Patents by Inventor Donald E. Eastlake
Donald E. Eastlake has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8351352Abstract: Some embodiments relate to a network comprising two RBridges connected by a link where the two RBridges are not the ingress and egress RBridge for said frames, wherein said RBridges automatically exchange information as to their support of hop-by-hop reversible frame aggregation, reversible header compression, and reversible data compression, and wherein if both RBridges support any or all of these features in the same fashion, one or more of said features are automatically applied to appropriate frames at the transmitting RBridge and removed at the receiving RBridge, increasing the throughput of the link.Type: GrantFiled: July 14, 2010Date of Patent: January 8, 2013Inventor: Donald E. Eastlake, III
-
Publication number: 20120210129Abstract: A method for external organization path length (EOPL) validation is provided. A relying party node of an organization receives an authentication request from a subject node of an external organization. The relying party node then obtains and evaluates certificates from a chain of certificates that link the subject node to a trust anchor of the relying party node wherein, at least one certificate from the chain of certificates comprises an enabled external organization flag (EOF) and/or an external organization path length constraint (EOPLC). The relying party node invalidates authentication of the subject node when the relying party node determines that a total number of enabled EOFs from certificates in the chain of certificates exceeds the lowest EOPLC value from certificates in the chain of certificates.Type: ApplicationFiled: April 20, 2012Publication date: August 16, 2012Applicant: MOTOROLA SOLUTIONS, INC.Inventors: Anthony R. Metke, Donald E. Eastlake, III
-
Publication number: 20100250922Abstract: A method and system enable robust and scalable propagation of trust between a first organization and a second organization, both operating in an ad hoc wireless communication network. The method includes establishing at a first member node of the first organization pair-wise trust with a first member node of the second organization using a predetermined inter-organizational trust establishment device (step 505). Next, the first member node of the first organization generates a credential for the second organization using the pair-wise trust (step 510). The credential is then distributed from the first member node of the first organization to a second member node of the first organization (step 515). The second member node of the first organization then establishes pair-wise trust with a second member node of the second organization using the credential received from the first member node of the first organization (step 520).Type: ApplicationFiled: March 31, 2009Publication date: September 30, 2010Applicant: Motorola, Inc.Inventors: Qi Bao, Donald E. Eastlake, III, Liang Guo, Whay Chiou Lee
-
Patent number: 7793103Abstract: An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.Type: GrantFiled: August 15, 2006Date of Patent: September 7, 2010Assignee: Motorola, Inc.Inventors: Zhi Fu, Donald E. Eastlake, III, Anthony R. Metke
-
Patent number: 7734280Abstract: A method and apparatus for authentication in a wireless communication network is disclosed. A secret is shared between a mobile device and a home device. When a mobile device requests a connection to a remote device and the remote device does not have knowledge of the shared secret, the remote device determines whether the mobile device can connect to the remote device by concurrently sending a challenge to the mobile device and the home device. The remote device then compares the responses from the mobile device and the home device.Type: GrantFiled: October 21, 2005Date of Patent: June 8, 2010Assignee: Motorola, Inc.Inventor: Donald E. Eastlake, III
-
Publication number: 20100082975Abstract: A method and apparatus for external organization (EO) path length (EOPL) validation are provided. A relying party node (RPN) stores a current EO path length constraint (EOPLC) value, and an EOPL counter that maintains a count of an actual external organization path length. The RPN obtains a chain of certificates that link a subject node (SN) to its trust anchor, and processes the certificates in the chain. When a certificate has a lower EOPLC than the current EOPLC value, the RPN replaces the current EOPLC value with the lower EOPLC. When the certificate currently being evaluated includes an enabled EO flag, the RPN increments the EOPL counter by one. The EOPL validation fails when the EOPL counter is greater than the current EOPLC value, and is successful when the last remaining certificate in the chain is processed without having the EOPL counter exceed the current EOPLC value.Type: ApplicationFiled: September 30, 2008Publication date: April 1, 2010Applicant: Motorola, Inc.Inventors: Anthony R. Metke, Donald E. Eastlake, III
-
Publication number: 20090276841Abstract: A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).Type: ApplicationFiled: April 30, 2008Publication date: November 5, 2009Applicant: MOTOROLA, INC.Inventors: Liang Guo, Qi Bao, Donald E. Eastlake, III, Whay Chiou Lee, Anthony R. Metke
-
Patent number: 7571479Abstract: A method and apparatus which defends a host, which is coupled to the Internet, via a defensive firewall/router, against a denial of service attack. The technique includes periodically determining the status of the host, storing the status of the host, receiving at the defensive firewall/router a request from an entity on the Internet for service from the host, and responding to the entity in accordance with the stored status. The period that is set is not related to the request.Type: GrantFiled: December 21, 2006Date of Patent: August 4, 2009Assignee: General Instrument CorporationInventor: Donald E. Eastlake, III
-
Patent number: 7561551Abstract: A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutually authenticating a first node operating in the first network and a second node operating in the second network (step 205). A unification message is then transmitted from the first node to a third node operating in the second network, where the unification message indicates that the first node is authenticated with the second network (step 210). In response to the unification message, authentication messages from the third node and the second node are then relayed through the first node, for mutually authenticating the third node and the second node (step 215).Type: GrantFiled: April 25, 2006Date of Patent: July 14, 2009Assignee: Motorola, Inc.Inventors: Anthony R. Metke, Donald E. Eastlake, III, Zhi Fu
-
