-
公开(公告)号:US20230110418A1
公开(公告)日:2023-04-13
申请号:US17822231
申请日:2022-08-25
Applicant: CenturyLink Intellectual Property LLC
Inventor: Dean Ballew , John R.B. Woodworth
IPC: H04L41/12
Abstract: In examples, a first Anycast advertisement is received from a first server identifying the first server as a primary address for a service. In addition, a second Anycast advertisement is received from the first server identifying the first server as a secondary address for the service. Further, a third Anycast advertisement is received from a second server identifying the second server as the secondary address for the service. A first community advertisement is also from the first server identifying the first server as a member of a first community. Thereafter, a first request is received from a client including the primary address, and the request is routed to the first server. When a second request from the client is received including the secondary address, based at least on the community advertisement, the first server is ignored, and the second request is routed to the second server.
-
公开(公告)号:US20220329625A1
公开(公告)日:2022-10-13
申请号:US17657381
申请日:2022-03-31
Applicant: CenturyLink Intellectual Property LLC
Inventor: Dean Ballew , John R.B. Woodworth , John A. Schiel
IPC: H04L9/40
Abstract: Examples of the present disclosure describe systems and methods for providing security against IP spoofing. In aspects, network traffic associated with one or more data requests may be received by a device in a computing environment. The network traffic may be evaluated using one or more automated logic systems or algorithms to identify suspicious or malicious behavior. The automated logic systems or algorithms may implement one or more analyses, such as asymmetric routing analysis, hardware device analysis, user and/or network behavior analysis, etc. Upon identifying suspicious or malicious behavior, the automated logic systems or algorithms may apply a filter to one or more computing devices. For example, a filter for blocking network traffic associated with the suspicious or malicious behavior may be applied to a computing device that is in close geographic and/or logical proximity to an attacking computing device.
-
公开(公告)号:US20180006824A1
公开(公告)日:2018-01-04
申请号:US15688364
申请日:2017-08-28
Applicant: CenturyLink Intellectual Property LLC
Inventor: John R. Woodworth , Dean Ballew , Shashwath Bindinganaveli Raghavan
IPC: H04L9/32
CPC classification number: H04L9/3247 , H04L9/3242 , H04L2209/68
Abstract: A system for numeric pattern normalization for cryptographic signatures is provided. The system includes a resolving client, and an at least one signature server. The at least one signature server includes at least one processor and non-transitory computer readable media having encoded thereon computer software comprising a set of instructions executable by the at least one processor. The set of instructions may be executed by the signature server to generate a message to be transmitted to a resolving client, normalize the message via numeric pattern normalization, generate a hash value for the normalized message, and generate a cryptographic signature based on the hash value. The signature server may then generate a signed message having the message signed with the cryptographic signature, and transmit the signed message to the resolving client.
-
公开(公告)号:US20250168242A1
公开(公告)日:2025-05-22
申请号:US19028106
申请日:2025-01-17
Applicant: CenturyLink Intellectual Property LLC
Inventor: John R.B. Woodworth , Dean Ballew
IPC: H04L67/148 , H04L9/40 , H04L61/5007 , H04L67/141
Abstract: In a system with a plurality of servers serving one or more clients, situations may arise in which a client has a connection to a first server which is providing a service to the client, and in which it would be advantageous to transfer the connection to a second server, in a manner that does not require the re-establishing of the connection or the making of a renewed request, by the client, for the service. As such, a system and method for transferring a client connection from one server to another server are provided.
-
公开(公告)号:US20250086510A1
公开(公告)日:2025-03-13
申请号:US18829449
申请日:2024-09-10
Applicant: CenturyLink Intellectual Property LLC
Inventor: Kevin M. McBride , Sotiri Terry Barbounis , Scott Brindamour , Charles Stallings , John R.B. Woodworth , Dean Ballew , Brian J. Strong , Frank Moss
IPC: G06N20/00
Abstract: Novel tools and techniques are provided for implementing Inference as a Service. In various embodiments, a computing system may receive a request to perform an AI/ML task on first data, the request including desired parameters, in some cases, without information regarding any of specific hardware, specific hardware type, specific location, or specific network for providing network services for performing the requested AI/ML task. The computing system may identify edge compute nodes within a network based on the desired parameters and/or unused processing capacity of each node. The computing system may identify AI/ML pipelines capable of performing the AI/ML task, the pipelines including neural networks utilizing pre-trained AI/ML models. The computing system may cause the identified nodes to run the identified pipelines to perform the AI/ML task. In response to receiving inference results from the identified pipelines, the computing system may send, store, and/or cause display of the received inference results.
