Patents by Inventor Thomas Anschutz

Thomas Anschutz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060039367
    Abstract: These exemplary embodiments utilize Sessions Initiation Protocol (SIP) for admission control. The use of the SIP allows a SIP server itself to perform the admission control function. The use of RSVP linkages is reduced. The use of SIP for admission control allows an application to communicate, or “talk,” to a network and to request that resources within the network be reserved. Any communications device that uses sessions may utilize the SIP protocol for admission control. The SIP protocol may be used for unicast and multicast media sessions including video-on-demand and/or multicast video access control.
    Type: Application
    Filed: December 30, 2004
    Publication date: February 23, 2006
    Inventors: Steven Wright, Albert Whited, Thomas Anschutz, Randy Zimler
  • Publication number: 20060007931
    Abstract: A multiprotocol label switching (MPLS) packet is processed by modifying the packet so as to push or pop a plurality of MPLS shim headers at a network node. An MPLS network is operated by pushing a plurality of MPLS shim headers onto a packet at network node. The packet is replicated to obtain a plurality of packets for transmission on a plurality of paths associated with a plurality of nodes, respectively. At least one MPLS shim header is popped from respective ones of the plurality of packets. The one or more MPLS shim headers that are popped correspond to at least one of the plurality of nodes that is not associated with one of the plurality of paths for which one of the plurality of packets comprising the one or more MPLS shim headers is destined for transmission. The plurality of packets is-then transmitted on the plurality of paths, respectively.
    Type: Application
    Filed: July 12, 2004
    Publication date: January 12, 2006
    Inventors: Steven Wright, Thomas Anschutz, James Rembert, Andrew Vernon
  • Publication number: 20060007925
    Abstract: A multiprotocol label switching (MPLS) packet stream is processed by establishing a packet communication context between a first node and a second node in an MPLS network. The context is an uncompressed version of an MPLS shim header. The MPLS shim header in each of the packets is compressed at the first node and the packets with the compressed MPLS shim headers are transmitted to the second node. The MPLS shim headers are decompressed at the second node using the context.
    Type: Application
    Filed: July 12, 2004
    Publication date: January 12, 2006
    Inventors: Steven Wright, Thomas Anschutz, James Rembert, Andrew Vernon
  • Publication number: 20050286491
    Abstract: Traffic in a communication network is processed by receiving traffic from a first network at a router. The traffic is scheduled at the router for transmission to a transport network, which supports statistical multiplexing of traffic, based on a topology of the transport network. Moreover, the router is associated with a first organization and the transport network is associated with a second organization. Congestion may be reduced in queues that support statistical multiplexing in the transport network allowing a quality of service imparted by the router to be maintained.
    Type: Application
    Filed: June 24, 2004
    Publication date: December 29, 2005
    Inventor: Thomas Anschutz
  • Publication number: 20050165952
    Abstract: A multiprotocol label switching (MPLS) packet is processed by receiving an MPLS packet that has first header information including at least a first MPLS label at a first MPLS network node. A translation system is operated to obtain second header information that includes at least a second MPLS label. The MPLS packet is modified with the second header information. The MPLS packet is routed to a second MPLS network node based on the second header information.
    Type: Application
    Filed: December 29, 2003
    Publication date: July 28, 2005
    Inventor: Thomas Anschutz
  • Publication number: 20050147096
    Abstract: A multiprotocol label switching (MPLS) network, is operated by defining a first label switched path (LSP) between a first label switched router (LSR) and a second label switched router (LSR) in the MPLS network. A second LSP is defined between the first LSR and the second LSR in the MPLS network. Basic service packet traffic is routed from the first LSR to the second LSR using the first LSP and enhanced service packet traffic is routed from the first LSR to the second LSR using the second LSP.
    Type: Application
    Filed: December 29, 2003
    Publication date: July 7, 2005
    Inventors: Thomas Anschutz, James Rembert
  • Publication number: 20050030975
    Abstract: Methods and systems provide network access service for a subscriber by utilizing multiple asymmetric DSL modems per service point such that the available bandwidth is the aggregation of the multiple asymmetric DSL modems. One asymmetric DSL modem of a service point has a faster upload speed than download speed while another asymmetric DSL modem of the service point has a faster download speed than upload speed. The two asymmetric DSL modems are aggregated together at the service endpoint so that the service endpoint benefits from the upload and download bandwidth available from both asymmetric DSL modems. The two asymmetric DSL modems at one service point communicate with two asymmetric DSL modems aggregated at another service point to complete the exchange of data.
