21
Ramandeep Ahuja, Narayanan Venkitaraman, Mario F Derango, Surender Kumar, Anthony R Metke, Vidya Narayanan: Method and device for transmitting data packets. Motorola Solutions, Randi L Karpinia, June 19, 2012: US08204034 (5 worldwide citation)

A method for transmitting a packet from a transmitting node to a destination node in a communication network can enable improved network efficiency. The method includes receiving and storing identification information concerning at least one foreign node that is directly reachable in the communicati ...


22
Anthony R Metke, Katrin Reitsma, Adam C Lewis, George Popovich, Steven D Upp: Method and apparatus for single sign-on collaboration among mobile devices. Motorola Solutions, Steven A May, Kenneth A Haas, July 15, 2014: US08782766 (4 worldwide citation)

A system for, and method of, single sign-on collaboration among a plurality of mobile devices, includes a server for issuing a first identity token to subsequently authenticate a user of a first of the mobile devices to a service provider, and for generating and sending a collaboration credential to ...


23
Hemang F Patel, Anthony R Metke: Dynamic resource assignment and exit information for emergency responders. Motorola, Lalita Pace, Anthony P Curtis, December 21, 2010: US07855639 (4 worldwide citation)

A method of providing situational awareness at an incident scene. Sensor data can be received from at least one sensor (104, 106, 108) located at the incident scene and position data can be received for at least one resource (306, 308, 310, 312). Based on the received data, at least one optimal exit ...


24
Anthony R Metke, Randy L Ekl, Michael F Korus, Aparna Pandey: Method and device for establishing a secure route in a wireless network. Motorola Solutions, Randi L Karpinia, April 17, 2012: US08161283 (2 worldwide citation)

A method for establishing a secure route in a wireless network as provided improves network efficiency. According to one aspect, the method includes receiving at a first node in the wireless network a route request message from a second node, where the second node and the first node have not been mu ...


25
Liang Guo, Whay Chiou Lee, Anthony R Metke: Method and device for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. Motorola Solutions, Steven A May, April 16, 2013: US08423761 (2 worldwide citation)

A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum permissible grace period during which the PKI certificate can be conditionally granted a valid status (step 905) ...


26
Shanthi E Thomas, Erwin Himawan, Ananth Ignaci, Anthony R Metke: Method and apparatus for distributing certificate revocation lists (CRLs) to nodes in an ad hoc network. Motorola Solutions, May 7, 2013: US08438388 (2 worldwide citation)

A method and apparatus for distributing Certificate Revocation List (CRL) information in an ad hoc network are provided. Ad hoc nodes in an ad hoc network can each transmit one or more certificate revocation list advertisement message(s) (CRLAM(s)). Each CRLAM includes an issuer certification author ...


27
Katrin Reitsma, Anthony R Metke: Mobile dynamic mesh cluster bridging method and apparatus at incident scenes. MOTOROLA SOLUTIONS, July 5, 2016: US09386605 (1 worldwide citation)

A mobile dynamic mesh cluster bridging method and a mobile device include scanning various wireless channels at an incident scene to identify one or more nodes transmitting a given network identifier; determining a first cluster of the one or more identified nodes are not in communication with a sec ...


28
Shanthi E Thomas, Michael W Bright, Chris A Kruegel, Anthony R Metke, Scott J Pappas, Thomas J Senese: Methods and device for secure transfer of symmetric encryption keys. Motorola Solutions, Valerie M Davis, Kenneth A Haas, August 13, 2013: US08509448 (1 worldwide citation)

A sending device generates a first and a second KMM, wherein the first KMM includes a first KEK and a KMM encryption key, and the second KMM includes a set of symmetric encryption keys. The sending device further encrypts the set of symmetric encryption keys using the first KEK; encrypts the first K ...


29
Shanthi E Thomas, Erwin Himawan, Ananth Ignaci, Anthony R Metke: Method and device for distributing public key infrastructure (PKI) certificate path data. Motorola Solutions, Steve A May, Randi L Karpinia, November 26, 2013: US08595484 (1 worldwide citation)

A method and device for distributing public key infrastructure (PKI) certificate path data enables relying nodes to efficiently authenticate other nodes in an autonomous ad-hoc network. The method includes compiling, at a certificate path management unit (CPMU), the PKI certificate path data (step 4 ...


30
Thomas J Senese, Adam C Lewis, Anthony R Metke, George Popovich, Shanthi E Thomas: Methods for establishing a secure point-to-point call on a trunked network. Motorola Solutions, Valerie M Davis, Kenneth A Haas, May 13, 2014: US08724812 (1 worldwide citation)

Methods for establishing secure point-to-point communications in a trunked radio system include receiving, at a trunking controller, a request from a source endpoint for a traffic channel for confidential communications between the source endpoint and a destination endpoint using a shared unique fir ...