Patents by Inventor William Robert CHESWICK

William Robert CHESWICK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120011575
    Abstract: Methods, systems, and products authenticate a user to a device. A user selects or submits a media file for authentication. Features in the media file are compared to a set of criteria for authentication. The number of matching criteria, that are within a range of values for each criterion in the set of criteria, are determined. The number of matching criteria is compared to a threshold value. When the number of matching criteria equals or exceeds the threshold value, then the user that selected or submitted the media file is authenticated.
    Type: Application
    Filed: July 9, 2010
    Publication date: January 12, 2012
    Inventors: William Roberts Cheswick, David Kormann
  • Publication number: 20110249004
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a visualization of video content. The method includes receiving video content, receiving user input associated with the received video content, extracting each frame in the video content, processing the extracted frames based on the received user input, and outputting a still image including each of the processed extracted frames positioned sequentially. The still image can include a histogram of sound data associated with the processed extracted frames. The user input can indicate an image adjustment to be applied when processing the extracted frames, a number of frames of video content per column, a paper size, and/or a frame size. The frames can be positioned sequentially in columns and/or rows. The image can be output as an image file or on a printable medium. The image can contain more than one video clip, such as films in a trilogy.
    Type: Application
    Filed: April 13, 2010
    Publication date: October 13, 2011
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: William Roberts CHESWICK
  • Publication number: 20110107400
    Abstract: A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party.
    Type: Application
    Filed: October 29, 2009
    Publication date: May 5, 2011
    Inventors: Nemmara K. Shankaranarayanan, William Roberts Cheswick
  • Publication number: 20110072510
    Abstract: Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application.
    Type: Application
    Filed: September 23, 2009
    Publication date: March 24, 2011
    Inventor: William Roberts Cheswick
  • Publication number: 20100250969
    Abstract: Encryption with keys that form an Abelian group are used in combination with a semi-trusted party that converts queries that are encrypted with the key of a querier to queries that are encrypted with the key of the encrypted database, without knowing the actual keys. In an illustrative embodiment, encryption is done with Bloom filters that employ Pohlig-Hellman encryption. Since the querier's key is not divulged, neither the semi-trusted party nor the publisher of the database can see the original queries. Provision can be made for fourth party “warrant servers”, as well as “censorship sets” that limit the data to be shared.
    Type: Application
    Filed: June 18, 2009
    Publication date: September 30, 2010
    Inventors: Steven Michael Bellovin, William Roberts Cheswick
  • Publication number: 20100156760
    Abstract: A method and system for controlling display of multimedia content. A request to display a multimedia program is received, a motion state of a display enablement device (DED) is determined, and based on the motion state of the DED, a determination is made whether to respond to the display request by providing the multimedia program for display. A determination may be made to provide the multimedia program for display for so long as the motion state of the DED is continually changed. A determination may also be made to provide the multimedia content for so long as the motion state of the DED is continually changed in accordance with a selected pattern. A determination may also be made to provide the multimedia content if a relatively constant motion state of the DED is maintained for a selected time period.
    Type: Application
    Filed: December 19, 2008
    Publication date: June 24, 2010
    Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: William Roberts Cheswick
  • Publication number: 20100150407
    Abstract: Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for matching faces. The method includes receiving an image of a face of a first person from a device of a second person, comparing the image of the face of the first person to a database of known faces in a contacts list of the second person, identifying a group of potential matching faces from the database of known faces, and displaying to the second person the group of potential matching faces. In one variation, the method receives input selecting one face from the group of potential matching faces and displays additional information about the selected one face. In a related variation, the method displays additional information about one or more face in the displayed group of potential matching faces without receiving input.
    Type: Application
    Filed: December 12, 2008
    Publication date: June 17, 2010
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: William Roberts CHESWICK
  • Publication number: 20100083378
    Abstract: Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer system are provided herein. An invasion of the computer system is detected and a contextually appropriate alert is selected from a set of alerts. The alert is played immediately upon detection of the invasion so that the user is alerted to the invasion within close temporal proximity to the user's action that resulted in the invasion of the computer system. In addition, details of the invasion are logged to a diagnostic log file for later use by support personnel in repairing the computer system.