    Type: Application
    Filed: August 7, 2003
    Publication date: February 10, 2005
    Inventors: Steven Wright, Thomas Anschutz
  • Publication number: 20050030974
    Abstract: Methods and systems provide for the aggregation of Ethernet communications. An Ethernet switch communicates with a network device such as a router or a computer over an Ethernet connection and also communicates with two communications devices such as DSL and/or cable modems over Ethernet connections. Thus, the upload and download speeds available for transporting communications to and from the network device result from the upload and download speeds of the two communications devices in aggregate, as opposed to the upload and download speeds of a single communications device. The two communications devices may communicate with two more communications devices such as those of a service provider network that also have Ethernet connections aggregated at an Ethernet switch to provide access to an Ethernet network for a subscriber. Additionally, the Ethernet switching and communications devices may be incorporated into a single Ethernet aggregation device.
    Type: Application
    Filed: August 7, 2003
    Publication date: February 10, 2005
    Inventors: Steven Wright, Thomas Anschutz
  • Publication number: 20050033797
    Abstract: Methods and systems provide an asymmetric Ethernet service. An Ethernet network transports Ethernet frames over an asymmetric connection to a point of service for a subscriber located remotely from the Ethernet network, and the Ethernet connection is asymmetric in that the effective data transfer rates for uploading and downloading of data over the Ethernet connection are different. The subscriber may then have Ethernet capable network devices such as routers and computers linked to the point of service so that data transfer between the network devices of the subscriber and the Ethernet network occurs over the asymmetric Ethernet connection. The Ethernet network allows for communication between the network devices of the subscriber and any desired Ethernet network resources, such as network resources located on the Ethernet network or resources of downstream networks such as the global Internet that are available through the Ethernet network.
    Type: Application
    Filed: August 7, 2003
    Publication date: February 10, 2005
    Inventors: Steven Wright, Thomas Anschutz
  • Publication number: 20050025136
    Abstract: Voice over Internet Protocol (VoIP) service is established in a network that that includes a Regional/Access Network (RAN) that facilitates differentiated end-to-end data transport between an Application Service Provider (ASP) and a Customer Premises Network (CPN) that includes Customer Premises Equipment (CPE). Application Programming interface (API) calls are used at the ASP to communicate with the RAN to establish VoIP service for the user having a user selected bandwidth and/or QoS associated therewith.
    Type: Application
    Filed: September 3, 2004
    Publication date: February 3, 2005
    Inventors: Thomas Anschutz, Nicholas Huslak, Edgar Shrum
  • Publication number: 20050021716
    Abstract: A Regional/Access Network (RAN) receives an application flow control request from a Network Service Provider (NSP) and/or an Application Service Provider (ASP). The application flow control request includes a request to determine bandwidth and/or QoS associated with a subscriber ID. The bandwidth and/or QoS associated with the subscriber ID is determined, and is sent from the RAN to the NSP and/or the ASP.
    Type: Application
    Filed: April 29, 2004
    Publication date: January 27, 2005
    Inventors: Maria Adamczyk, Jeffrey Cassanova, Thomas Anschutz, Edgar Shrum, Steven Wright, Li Zhang
  • Publication number: 20050015493
    Abstract: Methods, systems and/or computer program products are provided for managing Quality of Service (QoS) and/or bandwidth allocation in a Regional/Access Network (RAN) having a broadband access server (BRAS) that facilitates differentiated end-to-end data transport between a Network Service Provider (NSP) and/or an Application Service Provider (ASP), and a Customer Premises Network (CPN) that includes a Routing Gateway (RG). In particular embodiments of the present invention, a modify QoS and/or bandwidth allocation message including updated QoS and/or bandwidth information from the NSP and/or ASP is received at the RAN. The BRAS is updated with the QoS and/or bandwidth information and the RG is also updated with the QoS and/or bandwidth information.
    Type: Application
    Filed: November 19, 2003
    Publication date: January 20, 2005
    Inventors: Thomas Anschutz, Jeffrey Cassanova, Edgar Shrum, Steven Wright, Li Zhang
  • Publication number: 20050015494
    Abstract: Data architectures provide for managing Quality of Service (QoS) and/or bandwidth allocation in a Regional/Access Network (RAN) that provides end-to-end transport between a Network Service Provider (NSP) and/or an Application Service Provider (ASP), and a Customer Premises Network (CPN) that includes a Routing Gateway (RG). The data architecture includes a NSP access session record maintained at the RAN that defines QoS and/or bandwidth allocation for an access session, such as a Point-to-Point (PPP) access session, associated with the RG and the NSP. A corresponding NSP access session record is maintained at the NSP associated with the access session. The NSP access session record at the RAN and the corresponding NSP access session record at the NSP both define a QoS and/or bandwidth allocation specified by the NSP associated with the session or both define a QoS and/or bandwidth allocation specified by the RAN.
