures may identify data streams that carry identical or similar content.
    Type: Grant
    Filed: October 7, 2019
    Date of Patent: April 13, 2021
    Assignee: Level 3 Communications, LLC
    Inventors: Sergey Yermakov, Travis Ewert
  • Patent number: 10805195
    Abstract: In an embodiment, a computer-implemented method receives and monitors performance metrics from network element. The method also includes receiving periodic control metrics corresponding to object instances. Performance metrics and control metrics provide information about operation of object instances. By monitoring the metrics, a network server is able to detect an operational flaw in the network. Monitoring the performance and control metrics in real time increases the speed of detecting any operational flaw in the network.
    Type: Grant
    Filed: August 28, 2019
    Date of Patent: October 13, 2020
    Assignee: Level 3 Communications, LLC
    Inventors: Pete Joseph Caputo, II, Sergey Yermakov
  • Patent number: 10742672
    Abstract: In an embodiment, a computer-implemented method compares metrics from different data flows to detect flaws in collection of data describing operation of a network. The method uses a first network data collection technique to collect a first metric describing a characteristic of a network interface. Using a second network data collection technique different from the first network data collection technique, a second metric describing the characteristic of the network interface is collected. The first metric is compared with the second metric to determine whether the first and second metrics are incongruous. When the first and second metrics are determined to be incongruous, a flaw is detected to exist in the first or second network data collection techniques.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: August 11, 2020
    Assignee: Level 3 Communication, LLC
    Inventor: Sergey Yermakov
  • Publication number: 20200220889
    Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.
    Type: Application
    Filed: March 18, 2020
    Publication date: July 9, 2020
    Applicant: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Patent number: 10601849
    Abstract: In an embodiment, a computer implemented method receives flow data for a network flows. The method extracts a tuple from the flow data and calculates long-term and short-term trends based at least in part on the tuple. The long-term and short-term trends are compared to determine whether a potential network anomaly exists. If a potential network anomaly does exist, the method initiates a heavy hitter detection algorithm. The method forms a low-complexity intermediate stage of processing that enables a high-complexity heavy hitter detection algorithm to execute when heavy hitters are likely to be detected.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: March 24, 2020
    Assignee: Level 3 Communications, LLC
    Inventor: Sergey Yermakov
  • Publication number: 20200042527
    Abstract: In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets. The method further includes, for each generated stream signature, attaching information to the stream signature. Such information may, for example, include time-stamp information for the stream signature, or an identification of the router. The method may further comprise storing the stream signatures corresponding to the data streams in a database. The stored stream signatures may be compared to determine matching stream signatures. Matching signatures may identify data streams that carry identical or similar content.
    Type: Application
    Filed: October 7, 2019
    Publication date: February 6, 2020
    Applicant: Level 3 Communications, LLC
    Inventors: Sergey YERMAKOV, Travis EWERT