Search

Donald E Eastlake

age ~45

from Winter Garden, FL

Also known as:
  • Donald E

Donald Eastlake Phones & Addresses

  • Winter Garden, FL
  • 318 Acton St, Carlisle, MA 01741 • 9782874877
  • Ashland, MA
  • 140 Forest Ave, Hudson, MA 01749 • 9785622827
  • 155 Beaver St, Milford, MA 01757 • 5086342066
  • Carmel, NY
  • Natick, MA
  • Holliston, MA

Isbn (Books And Publications)

  • Secure Xml: The New Syntax For Signatures And Encryption

    view source
  • Author:
    Donald E. Eastlake
  • ISBN #:
    0201756056
  • Internet Open Trading Protocol

    view source
  • Author:
    Donald Eastlake
  • ISBN #:
    0071355014

Us Patents

  • Native Markup Language Code Size Reduction

    view source
  • US Patent:
    20040205668, Oct 14, 2004
  • Filed:
    Apr 30, 2002
  • Appl. No.:
    10/136094
  • Inventors:
    Donald Eastlake - Milford MA, US
  • International Classification:
    G06F017/21
    G06F017/24
  • US Classification:
    715/531000, 715/534000
  • Abstract:
    A computer-assisted method of reducing the size of a Macro Enabled Markup Language document such as XML is provided in which a segment of text is identified () within the document that is used repeatedly. This segment of text can be reduced by creation of a macro such as an XML Entity declaration. Thus, an Entity declaration is created () establishing a shorthand name for the segment of text. The Macro Enabled Markup Language Entity declaration is inserted () into the document at a location preceding the first use of the segment of text, and the shorthand name is substituted () throughout the document in place of the segment of text.
  • Method And Apparatus For Producing Cryptographic Keys

    view source
  • US Patent:
    20040264702, Dec 30, 2004
  • Filed:
    Jun 30, 2003
  • Appl. No.:
    10/610403
  • Inventors:
    Donald Eastlake - Milford MA, US
  • International Classification:
    H04L009/00
  • US Classification:
    380/277000
  • Abstract:
    A method and apparatus for producing a cryptographic key is provided herein. In accordance with the preferred embodiment of the present invention information is embedded within the cryptographic key so that there exists no way to remove the information from the key and have the key function. Since the cryptographic key is generated comprising information embedded within the key, one will be able to determine information about the key simply by analyzing the key itself.
  • Method And Apparatus For Authentication Of Mobile Devices

    view source
  • US Patent:
    20060094401, May 4, 2006
  • Filed:
    Oct 21, 2005
  • Appl. No.:
    11/255475
  • Inventors:
    Donald Eastlake - Milford MA, US
  • International Classification:
    H04M 1/66
  • US Classification:
    455411000
  • Abstract:
    A method and apparatus for authentication in a wireless communication network is disclosed. A secret is shared between a mobile device and a home device. When a mobile device requests a connection to a remote device and the remote device does not have knowledge of the shared secret, the remote device determines whether the mobile device can connect to the remote device by concurrently sending a challenge to the mobile device and the home device. The remote device then compares the responses from the mobile device and the home device.
  • Method And System For Propagating Mutual Authentication Data In Wireless Communication Networks

    view source
  • US Patent:
    20070248050, Oct 25, 2007
  • Filed:
    Apr 25, 2006
  • Appl. No.:
    11/380118
  • Inventors:
    Anthony Metke - Naperville IL, US
    Donald Eastlake - Milford MA, US
    Zhi Fu - Lake Zurich IL, US
  • Assignee:
    MOTOROLA, INC. - Plantation FL
  • International Classification:
    H04Q 7/00
  • US Classification:
    370331000
  • Abstract:
    A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutually authenticating a first node operating in the first network and a second node operating in the second network (step ). A unification message is then transmitted from the first node to a third node operating in the second network, where the unification message indicates that the first node is authenticated with the second network (step ). In response to the unification message, authentication messages from the third node and the second node are then relayed through the first node, for mutually authenticating the third node and the second node (step ).
  • Method And Apparatus For Multiple Pre-Shared Key Authorization

    view source
  • US Patent:
    20070280481, Dec 6, 2007
  • Filed:
    Jun 6, 2006
  • Appl. No.:
    11/447429
  • Inventors:
    Donald E. Eastlake - Milford MA, US
    George A. Harvey - Marlborough MA, US
    Minh N. Hoang - Stoughton MA, US
  • International Classification:
    H04L 9/00
  • US Classification:
    380277
  • Abstract:
    A system and method of providing security in a wireless network is provided. A plurality of pre-shared keys is created. Each pre-shared key provides access to the wireless network. A list of the plurality of pre-shared keys is transmitted to an access point device in the wireless network so that the access point device can authenticate a station attempting to access the network by performing an analysis with the list of the plurality of pre-shared keys.
  • Method And System For Mutual Authentication Of Wireless Communication Network Nodes

