Patents by Inventor William Cheswick

William Cheswick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8699378
    Abstract: Methods and apparatus for discovering hosts on an Internet Protocol (IP) version 6 (IPv6) network are disclosed. An example implementation includes probing a network to determine an Internet Protocol (IP) version 4 (IPv4) address that is in use on the network; determining a Media Access Control (MAC) address associated with the IPv4 address; determining a local-prefix; determining a first IP version 6 (IPv6) address, the first IPv6 address including the MAC address and the local-prefix; determining a second IPv6 address, the second IPv6 address including the MAC address and the local-prefix and the second IPv6 address being different than the first IPv6 address; probing the network to determine if the first IPv6 address is in use; probing the network to determine if the second IPv6 address is in use; and storing an indication of whether at least one of the first or second IPv6 address is in use.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: April 15, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: David Kormann, William Cheswick
  • Publication number: 20110075590
    Abstract: Methods and apparatus for discovering hosts on an Internet Protocol (IP) version 6 (IPv6) network are disclosed. An example implementation includes probing a network to determine an Internet Protocol (IP) version 4 (IPv4) address that is in use on the network; determining a Media Access Control (MAC) address associated with the IPv4 address; determining a local-prefix; determining a first IP version 6 (IPv6) address, the first IPv6 address including the MAC address and the local-prefix; determining a second IPv6 address, the second IPv6 address including the MAC address and the local-prefix and the second IPv6 address being different than the first IPv6 address; probing the network to determine if the first IPv6 address is in use; probing the network to determine if the second IPv6 address is in use; and storing an indication of whether at least one of the first or second IPv6 address is in use.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Inventors: David Kormann, William Cheswick
  • Patent number: 7813344
    Abstract: A communications network circuit through which data packets are flowing is identified by detecting a first message data packet inserted into the data packet flow by a user, and determining an endpoint destination address of the detected data packet. The circuit using the endpoint destination address is identified and a second message data packet containing the circuit identification information is sent to the destination address. A covert timing channel may be created, and one or more data packets containing circuit identification information may be sent through the covert channel.
    Type: Grant
    Filed: December 17, 2008
    Date of Patent: October 12, 2010
    Assignee: AT&T Intellectual Property I, LP
    Inventor: William Cheswick
  • Publication number: 20100150153
    Abstract: A communications network circuit through which data packets are flowing is identified by detecting a first message data packet inserted into the data packet flow by a user, and determining an endpoint destination address of the detected data packet. The circuit using the endpoint destination address is identified and a second message data packet containing the circuit identification information is sent to the destination address. A covert timing channel may be created, and one or more data packets containing circuit identification information may be sent through the covert channel.
    Type: Application
    Filed: December 17, 2008
    Publication date: June 17, 2010
    Inventor: William Cheswick
  • Publication number: 20050166046
    Abstract: Encryption with keys that form an Abelian group are used in combination with a semi-trusted party that converts queries that are encrypted with the key of a querier to queries that are encrypted with the key of the encrypted database, without knowing the actual keys. In an illustrative embodiment, encryption is done with Bloom filters that employ Pohlig-Hellman encryption. Since the querier's key is not divulged, neither the semi-trusted party nor the publisher of the database can see the original queries. Provision can be made for fourth party “warrant servers”, as well as “censorship sets” that limit the data to be shared.
    Type: Application
    Filed: January 8, 2005
    Publication date: July 28, 2005
    Inventors: Steven Bellovin, William Cheswick