    Type: Application
    Filed: November 24, 2003
    Publication date: January 20, 2005
    Inventors: Maria Adamczyk, Thomas Anschutz, Sammie Hill, Edgar Shrum, Li Zhang
  • Publication number: 20050002335
    Abstract: A method of operating a data network may include establishing a data path through the data network between a routing gateway for a subscriber of the data network and a service provider providing a data service. Moreover, the data service may be provided for use at the routing gateway over the data path during a data session. A request may be received from the service provider wherein the request defines a data flow characteristic for the data path between the routing gateway and the service provider providing the data service during the data session. The data flow characteristic may then be transmitted to a node along the data path between the routing gateway and the service provider for enforcement of the data flow characteristic for the data path at the node. More particularly, the data session may be a point-to-point protocol data session. Related methods, data networks, data service providers, routing gateways, and computer program products are also discussed.
    Type: Application
    Filed: April 30, 2004
    Publication date: January 6, 2005
    Inventors: Maria Adamczyk, Thomas Anschutz, Alan Blackburn, Jeffrey Cassanova, Sammie Hill, Scott Holt, Nicholas Huslak, Arnold McQuaide, Edgar Shrum, Scott Stillman, Steven Wright, Li Zhang
  • Publication number: 20040221178
    Abstract: A broad-scope intrusion detection system analyzes traffic coming into multiple hosts or other customers' computers or sites. This provides additional data for analysis as compared to systems that just analyze the traffic coming into one customer's site. Additional detection schemes can be used to recognize patterns that would otherwise be difficult or impossible to recognize with just a single customer detector. Standard signature detection methods can be used. Additionally, new signatures can be used based on broad-scope analysis goals. An anomaly is detected in the computer system, and then it is determined which devices or devices are anticipated to be affected by the anomaly in the future. These anticipated devices are then alerted to the potential for the future anomaly. The anomaly can be an intrusion or an intrusion attempt or reconnaissance activity.
    Type: Application
    Filed: March 29, 2004
    Publication date: November 4, 2004
    Inventors: Jeffrey A. Aaron, Thomas Anschutz
  • Patent number: 6715084
    Abstract: A broad-scope intrusion detection system analyzes traffic coming into multiple hosts or other customers' computers or sites. This provides additional data for analysis as compared to systems that just analyze the traffic coming into one customer's site. Additional detection schemes can be used to recognize patterns that would otherwise be difficult or impossible to recognize with just a single customer detector. Standard signature detection methods can be used. Additionally, new signatures can be used based on broad-scope analysis goals. An anomaly is detected in the computer system, and then it is determined which devices or devices are anticipated to be affected by the anomaly in the future. These anticipated devices are then alerted to the potential for the future anomaly. The anomaly can be an intrusion or an intrusion attempt or reconnaissance activity.
    Type: Grant
    Filed: March 26, 2002
    Date of Patent: March 30, 2004
    Assignee: BellSouth Intellectual Property Corporation
    Inventors: Jeffrey A. Aaron, Thomas Anschutz
  • Publication number: 20030188191
    Abstract: A broad-scope intrusion detection system analyzes traffic coming into multiple hosts or other customers' computers or sites. This provides additional data for analysis as compared to systems that just analyze the traffic coming into one customer's site. Additional detection schemes can be used to recognize patterns that would otherwise be difficult or impossible to recognize with just a single customer detector. Standard signature detection methods can be used. Additionally, new signatures can be used based on broad-scope analysis goals. An anomaly is detected in the computer system, and then it is determined which devices or devices are anticipated to be affected by the anomaly in the future. These anticipated devices are then alerted to the potential for the future anomaly. The anomaly can be an intrusion or an intrusion attempt or reconnaissance activity.
    Type: Application
    Filed: March 26, 2002
    Publication date: October 2, 2003
    Inventors: Jeffrey A. Aaron, Thomas Anschutz
  • Publication number: 20030188190
    Abstract: A broad-scope intrusion detection system analyzes traffic coming into multiple hosts or other customers' computers or sites. This provides additional data for analysis as compared to systems that just analyze the traffic coming into one customer's site. Additional detection schemes can be used to recognize patterns that would otherwise be difficult or impossible to recognize with just a single customer detector. Standard signature detection methods can be used. Additionally, new signatures can be used based on broad-scope analysis goals.
    Type: Application
    Filed: March 26, 2002
    Publication date: October 2, 2003
    Inventors: Jeffrey A. Aaron, Thomas Anschutz