Publication number: 20090164785Abstract: A method authenticates a first node to a communication network that includes a second node to which the first node desires to mutually authenticate. The method includes detecting a broadcast message from the second node and determining whether mutual authentication can be performed directly with the second node. When the first node is unable to mutually authenticate to the second node directly, the first node locates a node that can serve as an authentication bridge to authenticate the first node to the communication network.Type: ApplicationFiled: December 20, 2007Publication date: June 25, 2009Applicant: MOTOROLA, INC.Inventors: ANTHONY R. METKE, DONALD E. EASTLAKE, III
-
Publication number: 20080046716Abstract: A portable electronic device is operable as a portable certification authority. The portable electronic device stores a pair of keys of a public key infrastructure, issued by a parent certification authority and generates a certificate dependent upon the pair of keys. The private key and corresponding public key certificate are transmitted to a network device of a second agency to allow the device to be authenticated by any node of the network of the first agency that posses anchor information of the parent certification authority. This enables the device of the second agency to be authenticated by a network node of the first agency.Type: ApplicationFiled: August 18, 2006Publication date: February 21, 2008Applicant: MOTOROLA, INC.Inventors: Donald E. Eastlake, Anthony R. Metke
-
Publication number: 20080046732Abstract: An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.Type: ApplicationFiled: August 15, 2006Publication date: February 21, 2008Applicant: MOTOROLA, INC.Inventors: Zhi Fu, Donald E. Eastlake, Anthony R. Metke
-
Publication number: 20080010463Abstract: A truncated message digest of length L bits is generated from a message by preprocessing the message dependent upon the value L to obtain a modified message. As part of the preprocessing, the message is lengthened by insertion of additional values. A full length message digest is generated from the modified message and the truncated message digest is obtained by truncating the full length message digest to L bits. This approach results in truncated message digests that are secure and provide a large range of truncation options.Type: ApplicationFiled: July 10, 2006Publication date: January 10, 2008Applicant: MOTOROLA, INC.Inventor: Donald E. Eastlake
-
Publication number: 20070280481Abstract: A system and method of providing security in a wireless network is provided. A plurality of pre-shared keys is created. Each pre-shared key provides access to the wireless network. A list of the plurality of pre-shared keys is transmitted to an access point device in the wireless network so that the access point device can authenticate a station attempting to access the network by performing an analysis with the list of the plurality of pre-shared keys.Type: ApplicationFiled: June 6, 2006Publication date: December 6, 2007Inventors: Donald E. Eastlake, George A. Harvey, Minh N. Hoang
-
Publication number: 20070283153Abstract: A method and system for mutually authenticating a first node and a second node operating in a wireless communication network enables mutual authentication when the first node and the second node are unable to directly authenticate each other. The method includes identifying, at the first node, a third node that can authenticate both the first node and the second node (step 215). Authentication data for authenticating the first node with the third node is then transmitted from the first node to the third node (step 220). Keying material that is received from the third node is then processed at the first node (step 225). A shared secret mutual authentication protocol is then processed, whereby the first node and the second node are mutually authenticated by proving that they each have authenticated with the third node and each have the keying material (step 230).Type: ApplicationFiled: May 30, 2006Publication date: December 6, 2007Applicant: MOTOROLA, INC.Inventors: Anthony R. Metke, Donald E. Eastlake, Zhi Fu
-
Patent number: 7162740Abstract: A method for defending a host, which is coupled to the Internet via a defensive firewall/router, against a denial of service attack, comprises periodically determining the status of the host; storing the status of the host; receiving at the defensive firewall/router a request from an entity on the Internet for service from the host; and responding to the entity in accordance with the stored status. The period that is set is not related to the request.Type: GrantFiled: July 22, 2002Date of Patent: January 9, 2007Assignee: General Instrument CorporationInventor: Donald E. Eastlake, III
-
Publication number: 20040264702Abstract: A method and apparatus for producing a cryptographic key is provided herein. In accordance with the preferred embodiment of the present invention information is embedded within the cryptographic key so that there exists no way to remove the information from the key and have the key function. Since the cryptographic key is generated comprising information embedded within the key, one will be able to determine information about the key simply by analyzing the key itself.Type: ApplicationFiled: June 30, 2003Publication date: December 30, 2004Inventor: Donald E. Eastlake
-
Publication number: 20040015721Abstract: A method for defending a host, which is coupled to the Internet via a defensive firewall/router, against a denial of service attack, comprises periodically determining the status of the host; storing the status of the host; receiving at the defensive firewall/router a request from an entity on the Internet for service from the host; and responding to the entity in accordance with the stored status. The period that is set is not related to the request.Type: ApplicationFiled: July 22, 2002Publication date: January 22, 2004Applicant: General Instrument CorporationInventor: Donald E. Eastlake
-
Patent number: 5568554Abstract: A method of transferring data to insure data authenticity is provided comprising the steps of providing a first computer system, the first computer system having a mass storage device, a central processing unit having a encoding/decoding device, and a communication device, providing a second computer system, the second computer system having a mass storage device, a central processing unit having a encoding/decoding device, and a communication device, linking the first computer system to the second computer system via a network communications link, providing a database on the mass storage device of the first computer system, the database containing a plurality of records, selecting a subset of the plurality of records, encoding said subset into a signet, transferring the signet to the second computer system over the network communications link, transferring the subset to the second computer system over the network communications link, transferring the subset to the second computer system over the network commType: GrantFiled: January 31, 1995Date of Patent: October 22, 1996Assignee: Digital Equipment CorporationInventor: Donald E. Eastlake, 3rd