Patents by Inventor Donald E. Eastlake

Donald E. Eastlake has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8351352
    Abstract: Some embodiments relate to a network comprising two RBridges connected by a link where the two RBridges are not the ingress and egress RBridge for said frames, wherein said RBridges automatically exchange information as to their support of hop-by-hop reversible frame aggregation, reversible header compression, and reversible data compression, and wherein if both RBridges support any or all of these features in the same fashion, one or more of said features are automatically applied to appropriate frames at the transmitting RBridge and removed at the receiving RBridge, increasing the throughput of the link.
    Type: Grant
    Filed: July 14, 2010
    Date of Patent: January 8, 2013
    Inventor: Donald E. Eastlake, III
  • Publication number: 20120210129
    Abstract: A method for external organization path length (EOPL) validation is provided. A relying party node of an organization receives an authentication request from a subject node of an external organization. The relying party node then obtains and evaluates certificates from a chain of certificates that link the subject node to a trust anchor of the relying party node wherein, at least one certificate from the chain of certificates comprises an enabled external organization flag (EOF) and/or an external organization path length constraint (EOPLC). The relying party node invalidates authentication of the subject node when the relying party node determines that a total number of enabled EOFs from certificates in the chain of certificates exceeds the lowest EOPLC value from certificates in the chain of certificates.
    Type: Application
    Filed: April 20, 2012
    Publication date: August 16, 2012
    Applicant: MOTOROLA SOLUTIONS, INC.
    Inventors: Anthony R. Metke, Donald E. Eastlake, III
  • Publication number: 20100250922
    Abstract: A method and system enable robust and scalable propagation of trust between a first organization and a second organization, both operating in an ad hoc wireless communication network. The method includes establishing at a first member node of the first organization pair-wise trust with a first member node of the second organization using a predetermined inter-organizational trust establishment device (step 505). Next, the first member node of the first organization generates a credential for the second organization using the pair-wise trust (step 510). The credential is then distributed from the first member node of the first organization to a second member node of the first organization (step 515). The second member node of the first organization then establishes pair-wise trust with a second member node of the second organization using the credential received from the first member node of the first organization (step 520).
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: Motorola, Inc.
    Inventors: Qi Bao, Donald E. Eastlake, III, Liang Guo, Whay Chiou Lee
  • Patent number: 7793103
    Abstract: An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.
    Type: Grant
    Filed: August 15, 2006
    Date of Patent: September 7, 2010
    Assignee: Motorola, Inc.
    Inventors: Zhi Fu, Donald E. Eastlake, III, Anthony R. Metke
  • Patent number: 7734280
    Abstract: A method and apparatus for authentication in a wireless communication network is disclosed. A secret is shared between a mobile device and a home device. When a mobile device requests a connection to a remote device and the remote device does not have knowledge of the shared secret, the remote device determines whether the mobile device can connect to the remote device by concurrently sending a challenge to the mobile device and the home device. The remote device then compares the responses from the mobile device and the home device.
    Type: Grant
    Filed: October 21, 2005
    Date of Patent: June 8, 2010
    Assignee: Motorola, Inc.
    Inventor: Donald E. Eastlake, III
  • Publication number: 20100082975
    Abstract: A method and apparatus for external organization (EO) path length (EOPL) validation are provided. A relying party node (RPN) stores a current EO path length constraint (EOPLC) value, and an EOPL counter that maintains a count of an actual external organization path length. The RPN obtains a chain of certificates that link a subject node (SN) to its trust anchor, and processes the certificates in the chain. When a certificate has a lower EOPLC than the current EOPLC value, the RPN replaces the current EOPLC value with the lower EOPLC. When the certificate currently being evaluated includes an enabled EO flag, the RPN increments the EOPL counter by one. The EOPL validation fails when the EOPL counter is greater than the current EOPLC value, and is successful when the last remaining certificate in the chain is processed without having the EOPL counter exceed the current EOPLC value.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Applicant: Motorola, Inc.
    Inventors: Anthony R. Metke, Donald E. Eastlake, III
  • Publication number: 20090276841
    Abstract: A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
    Type: Application
    Filed: April 30, 2008
    Publication date: November 5, 2009
    Applicant: MOTOROLA, INC.
    Inventors: Liang Guo, Qi Bao, Donald E. Eastlake, III, Whay Chiou Lee, Anthony R. Metke
  • Patent number: 7571479
    Abstract: A method and apparatus which defends a host, which is coupled to the Internet, via a defensive firewall/router, against a denial of service attack. The technique includes periodically determining the status of the host, storing the status of the host, receiving at the defensive firewall/router a request from an entity on the Internet for service from the host, and responding to the entity in accordance with the stored status. The period that is set is not related to the request.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: August 4, 2009
    Assignee: General Instrument Corporation
    Inventor: Donald E. Eastlake, III
  • Patent number: 7561551
    Abstract: A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutually authenticating a first node operating in the first network and a second node operating in the second network (step 205). A unification message is then transmitted from the first node to a third node operating in the second network, where the unification message indicates that the first node is authenticated with the second network (step 210). In response to the unification message, authentication messages from the third node and the second node are then relayed through the first node, for mutually authenticating the third node and the second node (step 215).
    Type: Grant
    Filed: April 25, 2006
    Date of Patent: July 14, 2009
    Assignee: Motorola, Inc.