-
公开(公告)号:US20250039213A1
公开(公告)日:2025-01-30
申请号:US18917317
申请日:2024-10-16
Applicant: CenturyLink Intellectual Property LLC
Inventor: John R.B. Woodworth , Dean Ballew
IPC: H04L9/40
Abstract: Example systems and methods permit threat intelligence to be determined and used at a local, regional, and/or global level in a communications network. A threat intelligence system may collect traffic information from local computing systems and analyze it for malicious traffic. If a measure of malicious traffic in a local computing system is reached, mitigation actions may be taken in that local computing system. In addition, threat measures may be amplified in other local computing systems, other regions, or globally in the network, in order to more quickly react to a known threat as it may spread in a network.
-
公开(公告)号:US12206740B2
公开(公告)日:2025-01-21
申请号:US17936134
申请日:2022-09-28
Applicant: CenturyLink Intellectual Property LLC
Inventor: John R. B. Woodworth , Dean Ballew
IPC: H04L67/148 , H04L9/40 , H04L61/5007 , H04L67/141
Abstract: In a system with a plurality of servers serving one or more clients, situations may arise in which a client has a connection to a first server which is providing a service to the client, and in which it would be advantageous to transfer the connection to a second server, in a manner that does not require the re-establishing of the connection or the making of a renewed request, by the client, for the service. As such, a system and method for transferring a client connection from one server to another server are provided.
-
48.
公开(公告)号:US20240380749A1
公开(公告)日:2024-11-14
申请号:US18647847
申请日:2024-04-26
Applicant: CenturyLink Intellectual Property LLC
Inventor: John R.B. Woodworth , Dean Ballew
IPC: H04L9/40 , H04L41/0866
Abstract: Configuration changes to the configurations of end devices in a network may be made by configuration devices, which may set up connections with the end devices and send configuration commands to the end devices. In such a system, the compromising of a configuration device may make it possible for an attacker to reconfigure end devices. Systems and methods to improve network security via a consensus-driven configuration plane are provided.
-
公开(公告)号:US20240379128A1
公开(公告)日:2024-11-14
申请号:US18652110
申请日:2024-05-01
Applicant: CenturyLink Intellectual Property LLC
Inventor: John R.B. Woodworth , Dean Ballew
IPC: G11B27/031
Abstract: Systems and methods for providing category-based media editing. A media editing service may include an artificial-intelligence/machine-learning editor trained to recognize patterns and characteristics of various attributes of various categories. A user of a streaming service may select a media item and further select a category that may be related to a current content. The streaming service may user the editor to detect occurrences of attributes of the selected category in the media item and to generate editing instructions to obfuscate, hide, remove, skip, or replace detected content with other content based on various filter settings. For instance, the editing instructions may be used to edit the media item such that undesired content including attributes of the selected category may be filtered.
-
公开(公告)号:US20240372892A1
公开(公告)日:2024-11-07
申请号:US18631514
申请日:2024-04-10
Applicant: CenturyLink Intellectual Property LLC
Inventor: Dean Ballew , John R.B. Woodworth
IPC: H04L9/40 , H04L45/74 , H04L61/4511
Abstract: Distributed denial of service (DDOS) attacks may occur in various networks and may target any of various servers. A DDOS attack on a server in a first autonomous system may be launched from within another autonomous system, or from within the same autonomous system. Some autonomous systems may include threat mitigations systems, whereas some autonomous system may lack threat mitigations systems. As such, systems and methods to redirect DDOS attack using remote mitigation tools are provided.
-
-
-
-
-
-
-
-
-