A computer-assisted method of reducing the size of a Macro Enabled Markup Language document such as XML is provided in which a segment of text is identified () within the document that is used repeatedly. This segment of text can be reduced by creation of a macro such as an XML Entity declaration. Thus, an Entity declaration is created () establishing a shorthand name for the segment of text. The Macro Enabled Markup Language Entity declaration is inserted () into the document at a location preceding the first use of the segment of text, and the shorthand name is substituted () throughout the document in place of the segment of text.
Method And Apparatus For Producing Cryptographic Keys
A method and apparatus for producing a cryptographic key is provided herein. In accordance with the preferred embodiment of the present invention information is embedded within the cryptographic key so that there exists no way to remove the information from the key and have the key function. Since the cryptographic key is generated comprising information embedded within the key, one will be able to determine information about the key simply by analyzing the key itself.
Method And Apparatus For Authentication Of Mobile Devices
A method and apparatus for authentication in a wireless communication network is disclosed. A secret is shared between a mobile device and a home device. When a mobile device requests a connection to a remote device and the remote device does not have knowledge of the shared secret, the remote device determines whether the mobile device can connect to the remote device by concurrently sending a challenge to the mobile device and the home device. The remote device then compares the responses from the mobile device and the home device.
Method And System For Propagating Mutual Authentication Data In Wireless Communication Networks
Anthony Metke - Naperville IL, US Donald Eastlake - Milford MA, US Zhi Fu - Lake Zurich IL, US
Assignee:
MOTOROLA, INC. - Plantation FL
International Classification:
H04Q 7/00
US Classification:
370331000
Abstract:
A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutually authenticating a first node operating in the first network and a second node operating in the second network (step ). A unification message is then transmitted from the first node to a third node operating in the second network, where the unification message indicates that the first node is authenticated with the second network (step ). In response to the unification message, authentication messages from the third node and the second node are then relayed through the first node, for mutually authenticating the third node and the second node (step ).
Method And Apparatus For Multiple Pre-Shared Key Authorization
Donald E. Eastlake - Milford MA, US George A. Harvey - Marlborough MA, US Minh N. Hoang - Stoughton MA, US
International Classification:
H04L 9/00
US Classification:
380277
Abstract:
A system and method of providing security in a wireless network is provided. A plurality of pre-shared keys is created. Each pre-shared key provides access to the wireless network. A list of the plurality of pre-shared keys is transmitted to an access point device in the wireless network so that the access point device can authenticate a station attempting to access the network by performing an analysis with the list of the plurality of pre-shared keys.
Method And System For Mutual Authentication Of Wireless Communication Network Nodes
Anthony R. Metke - Naperville IL, US Donald E. Eastlake - Milford MA, US Zhi Fu - Lake Zurich IL, US
Assignee:
MOTOROLA, INC. - Plantation FL
International Classification:
H04L 9/00
US Classification:
713169
Abstract:
A method and system for mutually authenticating a first node and a second node operating in a wireless communication network enables mutual authentication when the first node and the second node are unable to directly authenticate each other. The method includes identifying, at the first node, a third node that can authenticate both the first node and the second node (step ). Authentication data for authenticating the first node with the third node is then transmitted from the first node to the third node (step ). Keying material that is received from the third node is then processed at the first node (step ). A shared secret mutual authentication protocol is then processed, whereby the first node and the second node are mutually authenticated by proving that they each have authenticated with the third node and each have the keying material (step ).
A truncated message digest of length L bits is generated from a message by preprocessing the message dependent upon the value L to obtain a modified message. As part of the preprocessing, the message is lengthened by insertion of additional values. A full length message digest is generated from the modified message and the truncated message digest is obtained by truncating the full length message digest to L bits. This approach results in truncated message digests that are secure and provide a large range of truncation options.
Donald E. Eastlake - Milford MA, US Anthony R. Metke - Naperville IL, US
Assignee:
MOTOROLA, INC. - Schaumburg IL
International Classification:
H04L 9/00
US Classification:
713156
Abstract:
A portable electronic device is operable as a portable certification authority. The portable electronic device stores a pair of keys of a public key infrastructure, issued by a parent certification authority and generates a certificate dependent upon the pair of keys. The private key and corresponding public key certificate are transmitted to a network device of a second agency to allow the device to be authenticated by any node of the network of the first agency that posses anchor information of the parent certification authority. This enables the device of the second agency to be authenticated by a network node of the first agency.
Huawei since Dec 2010
Principal Engineer
Internet Engineering Task Force since Jan 2006
Co-Chair, TRILL Working Group
IEEE 802.11 since Jul 2012
Chair, General Link Task Group (802.11ak)
IEEE 802.1 since 2009
Voting Member
Cisco Systems May 2010 - Nov 2010
Principal Engineer
Education:
Punahou School 1958 - 1963
High School Diploma
Massachusetts Institute of Technology
Skills:
Ethernet Ieee 802.11 Dns Wifi Wireless Tcp/Ip Ipv6 Ip E Commerce Rfcs Cryptography Security Switches Network Security System Architecture Unix Networking Distributed Systems Routing
Government Homeland Security Leadership Security National Security Counterterrorism Security Clearance Emergency Management Policy Analysis Social Media Strategic Planning
Certifications:
Apple Certified Associate - Mac Integration 10.8 Apple Certified Associate - Mac Management 10.8 Apple Certified Associate - Mac Integration 10.8 Apple Computer
Googleplus
Donald Eastlake
Lived:
Milford, Massachusetts
Education:
Punahou School
Youtube
RBridges and the IETF TRILL Protocol
Speakers: Donald Eastlake, Stellar Switches RBridges are devices that ...
Duration:
26m 17s
Tutorial: RBridges and the IETF TRILL Protocol
Speakers: Donald Eastlake, Stellar Switches RBridges, based on the IET...
Duration:
1h 18m 58s
44th Annual Hilltop Tournament Eastlake v La ...
Duration:
1h 16m 48s
Take Me Through Donald Butler & The Eastlake ...
The East Lake Baptist Church Gospel Chrous singing Take me Through Liv...
Duration:
6m 38s
McDonalds Tournament 2022 Eastlake vs. Balboa
Duration:
1h 29m 36s
Hilltop vs eastlake
Duration:
1h 10m 49s
I'm Not The Same Any More Donald Butler & The...
The East Lake Baptist Church Gospel Chrous singing I'm Not The Same An...
Duration:
5m 7s
Eastlake vs Shabach
Falcon Media presents the Eastlake vs Shabach Basketball Game.