    Inventors: Anthony R. Metke, Donald E. Eastlake, III, Zhi Fu
  • Publication number: 20090164785
    Abstract: A method authenticates a first node to a communication network that includes a second node to which the first node desires to mutually authenticate. The method includes detecting a broadcast message from the second node and determining whether mutual authentication can be performed directly with the second node. When the first node is unable to mutually authenticate to the second node directly, the first node locates a node that can serve as an authentication bridge to authenticate the first node to the communication network.
    Type: Application
    Filed: December 20, 2007
    Publication date: June 25, 2009
    Applicant: MOTOROLA, INC.
    Inventors: ANTHONY R. METKE, DONALD E. EASTLAKE, III
  • Publication number: 20080046716
    Abstract: A portable electronic device is operable as a portable certification authority. The portable electronic device stores a pair of keys of a public key infrastructure, issued by a parent certification authority and generates a certificate dependent upon the pair of keys. The private key and corresponding public key certificate are transmitted to a network device of a second agency to allow the device to be authenticated by any node of the network of the first agency that posses anchor information of the parent certification authority. This enables the device of the second agency to be authenticated by a network node of the first agency.
    Type: Application
    Filed: August 18, 2006
    Publication date: February 21, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Donald E. Eastlake, Anthony R. Metke
  • Publication number: 20080046732
    Abstract: An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.
    Type: Application
    Filed: August 15, 2006
    Publication date: February 21, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Zhi Fu, Donald E. Eastlake, Anthony R. Metke
  • Publication number: 20080010463
    Abstract: A truncated message digest of length L bits is generated from a message by preprocessing the message dependent upon the value L to obtain a modified message. As part of the preprocessing, the message is lengthened by insertion of additional values. A full length message digest is generated from the modified message and the truncated message digest is obtained by truncating the full length message digest to L bits. This approach results in truncated message digests that are secure and provide a large range of truncation options.
    Type: Application
    Filed: July 10, 2006
    Publication date: January 10, 2008
    Applicant: MOTOROLA, INC.
    Inventor: Donald E. Eastlake
  • Publication number: 20070280481
    Abstract: A system and method of providing security in a wireless network is provided. A plurality of pre-shared keys is created. Each pre-shared key provides access to the wireless network. A list of the plurality of pre-shared keys is transmitted to an access point device in the wireless network so that the access point device can authenticate a station attempting to access the network by performing an analysis with the list of the plurality of pre-shared keys.
    Type: Application
    Filed: June 6, 2006
    Publication date: December 6, 2007
    Inventors: Donald E. Eastlake, George A. Harvey, Minh N. Hoang
  • Publication number: 20070283153
    Abstract: A method and system for mutually authenticating a first node and a second node operating in a wireless communication network enables mutual authentication when the first node and the second node are unable to directly authenticate each other. The method includes identifying, at the first node, a third node that can authenticate both the first node and the second node (step 215). Authentication data for authenticating the first node with the third node is then transmitted from the first node to the third node (step 220). Keying material that is received from the third node is then processed at the first node (step 225). A shared secret mutual authentication protocol is then processed, whereby the first node and the second node are mutually authenticated by proving that they each have authenticated with the third node and each have the keying material (step 230).
    Type: Application
    Filed: May 30, 2006
    Publication date: December 6, 2007
    Applicant: MOTOROLA, INC.
    Inventors: Anthony R. Metke, Donald E. Eastlake, Zhi Fu
  • Patent number: 7162740
    Abstract: A method for defending a host, which is coupled to the Internet via a defensive firewall/router, against a denial of service attack, comprises periodically determining the status of the host; storing the status of the host; receiving at the defensive firewall/router a request from an entity on the Internet for service from the host; and responding to the entity in accordance with the stored status. The period that is set is not related to the request.
    Type: Grant
    Filed: July 22, 2002
    Date of Patent: January 9, 2007
    Assignee: General Instrument Corporation
    Inventor: Donald E. Eastlake, III
  • Publication number: 20040264702
    Abstract: A method and apparatus for producing a cryptographic key is provided herein. In accordance with the preferred embodiment of the present invention information is embedded within the cryptographic key so that there exists no way to remove the information from the key and have the key function. Since the cryptographic key is generated comprising information embedded within the key, one will be able to determine information about the key simply by analyzing the key itself.
    Type: Application
    Filed: June 30, 2003
    Publication date: December 30, 2004
    Inventor: Donald E. Eastlake
  • Publication number: 20040015721
    Abstract: A method for defending a host, which is coupled to the Internet via a defensive firewall/router, against a denial of service attack, comprises periodically determining the status of the host; storing the status of the host; receiving at the defensive firewall/router a request from an entity on the Internet for service from the host; and responding to the entity in accordance with the stored status. The period that is set is not related to the request.
    Type: Application
    Filed: July 22, 2002
    Publication date: January 22, 2004
    Applicant: General Instrument Corporation
    Inventor: Donald E. Eastlake
  • Patent number: 5568554
    Abstract: A method of transferring data to insure data authenticity is provided comprising the steps of providing a first computer system, the first computer system having a mass storage device, a central processing unit having a encoding/decoding device, and a communication device, providing a second computer system, the second computer system having a mass storage device, a central processing unit having a encoding/decoding device, and a communication device, linking the first computer system to the second computer system via a network communications link, providing a database on the mass storage device of the first computer system, the database containing a plurality of records, selecting a subset of the plurality of records, encoding said subset into a signet, transferring the signet to the second computer system over the network communications link, transferring the subset to the second computer system over the network communications link, transferring the subset to the second computer system over the network comm
    Type: Grant
    Filed: January 31, 1995
    Date of Patent: October 22, 1996
    Assignee: Digital Equipment Corporation
    Inventor: Donald E. Eastlake, 3rd