    view source
  • US Patent:
    20070283153, Dec 6, 2007
  • Filed:
    May 30, 2006
  • Appl. No.:
    11/420968
  • Inventors:
    Anthony R. Metke - Naperville IL, US
    Donald E. Eastlake - Milford MA, US
    Zhi Fu - Lake Zurich IL, US
  • Assignee:
    MOTOROLA, INC. - Plantation FL
  • International Classification:
    H04L 9/00
  • US Classification:
    713169
  • Abstract:
    A method and system for mutually authenticating a first node and a second node operating in a wireless communication network enables mutual authentication when the first node and the second node are unable to directly authenticate each other. The method includes identifying, at the first node, a third node that can authenticate both the first node and the second node (step ). Authentication data for authenticating the first node with the third node is then transmitted from the first node to the third node (step ). Keying material that is received from the third node is then processed at the first node (step ). A shared secret mutual authentication protocol is then processed, whereby the first node and the second node are mutually authenticated by proving that they each have authenticated with the third node and each have the keying material (step ).
  • Method For Producing Truncated Message Digests

    view source
  • US Patent:
    20080010463, Jan 10, 2008
  • Filed:
    Jul 10, 2006
  • Appl. No.:
    11/456260
  • Inventors:
    Donald E. Eastlake - Milford MA, US
  • Assignee:
    MOTOROLA, INC. - Schaumburg IL
  • International Classification:
    H04L 9/00
  • US Classification:
    713181
  • Abstract:
    A truncated message digest of length L bits is generated from a message by preprocessing the message dependent upon the value L to obtain a modified message. As part of the preprocessing, the message is lengthened by insertion of additional values. A full length message digest is generated from the modified message and the truncated message digest is obtained by truncating the full length message digest to L bits. This approach results in truncated message digests that are secure and provide a large range of truncation options.
  • Portable Certification Authority

    view source
  • US Patent:
    20080046716, Feb 21, 2008
  • Filed:
    Aug 18, 2006
  • Appl. No.:
    11/465620
  • Inventors:
    Donald E. Eastlake - Milford MA, US
    Anthony R. Metke - Naperville IL, US
  • Assignee:
    MOTOROLA, INC. - Schaumburg IL
  • International Classification:
    H04L 9/00
  • US Classification:
    713156
  • Abstract:
    A portable electronic device is operable as a portable certification authority. The portable electronic device stores a pair of keys of a public key infrastructure, issued by a parent certification authority and generates a certificate dependent upon the pair of keys. The private key and corresponding public key certificate are transmitted to a network device of a second agency to allow the device to be authenticated by any node of the network of the first agency that posses anchor information of the parent certification authority. This enables the device of the second agency to be authenticated by a network node of the first agency.

Resumes

Donald Eastlake Photo 1

Principal Engineer

view source
Location:
2386 Panoramic Cir, Apopka, FL
Industry:
Computer Networking
Work:
Huawei since Dec 2010
Principal Engineer

Internet Engineering Task Force since Jan 2006
Co-Chair, TRILL Working Group

IEEE 802.11 since Jul 2012
Chair, General Link Task Group (802.11ak)

IEEE 802.1 since 2009
Voting Member

Cisco Systems May 2010 - Nov 2010
Principal Engineer
Education:
Punahou School 1958 - 1963
High School Diploma
Massachusetts Institute of Technology
Skills:
Ethernet
Ieee 802.11
Dns
Wifi
Wireless
Tcp/Ip
Ipv6
Ip
E Commerce
Rfcs
Cryptography
Security
Switches
Network Security
System Architecture
Unix
Networking
Distributed Systems
Routing
Languages:
English
Donald Eastlake Photo 2

Specialist Training Records

view source
Location:
Milford, MA
Industry:
Airlines/Aviation
Work:
Jetblue Airways
Specialist Training Records
Skills:
Government
Homeland Security
Leadership
Security
National Security
Counterterrorism
Security Clearance
Emergency Management
Policy Analysis
Social Media
Strategic Planning
Certifications:
Apple Certified Associate - Mac Integration 10.8
Apple Certified Associate - Mac Management 10.8
Apple Certified Associate - Mac Integration 10.8
Apple Computer

Googleplus

Donald Eastlake Photo 3

Donald Eastlake

Lived:
Milford, Massachusetts
Education:
Punahou School

Youtube

RBridges and the IETF TRILL Protocol

Speakers: Donald Eastlake, Stellar Switches RBridges are devices that ...

  • Duration:
    26m 17s

Tutorial: RBridges and the IETF TRILL Protocol

Speakers: Donald Eastlake, Stellar Switches RBridges, based on the IET...

  • Duration:
    1h 18m 58s

44th Annual Hilltop Tournament Eastlake v La ...

  • Duration:
    1h 16m 48s

Take Me Through Donald Butler & The Eastlake ...

The East Lake Baptist Church Gospel Chrous singing Take me Through Liv...

  • Duration:
    6m 38s

McDonalds Tournament 2022 Eastlake vs. Balboa

  • Duration:
    1h 29m 36s

Hilltop vs eastlake

  • Duration:
    1h 10m 49s

I'm Not The Same Any More Donald Butler & The...

The East Lake Baptist Church Gospel Chrous singing I'm Not The Same An...

  • Duration:
    5m 7s

Eastlake vs Shabach

Falcon Media presents the Eastlake vs Shabach Basketball Game.

  • Duration:
    1h 23m 24s

Get Report for Donald E Eastlake from Winter Garden, FL, age ~45
Control profile