    Type: Application
    Filed: September 29, 2008
    Publication date: April 1, 2010
    Inventor: William Roberts Cheswick
  • Patent number: 7558970
    Abstract: Encryption with keys that form an Abelian group are used in combination with a semi-trusted party that converts queries that are encrypted with the key of a querier to queries that are encrypted with the key of the encrypted database, without knowing the actual keys. In an illustrative embodiment, encryption is done with Bloom filters that employ Pohlig-Hellman encryption. Since the querier's key is not divulged, neither the semi-trusted party nor the publisher of the database can see the original queries. Provision can be made for fourth party “warrant servers”, as well as “censorship sets” that limit the data to be shared.
    Type: Grant
    Filed: January 8, 2005
    Date of Patent: July 7, 2009
    Assignee: AT&T Corp.
    Inventors: Steven Michael Bellovin, William Roberts Cheswick
  • Publication number: 20020090089
    Abstract: Techniques for secure connections between wireless network clients and wired network resources are described. An insecure wireless network comprising a plurality of wireless access points provides a connection for wireless network clients to a wired network server which in turn provides controlled access to a wired network. When a wireless network user wishes to connect to the wired network, the user provides authentication information to the wired network server through the wireless network client and the wireless network access point. Once the wired network server has verified the authentication information, the wired network server provides the wireless network client with a temporary wired network address as well as a unique session encryption key, which is used to encrypt all data transferred between the wireless network client and the wired network server during a connection session.
    Type: Application
    Filed: January 5, 2001
    Publication date: July 11, 2002
    Inventors: Steven Branigan, William Roberts Cheswick
  • Patent number: 6397270
    Abstract: A system for secure data transfer using a dual-access disk drive. The disk drive is connected to a first computer and a second computer. The first computer may be connected to a first network and the second computer may be connected to a second network. Each of the first computer and the second computer has write access to a portion of the disk drive, different from the portion to which the other computer has write access, and read access to the entire disk drive. The first computer transfers data to the second computer by placing data on the disk to be read by the second computer. Similarly, the second computer transfers data to the first computer by placing data on the disk to be read by the first computer. The first computer and the second computer can transfer data without any direct physical connection or communication. The disk drive is adapted to control access, preventing conflicting attempts at access by the first disk drive and the second disk drive.
    Type: Grant
    Filed: January 5, 1999
    Date of Patent: May 28, 2002
    Assignee: Agere Systems Guardian Corp.
    Inventor: William Roberts Cheswick
  • Patent number: 5958052
    Abstract: A device and method filter information to restrict access to private information of a domain in a domain name system. The device includes a filtering device. The filtering device filters information received from devices external to the domain by removing the private information before forwarding the information to devices within the domain. The private information includes IP addresses and domain names. The private information also includes any additional information appended to legitimate responses to requests from devices in the domain.
    Type: Grant
    Filed: July 16, 1996
    Date of Patent: September 28, 1999
    Assignee: AT&T Corp
    Inventors: Steven Michael Bellovin, William Roberts Cheswick
  • Patent number: 5805820
    Abstract: A device and method redirect query requests to restrict access to private information of a domain in a domain name system. The device includes a switching device that redirects query requests for the private information from within the domain to a device within the domain. The private information includes IP addresses and domain names. All the devices in the domain may be modified to direct all query requests to the switching device or the switching device may be incorporated into a firewall of the domain.
    Type: Grant
    Filed: July 15, 1996
    Date of Patent: September 8, 1998
    Assignee: AT&T Corp.
    Inventors: Steven Michael Bellovin, William Roberts Cheswick
  • Patent number: H1944
    Abstract: A technique for the delivering a client-based firewall. A firewall security device is configured for connecting to individual clients, e.g., personal computers, for providing firewall security measures directly to the client. The firewall security device is configured as a electronic dongle which is attached to an external communications port of the client, e.g., the parallel communications port. The incoming communications stream to the client from, e.g., public networks, is passed through the firewall security device. In this way, the firewall security device applies and delivers a set of standard network security measures thereby protecting the client from security breaches triggered by the communications stream received from the public network. Advantageously, the firewall is delivered directly by the client without intervention, use, or connection to a separate firewall server.
    Type: Grant
    Filed: March 24, 1998
    Date of Patent: February 6, 2001
    Assignee: Lucent Technologies Inc.
    Inventors: William Roberts Cheswick, Edward G. Whitten